OS Security

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/28

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 9:23 PM on 3/24/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

29 Terms

1
New cards

What is OS Security?

measures and mechanisms implemented to protect the OS

2
New cards

What are User Identifiers (UIDs)?

unique numerical values assigned to users in an OS to identify and manage their access to system resources

3
New cards

How can a User Open a File?

use a process to open it

4
New cards

What is the UID of the Root User?

0

5
New cards

How do UIDs and GIDs work?

when a user logs in, the system assigns their UID and GID to the session

6
New cards

What is a GID?

unique number assigned to a group of users

7
New cards

How many Groups can Users belong to?

1 or more

8
New cards

What is a Effective UID?

used to determine access rights for processes

a process can temporarily assume the privileges of another user

9
New cards

What is a Real UID?

the UID of the user who started the process

10
New cards

What is a Saved UID?

allows a process to switch back to a privileged UID aster temporarily dropping privileges

11
New cards

What are the Potential Threats of UIDs?

  • attackers may exploit misconfigured UIDs to gain elated privileges

  • reassigning a UID to a new user can lead to unintended access to files owned by the previous user

  • not having least privilege levels

12
New cards

What are some of the Components of OS Security?

  • access control

  • user management

  • file system security

  • process and memory protection

  • physical security

  • patch management

  • auditing and logging

  • malware protection

13
New cards

What is User Management?

creating and managing user accounts with appropriate privileges

implementing least privilege

14
New cards

What is File System Security?

protecting files and directories through file permissions

15
New cards

What are File Permissions?

each file and directory is owned by a specific user and group, they have control over its permissions

a ‘-’ indicates a right isn’t granted

16
New cards

What are FIle Permission Types?

  • r - allows viewing/reading

  • w - allows modifying/deleting

  • x - allows running the file as a program/accessing the directory

17
New cards

What are File Permission Levels?

  • user/owner

  • group - members of files group

  • others - all other users

18
New cards

What is Process and Memory Protection?

isolating processes to prevent interference/exploitation

19
New cards

What are the Potential Threats of Process and Memory Protection?

  • buffer overflows

  • privilege escalation

  • denial of service

20
New cards

What is a Buffer Overflow?

program writes more data to a buffer than it can hold

excess data can overwrite adjacent memory locations

21
New cards

What is a Buffer?

location where data is stored - contiguous block of memory

22
New cards

What is Physical Security?

protecting hardware and physical access to systems

23
New cards

What is Patch Management?

regularly updating the OS to fix vulnerabilities and bugs and applying security patches to address known exploits

24
New cards

What are the Types of Patches?

  • security patches

  • bug fixes

  • feature updates

  • performance patches

25
New cards

What is Auditing?

reviewing and analysing logs and records to ensure compliance, detect anomalies and investigate security incidents

26
New cards

What are the Types of Audits?

  • security - evaluate effectiveness of security controls and identify vulnerabilities

  • compliance - ensure adherence to regulatory requirements

  • operational - assess efficiency and effectiveness of operational processes

  • forensic - investigate security incidents/breaches to determine cause and impact

27
New cards

What is Logging?

recording events, activities and transactions that occur within a system/application/network

28
New cards

What are the Types of Logs?

  • system - recording OS events

  • application - track events in a specific app

  • security - capture related events

  • network - monitor network traffic and connections

  • audit - user activities and changes

29
New cards

What is Malware Protection?

using anti-virus and anti-malware tools to detect and remove malicious software

Explore top flashcards

flashcards
Chapters 10 & 11 Test
56
Updated 1093d ago
0.0(0)
flashcards
AP Euro Unit 1+2 Anchors
39
Updated 160d ago
0.0(0)
flashcards
Intro to Cognitive Psychology
24
Updated 895d ago
0.0(0)
flashcards
Ch. 17 & 18 Vocabulary
37
Updated 1105d ago
0.0(0)
flashcards
COMPSCI 1210 ( COMP ORG)
116
Updated 1106d ago
0.0(0)
flashcards
Present Perfect
34
Updated 1086d ago
0.0(0)
flashcards
Chapters 10 & 11 Test
56
Updated 1093d ago
0.0(0)
flashcards
AP Euro Unit 1+2 Anchors
39
Updated 160d ago
0.0(0)
flashcards
Intro to Cognitive Psychology
24
Updated 895d ago
0.0(0)
flashcards
Ch. 17 & 18 Vocabulary
37
Updated 1105d ago
0.0(0)
flashcards
COMPSCI 1210 ( COMP ORG)
116
Updated 1106d ago
0.0(0)
flashcards
Present Perfect
34
Updated 1086d ago
0.0(0)