1/72
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
What is kernel mode (supervisor mode)?
Special processor mode for trusted operating system code
- Allows privileged operations
- Has access to protected resources
What triggers a switch to kernel mode?
Exceptions or other processor events
- Processor automatically transfers control to the operating system
What does privilege level affect?
Instructions a task may use
Memory areas it may access
Functions it may call
I/O devices it may use
What is segmentation in memory protection?
Memory organised into segments
- Each segment has descriptors and permissions
- Supports isolation and protection
What is a principal?
Entity responsible for actions in a system
- Typically a user or process
What is access control?
Mechanism controlling access to system resources
Protects data and system resources from unauthorised use
How does MAC work? (Mandatory Access Control)
Users and resources receive security classifications
- Access granted according to classification rules
- Permissions controlled centrally
What is an access matrix?
Conceptual table showing permissions for subject-object pairs
- Each entry specifies allowed access rights
Properties of a Reference Validation Mechanism
Tamper-proof
- Always invoked
- Verifiable
What is a file owner?
User associated with a file
Identified by UID
Controls permissions in DAC systems
What is a protection group?
Group associated with a file
- Identified by GID
- Used for shared access control
How are file permissions checked?
System checks user category first then group then others
- First matching category determines permissions
What is SetGID?
Special permission bit causing an executable to run with the permissions of the file group
- On directories new files inherit the directory group
Common umask (user mask) value 022
1. For Files
Unmasked Value (Base): 666 (Read & Write for Owner, Group, and Others. Note: For security reasons, Linux never grants execute permissions to files by default upon creation.)
Umask: 022
Calculation: 666 - 022 = 644
Final Permissions: 644 (Owner: read/write, Group: read, Others: read).
2. For Directories
Unmasked Value (Base): 777 (Read, Write, & Execute for Everyone. Directories require execute permissions so users can enter them.)
Umask: 022
Calculation: 777 - 022 = 755
Final Permissions: 755 (Owner: read/write/execute, Group: read/execute, Others: read/execute).
What is a site-to-site VPN?
Connects two private networks across a public network
- Typically transparent to end users
What are limitations of VPNs?
VPN provider can observe traffic leaving the tunnel
- Browser tracking remains possible
- VPNs can be abused for insider attacks