Security Principles Flashcards
(59 cards)
What is the goal of minimizing attack possibilities?
Reduce the installed code to only what is necessary.
What is the attack surface?
The set of points where an attacker can try to enter or extract data.
What metrics count toward the attack surface?
Open sockets, pipes, RPC endpoints, services, and privileged services.
How many services should run by default?
As few as possible to minimize vulnerabilities.
What are ISAPI filters?
Microsoft’s web server services, also implemented by Apache mod_isapi.
What increases attack surface in web servers?
Dynamic web pages and ISAPI filters/apps.
How do weak ACLs affect security?
Files, directories, or registry keys with weak ACLs are vulnerable.
Why aim for secure defaults?
Reduces attack surface and improves performance.
What is defense in depth?
Multiple layers of security controls to protect a system.
What is an example of defense in depth?
Bank security with guards, time-release doors, CCTV, and vault layers.
How do time-release doors enhance security?
Prevent quick entry/exit, allowing remote locking to trap intruders.
Why don’t bank tellers access the vault?
Least privilege principle limits their access to reduce risk.
What is a feature of a bank vault?
Thick metal, multiple compartments, and controlled opening times.
What is the least privilege principle?
Run processes with minimal privileges to limit damage from attacks.
What happens if a vulnerability allows code injection?
Malicious code runs with the same privileges as the compromised process.
How should web servers avoid admin privileges?
Run as low-privilege accounts, like Apache’s nobody account.
How does Apache manage privilege?
Main httpd process starts as root, spawns low-privilege processes.
What is Run As Different User?
A Windows 2000 feature to run apps with alternate credentials.
What is Run as Administrator?
A Vista/Windows 7-10 feature to elevate app privileges temporarily.
Why is closing an admin-privileged app safer?
Ends elevated privileges, reducing risk.
What is backward compatibility in security?
Ensuring new protocols work with older systems.
Why is backward compatibility a security issue?
Insecure older versions may persist due to non-upgrading clients.
What is an example of a protocol with compatibility issues?
Server Message Block (SMB) protocol.
When was secure SMB with packet signing introduced?
With Windows 98 and NT4 SP3.