Operating Systems - Exam 3

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/99

flashcard set

Earn XP

Description and Tags

Security, Software Exploitation, Defense, Multi-processor systems, Virtualization, AndroidOS

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

100 Terms

1
New cards

system bloat

This is the difficult in ensuring security.

2
New cards

manually, automatically

What are the two ways an attacker can launch exploits?

3
New cards

virus

This exploit requires at least some user interaction to propagate.

4
New cards

worm

This exploit is self-propelled without any user input.

5
New cards

trojan horse

This exploit is additional functionality unknowingly installed along with something else.

6
New cards

confidentiality, integrity, availability

What are the three fundamental properties for the security of an information system? It’s what CIA stands for.

7
New cards

confidentiality

This is threatened by exposure to data. (Secret data should remain secret)

8
New cards

integrity

This is threatened by the tampering of data. It means that unauthorized users should not be able to modify any data without the owner’s permission.

9
New cards

availability

This is threatened by the denial of service attack. It means that no one can disturb the system to make it unusable.

10
New cards

crackers

These are the people who try to break into computer systems where they don’t belong.

11
New cards

white-hats

Most attack tools are made by…

12
New cards

nmap, port-scan

This attack tool is useful for both type of attackers.

13
New cards

botnets

These are infrastructures that consist of thousands of compromised computers.

14
New cards

bot or zombie

This is when a computer is under the attacker’s control.

15
New cards

amount of effort for security and protection

What is dependent on who the enemy is thought to be?

16
New cards

cryptography

This is the shuffle of information to make it hard to read without a key.

17
New cards

software hardening

This adds protection mechanisms to make software difficult for attackers to make misbehave.

18
New cards

features

What is the enemy of security?

19
New cards

trusted systems

These have formally stated security requirements and meet those requirements.

20
New cards

trusted computing base (TCB)

This consists of hardware and software necessary for enforcing all of the security rules.

21
New cards

hardware, OS kernel, user programs with superuser privileges

What does the TCB include?

22
New cards

OS kernel

This involves process creation/switching, memory management, and part of the file and i/o management.

23
New cards

reference monitor

This is an important part of the TCB. It accepts all system calls involving security and decides whether they should be processed or not. This is where all security decisions are made.

24
New cards

domain

This is a set of (object, rights) pairs. It also specifies an object and some subset of rights that can be performed on it.

25
New cards

objects

A computer contains many resources which are also known as…

26
New cards

right

This is the permission to perform one of the operations.

27
New cards

principle of least authority (POLA)

This is also known as “need to know” and determines how objects are allocated to domains.

28
New cards

minimum

Security works best when each domain has the _______ objects and privileges to work — and no more.

29
New cards

UID/GID

In UNIX the domain of a process is defined by its…

30
New cards

system calls

What causes a domain switch?

31
New cards

matrix

Conceptually, this can keep track of which objects belong to each domain.

32
New cards

rows/columns

What are the two methods of storing the matrix?

33
New cards

access control list (ACL)

This slices a matrix up by columns. It associates with each object a list containing all domains that may access the object and how.

34
New cards

subjects/principals

Users can also be called…

35
New cards

one

Using an ACL, we assume that each domain is associated with how many users?

36
New cards

generic rights

This type of right is used with ACL, and is used to destroy and copy objects.

37
New cards

object-specific rights

This type of right is used with ACL, and is used to append message for a mailbox.

38
New cards

less encapsulation

This is when a user belongs to any groups that have certain access rights, access is permitted.

39
New cards

groups, wildcards

This is what allows selective blocking of specific users.

40
New cards

edit the ACL to make the change, ACLs are only checked on “open”

What are the two main steps for revoking previously granted access in the ACL?

41
New cards

capabilities

This is what slices the matrix up by rows. It is associated with each process is a list of objects that may be accessed along with permitted operations.

42
New cards

object identifier, bitmap for various rights

What are the two main things contained in a capability?

43
New cards

tagged architecture

This is when each memory word has an extra bit that tells whether the word contains a capability or not.

44
New cards

kernel mode

A tag bit can only be modified if the OS is in which mode?

45
New cards

position

Capabilities are referred to by their ______ in the list.

46
New cards

user space, cryptographically

The C-list should be kept in _____, but managed ______.

47
New cards

distributed systems

What are capabilities best for?

48
New cards

copy/remove capability, copy/destroy object

What are the four of the generic rights applicable to all objects in capabilities?

49
New cards

system must find all capabilities for any object which are stored in C-lists all over the disk.

Why is revoking access to an object difficult using capabilities?

50
New cards

static

Protection matrices are not…

51
New cards

create/delete object, create/delete domain, insert/remove right

What are the 6 primitive operations on the protection matrix that can be used as a base to model any protection system.pr

52
New cards

protection commands

What can the 6 primitive operations be combined into?

53
New cards

system

What enforces the matrix?

54
New cards

authorized/unauthorized

What are the two states that all possible matrices can be partitioned into?

55
New cards

discretionary access control

This access is when most OSs allow individual users to determine who may read and write their files and other objects.

56
New cards

mandatory access control

This type of access is not appropriate for all environments. It regulates the flow of information to make sure that it does not lead out in a way it is not supposed to.

57
New cards

Bell-LaPadula Model, Biba Model

What are the two models associated with mandatory access control?

58
New cards

confinement problem

This is when the goal is to encapsulate or confine the server so it cannot pass information to the collaborator.

59
New cards

protection matrix

This can guarantee that the server cannot write a file which the collaborator can read.

60
New cards

response time

How does the collaborator detect the bit stream? What must it monitor?

61
New cards

covert channel

This has noisy but error correcting code. It doesn’t provide protection based on a matrix of objects and domains can prevent this kind of leakage.

62
New cards

steganography

This is an encoding method that uses the low-order bit of each RGB color value as the covert channel. It can hide text in pictures and can be called “covered writing”

63
New cards

cryptography

The purpose of this is to take a message or file and encrypt it into another text in such a way that only authorized people know how to convert it back to plain text.

64
New cards

plaintext

Before the encryption, what is the text called in cryptography?

65
New cards

ciphertext

This is what the plain text is turned into.

66
New cards

public

Encryption and decryption algorithms should always be…

67
New cards

keys

In cryptography the secrecy depends on parameters to the algorithms called…

68
New cards

C=E(P,K)

What is the definition of encryption?

69
New cards

kerckhoff’s principle

This principle means that algorithms shoujld all be public and the secrecy should reside exclusively in the keys.

70
New cards

P=D(C,K)

What is the definition of decryption?

71
New cards

monoalphabetic substitution

This is a type of encryption where the letters are replaced by other letters of the plaintext.

72
New cards

public key cryptography

These have distinct keys that are used for encryption and decryption. Given a well-chosen encryption key, it is virtually impossible to discover the corresponding decryption key. The encryption key can be made public and only the private decryption key be kept secret.

73
New cards

RSA

This is a public-key system where all arithmetic is done using modulo arithmetic and all the numbers involved have hundreds of digits.

74
New cards

symmetric cryptography

Public key cryptography is thousands of times slower than…

75
New cards

encryption key

What is the public key considered?

76
New cards

decryption key

What is the private key considered?

77
New cards

correspondent

To send a secret message to a user, a ______ encrypts the message with the receiver’s public key.

78
New cards

cryptographic hash function

The function f is considered…

79
New cards

digital signatures

These are necessary to sign documents digitally. They make it possible to ensure signed emails and documents cannot be repudiated by the sender later.

80
New cards

SHA-1 (secure has algorithm)

This type of function typically produces a fixed-length result independent of the original document size.

81
New cards

certificates

These are an alternate method to distribute public keys.

82
New cards

user’s name, public key

What do certificates contain?

83
New cards

certification authority (CA)

What is the trusted third party that signs certificates?

84
New cards

public key infrastructure (PKI)

This is the general scheme for managing public keys.

85
New cards

40

In the Ad-hoc method, how many CA keys come preloaded?

86
New cards

trusted platform module (TPM)

This is a chip that holds a cryptoprocessor with nonvolatile key storage.

87
New cards

unauthorized software from execution, media piracy or enforce expiration dates

What does the TPM prevent? (2 things)

88
New cards

login time

A secured computer system must require all users to be authenticated during what time?

89
New cards

something the user knows, has, is

What are the general principles that help authenticate users?

90
New cards

username, password

What are the two most common method of authentication

91
New cards

obscure/don’t display the password being typed, don’t give feedback too early

What are the two principles of password protection used in implementation?

92
New cards

war dialers

These send out pings, try to set up connections to machines that respond, discover running services, and then launch the attacks

93
New cards

salt

This is an n-bit random number and is associated with each passwrod and “encrypted” with the password

94
New cards

one-way hash chain

This is a scheme that allows a user to log in securely over an insecure network using one-time passwords

95
New cards

challenge-response authentication

This is when the user picks an algorithm when signing up and the server sends an argument. Then the user will type a number. This algorithm can be different at different times. It can have a secret key given enough computing power.

96
New cards

stored value cards

This are small amounts of “persistent” memory

97
New cards

smart cards

This is a small tamperproof computer that can engage with a central computer to authenticate the user.

98
New cards

metal door keys, plastic magnetic stripe cards, plastic chip cards

What are the three main physical object authentication?

99
New cards

biometrics

These measure physical characteristics of the user that are hard to forge.

100
New cards

exploiting vulnerabilities

This is a main method to break into a user’s computer to make it do something different than the programmer intended.