SU03: Access Control and System Security Flashcards

1
Q

Types of Access Control

A
  1. Mandatory access control (MAC)
  2. Discretionary Access Control (DAC)
  3. Role-based Access Control (RBAC)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

MAC, DAC, RBAC control based on

A
  1. MAC: **security labels & security clearances. **Strict; useful for army
  2. DAC: subjects & access rules. Flexible, Messy. e.g. Google Docs
  3. RBAC: roles subjects have & rules stating which roles can access what objects. not as flexible as DAC but easier to manage (centrally controlled)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Types of Security threats

A
  1. Intruders: hackers poise threats to OS
  2. Malicious software
  3. Buffer Overflow
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

3 Types of Intruders

A
  1. Masquerader (outsider): break system’s access control pretending to be another user
  2. Misfeasor (insider): misue privilege/access resources they don’t have authorisation for
  3. Clandestine (Insider/outsider): have root control of system & bypass access control
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

2 Types of Malicious software

A
  1. Indepedent (Worm): self-contained, self-duplicated programs. Self-duplicated, can be ran by OS
  2. Co-host (Virus): parasitic, need to attach to other programs

Other examples: Trojan Horse, Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

3 occurences in Buffer Overflow

A
  1. process attempts to overwrite adjacent memory location leading to programming error
  2. attacker gain control in program
  3. attacker use Metasploit against unpatched system & get shell remotely
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

3 Countermeasures, what they do

A
  1. Authentication: identify & verify users are whom they claim to be. Strengthen using 2FA
  2. Access control: system to give correct access right after authentication
  3. Buffer Overflow countermeasures:
    * compile-time defence: harden programs
    * Runtime defence: detect & stop attacks in executing programs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

6 Steps in Hardening OS

A
  1. OS installation & patching
  2. remove unnecessary services, applications, protocols
  3. Configure users, groups, permissions
  4. install & configure additional security controls
  5. Test system secuirty
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

OS installation & patching - 4 parts

A
  1. proper planning of OS installation
  2. minimise software package
  3. take care booting process
  4. use cryptographic file systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Remove Unnecessary services, applications, protocols

A
  1. Use System planning: resolves conflict of usability and security
  2. Unnecessary services shouldn’t be installed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Configure Users, Groups, Permissions - 3 parts

A
  1. do not give more access than what’s required
  2. careful categorisation of groups
  3. justify additional group of users
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Install & Configure Additional seucrity controls - 2 parts

A
  1. Implement additional security controls (firewalls, antivirus, instrusion system)
  2. update antivirus software on definition files/signarures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

test system security - 2 parts

A
  1. make sure implementation works
  2. depending on OS, use checklsit
How well did you know this?
1
Not at all
2
3
4
5
Perfectly