Week 7 - Operating Systems Security

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/72

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 12:18 PM on 5/24/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

73 Terms

1
New cards
What is memory protection?
Protects system memory from unauthorised access - Prevents processes accessing memory belonging to other processes or the OS - Ensures system integrity
2
New cards
Why is memory protection needed?
Prevents resource conflicts - Stops processes corrupting each other's memory - Protects operating system data
3
New cards
What is process isolation?
Mechanism preventing one process reading or writing another process's memory - Fundamental memory protection technique
4
New cards

What is kernel mode (supervisor mode)?

Special processor mode for trusted operating system code

- Allows privileged operations

- Has access to protected resources

5
New cards
What is user mode?
Restricted execution mode for applications - Limits what programs can do directly - Requires OS services for privileged operations
6
New cards
Kernel mode vs user mode
Kernel mode has privileged access to system resources - User mode is restricted - Improves system security and stability
7
New cards

What triggers a switch to kernel mode?

Exceptions or other processor events

- Processor automatically transfers control to the operating system

8
New cards
What is a privilege level?
Amount of permissions granted to a task - Determines accessible instructions memory areas functions and devices
9
New cards

What does privilege level affect?

  • Instructions a task may use

  • Memory areas it may access

  • Functions it may call

  • I/O devices it may use

10
New cards
What is a descriptor register?
Stores addresses accessible to a process - Loaded by supervisor code - Used for memory protection
11
New cards
What is the privileged bit?
Processor control bit required for privileged operations - Can only be controlled by supervisor code
12
New cards

What is segmentation in memory protection?

Memory organised into segments

- Each segment has descriptors and permissions

- Supports isolation and protection

13
New cards
What is a segment descriptor?
Data structure containing a segment's address size and access permissions
14
New cards
What are memory access control indicators?
R = Read - W = Write - X = Execute - M = Supervisor mode execution - F = Fault to supervisor
15
New cards
What is accountability?
Ability to associate actions with a specific user or process - Supports auditing and responsibility
16
New cards

What is a principal?

Entity responsible for actions in a system

- Typically a user or process

17
New cards
Authentication vs Authorisation
Authentication verifies identity - Authorisation determines permitted actions and resource access
18
New cards

What is access control?

Mechanism controlling access to system resources

Protects data and system resources from unauthorised use

19
New cards
What are the main access control models?
DAC (Discretionary Access Control) - RBAC (Role-Based Access Control) - MAC (Mandatory Access Control)
20
New cards
What is Discretionary Access Control (DAC)?
Resource owner controls access permissions - Permissions may be granted to other users - Flexible and easy to use
21
New cards
Benefits of DAC
Gives users control over resources - Flexible - Easy to use at small scale
22
New cards
Limitations of DAC with ACLs
ACLs can become large - May require frequent updates - Listing all authorised users can be tedious
23
New cards
What is Role-Based Access Control (RBAC)?
Permissions assigned to roles - Users assigned to roles - Users inherit role permissions
24
New cards
Benefits of RBAC
Simplifies access management - Reduces errors - Scales easily in large organisations
25
New cards
What is Mandatory Access Control (MAC)?
Central authority controls access according to predefined policies - Users cannot change permissions
26
New cards

How does MAC work? (Mandatory Access Control)

Users and resources receive security classifications

- Access granted according to classification rules

- Permissions controlled centrally

27
New cards
Benefits of MAC
High security - Prevents unauthorised sharing - Centralised control
28
New cards

What is an access matrix?

Conceptual table showing permissions for subject-object pairs

- Each entry specifies allowed access rights

29
New cards
What is an Access Control Entry (ACE)?
Entry in an access matrix specifying permissions a subject has for an object
30
New cards
What is an Access Control List (ACL)?
Object-centred representation of permissions - Lists subjects and their rights for a particular object
31
New cards
What is a Capability List (C-List)?
Subject-centred representation of permissions - Lists objects and rights available to a subject
32
New cards
ACLs vs Capability Lists
ACLs are organised by object - Capability lists are organised by subject
33
New cards
What is a Reference Validation Mechanism?
Practical implementation of access control mediation - Checks whether requested access is authorised
34
New cards

Properties of a Reference Validation Mechanism

Tamper-proof

- Always invoked

- Verifiable

35
New cards
Why is a Reference Validation Mechanism important?
Ensures every access request is checked before access is granted
36
New cards
What are audit trails?
Logs recording access and system activity - Support accountability debugging and investigations
37
New cards
What is a UID?
Numeric User Identifier used by the operating system for access control
38
New cards
What is a GID?
Numeric Group Identifier representing a protection group
39
New cards

What is a file owner?

  • User associated with a file

  • Identified by UID

  • Controls permissions in DAC systems

40
New cards

What is a protection group?

Group associated with a file

- Identified by GID

- Used for shared access control

41
New cards
What is the superuser?
Process running with UID 0 - Granted access to all file resources regardless of protection settings
42
New cards
Root vs superuser
Root is the conventional username associated with UID 0 - Superuser refers to processes running with UID 0 privileges
43
New cards
What is file-based access control?
Access control applied to files and file metadata - Permissions determine allowed operations on files
44
New cards
What is the User-Group-Others (UGO) model?
Unix/Linux permission model based on owner group and others categories
45
New cards
What permissions exist in the UGO model?
Read (r) - Write (w) - Execute (x)
46
New cards
How do Linux file permissions work?
Permissions are specified separately for user group and others - Each category has read write and execute bits
47
New cards
How do you interpret -rw-r--r--?
Regular file - Owner has read and write - Group has read - Others have read
48
New cards
What does r permission mean?
Read access to file contents
49
New cards
What does w permission mean?
Write access allowing modification of file contents
50
New cards
What does x permission mean?
Execute permission allowing a file to run as a program
51
New cards
What does x mean for directories?
Allows traversal or entry into the directory
52
New cards

How are file permissions checked?

System checks user category first then group then others

- First matching category determines permissions

53
New cards
What is SetUID?
Special permission bit causing an executable to run with the permissions of the file owner
54
New cards

What is SetGID?

Special permission bit causing an executable to run with the permissions of the file group

- On directories new files inherit the directory group

55
New cards
What is the Sticky Bit?
Special directory permission preventing users deleting or renaming files they do not own
56
New cards
What is umask?
Default permission mask for newly created files and directories - Removes permissions from system defaults
57
New cards

Common umask (user mask) value 022

1. For Files

  • Unmasked Value (Base): 666 (Read & Write for Owner, Group, and Others. Note: For security reasons, Linux never grants execute permissions to files by default upon creation.)

  • Umask: 022

  • Calculation: 666 - 022 = 644

  • Final Permissions: 644 (Owner: read/write, Group: read, Others: read).

2. For Directories

  • Unmasked Value (Base): 777 (Read, Write, & Execute for Everyone. Directories require execute permissions so users can enter them.)

  • Umask: 022

  • Calculation: 777 - 022 = 755

  • Final Permissions: 755 (Owner: read/write/execute, Group: read/execute, Others: read/execute).

58
New cards
Difference between memory protection and object protection
Memory protection controls access to process memory - Object protection controls access to files and other resources
59
New cards
What is a VPN?
Virtual Private Network created using encrypted tunnels and specialised protocols to connect trusted networks over public networks
60
New cards
Why are VPNs needed?
Normal network traffic is visible on the network - VPNs provide confidentiality through encrypted tunnels
61
New cards
What is VPN tunnelling?
One data stream carried inside another - Original data is encapsulated and transmitted through an encrypted tunnel
62
New cards
What is a private network?
Network intended only for trusted users - Security may rely on isolation authentication firewalls and gateways
63
New cards
What are the two primary VPN use cases?
Site-to-site VPN - Remote access VPN
64
New cards

What is a site-to-site VPN?

Connects two private networks across a public network

- Typically transparent to end users

65
New cards
What is a remote access VPN?
Allows authorised users to remotely access a private network
66
New cards
What is transport mode VPN?
Host-to-host VPN architecture - Provides end-to-end security between hosts
67
New cards
What is tunnel mode VPN?
VPN architecture where gateways or endpoints add and remove VPN protection
68
New cards
What is a network-to-network VPN?
Tunnel-mode VPN connecting two networks through gateways
69
New cards
What is a network-to-host VPN?
Tunnel-mode VPN connecting a remote user to an organisation's network
70
New cards

What are limitations of VPNs?

VPN provider can observe traffic leaving the tunnel

- Browser tracking remains possible

- VPNs can be abused for insider attacks

71
New cards
Why must users trust a VPN provider?
Traffic is visible after leaving the VPN tunnel - Provider handling of logs affects privacy
72
New cards
Why does a VPN not prevent browser tracking?
Websites can still track users using cookies and similar mechanisms
73
New cards
How can VPNs enable insider attacks?
Encrypted traffic may bypass normal monitoring - Data exfiltration can become harder to detect