CSIT-460 Computer Security - Lecture 04

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/17

flashcard set

Earn XP

Description and Tags

Flashcards covering Windows file permissions, Unix file permissions, SetUID, User IDs, and Privileged Programs.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

18 Terms

1
New cards

What is the purpose of the Windows file permissions system?

To control access to files and folders by allowing administrators to specify which users or groups can access an object and what actions they can perform.

2
New cards

What are some standard permission types in Windows for files and folders?

Full Control, Modify, Read & Execute, List Folder Contents, Read, and Write.

3
New cards

What is the purpose of Unix file permissions?

To provide a simplified form of access control, specifying who can read, write, or execute each file or directory.

4
New cards

What are the three user classes in Unix file permissions?

Owner, Group, and Others (All).

5
New cards

What are the permission types in Unix file permissions?

Read (r), Write (w), and Execute (x).

6
New cards

How are Unix file permissions represented?

Symbolically (e.g., rw-r-----) or numerically (e.g., 640).

7
New cards

What does SetUID allow a program to do?

Run with the file owner's permissions, not the person running it.

8
New cards

What happens when SetUID is set for a program?

The system temporarily uses the owner's user ID for that process.

9
New cards

What User ID (UID) does the root user have in Linux?

0

10
New cards

What is the range of User IDs (UID) for regular users in most Linux systems?

Greater than or equal to 1000.

11
New cards

What is the purpose of privileged programs?

To enforce fine-grained access control in operating systems as extensions.

12
New cards

What are two types of privileged programs?

Daemons and Set-UID Programs.

13
New cards

What is a daemon?

A computer program that runs in the background and often needs to run as root or other privileged users.

14
New cards

What does the 'sudo' command allow?

Privilege escalation.

15
New cards

What is the Set-UID bit?

A special marking that allows a user to run a program with the program owner’s privilege.

16
New cards

What are the two User IDs every process have?

Real UID (RUID) and Effective UID (EUID).

17
New cards

How to enable Set-UID?

Using chmod 4 7 5 5 command

18
New cards

What is the process of privilege escalation vulnerabilities?

When an attacker exploits a bug, design flaw or configuration oversight in an operating system or application to gain elevated access to resources that are normally protected from an application or user.