OS Module 12: Security

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/61

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

62 Terms

1
New cards

Why is security important in computational systems?

Protects against data loss, financial risks, and competitive disadvantage.

2
New cards

What is an adversary in security?

An unauthorized entity seeking to access, modify, or destroy data.

3
New cards

What is a vulnerability?

A deficiency in a system that can be exploited by threats.

4
New cards

Common types of cyber attacks?

  • Doxing (exposing data)

  • Diddle attack (tampering data)

  • Denial-of-Service (DoS) (disabling access)

  • Identity fraud (falsifying identities)

5
New cards

What are typical adversary motivations?

Opportunistic prying, hacktivism, snooping, spoofing, monetary crime, sabotage.

6
New cards

What are key steps in managing security risk?

Identify assets, assess costs, set policies, identify vulnerabilities, develop countermeasures.

7
New cards

What are three types of access control implementation?

  • Hardware-based (BIOS encryption)

  • Software-based (OS policies)

  • Human-based (passwords, biometrics)

8
New cards

What are weaknesses of human-based security?

Password sharing and social engineering risks.

9
New cards

What is Discretionary Access Control (DAC)?

Object owners set permissions individually.

10
New cards

What is Mandatory Access Control (MAC)?

Organizations control access, not users.

11
New cards

What is Role-Based Access Control (RBAC)?

User roles determine access rights; roles can be hierarchical and inherited.

12
New cards

What is an Access Control Matrix (ACM)?

Matrix showing which domain has which rights over which objects.

13
New cards

What problem does SOX compliance address with ACMs?

Prevents accounting fraud by controlling and auditing access.

14
New cards

How are ACLs and Capability Lists (CLs) used to solve ACM scaling issues?

  • ACLs: Organized by object.

  • CLs: Organized by domain.

15
New cards

What is the Bell-LaPadula model?

Focuses on confidentiality:

  • Read down (k or lower)

  • Write up (k or higher)

16
New cards

What is the Biba model?

Focuses on integrity:

  • Read up (k or higher)

  • Write down (k or lower)

17
New cards

Why can’t Bell-LaPadula and Biba models be enforced together?

Their rules contradict, causing single-level compartments, harming data sharing.

18
New cards

What is a side channel?

Indirect leakage of information through system behaviors, not direct data access.

19
New cards

Examples of side channel attacks?

Monitoring electromagnetic radiation, CPU sounds, system load timing.

20
New cards

What is a covert channel?

Unauthorized secret communication between processes violating security policy.

21
New cards

Examples of covert channels?

  • Storage covert channels (encode info via file size).

  • Timing covert channels (manipulate packet send times).

22
New cards

How can processor utilization be abused for a covert channel?

Sender modulates CPU usage to encode 1s and 0s; receiver monitors timing to reconstruct data.

23
New cards

How can covert channels hide inside normal programs?

Sender hides inside word processors, receiver acts like system monitors to avoid detection.

24
New cards

What is cryptography?

  • Transforming plaintext into ciphertext to protect information.

  • Ensures only authorized users can decrypt and access the original data.

25
New cards

What characterizes modern cryptography?

Based on mathematical theory and computational hardness assumptions

26
New cards

What is the basic encryption process flow

Plaintext → (Encryption Key + Algorithm) → Ciphertext → (Decryption Key + Algorithm) → Plaintext.

27
New cards

What is symmetric cryptography

  • Same key is used for both encryption and decryption.

  • Used historically for secure group communication.

28
New cards

What is asymmetric cryptography?

  • Different keys for encryption and decryption.

  • Public key encrypts, private key decrypts.

29
New cards

Example of classic cryptosystems?

  • Caesar cipher (letter shifting)

  • Rail Fence cipher (zig-zag rearrangement)

  • Hill cipher (matrix multiplication)

30
New cards

Example of modern cryptosystems?

  • DES (outdated, 56-bit keys, broken in 1999)

  • AES (secure, 128/192/256-bit keys)

31
New cards

How is cryptography used for secure communication?

Use public key to send a symmetric key, enabling fast two-way encryption after setup.

32
New cards

How does digital signing work?

Private key signs, public key verifies authenticity.

33
New cards

What are cryptographic hash functions used for?

Produce a fixed-length output to verify data integrity without revealing original data.

34
New cards

What is the difference between identification and authentication

  • Identification: Claims an identity.

  • Authentication: Verifies that the identity is valid

35
New cards

Three types of authentication methods

  • Possession-based (e.g., cards)

  • Knowledge-based (e.g., passwords)

  • Biometric-based (e.g., fingerprints)

36
New cards

What are passive and active identification devices

  • Passive: Physical keys.

  • Active: RFID/NFC cards, Smartcards.

37
New cards

How do smartcards improve authentication?

Compute a response to a challenge from the server to authenticate securely.

38
New cards

What are common challenges with password-based authentication?

  • Need to balance memorability and security.

  • Risk of writing down or reusing passwords.

39
New cards

How does password length impact security?

Longer passwords increase the total combinations, making brute force attacks harder.

40
New cards

Common classical password attack strategies?

  • Dictionary attacks (common words).

  • Default password guessing (preset credentials).

  • Joe accounts (username = password).

  • Finger attacks (using personal info like birthdates).

41
New cards

What security trade-offs exist with complex password policies?

Complex passwords are safer but harder to remember, increasing risk of unsafe practices (e.g., writing them down).

42
New cards

Why is cryptographic security considered "practically unbreakable"?

It is theoretically breakable, but would take millions of years with current technology

43
New cards

What is a buffer overflow attack?

Occurs when more data is written to a buffer than it can hold, overwriting adjacent memory.

44
New cards

How do attackers exploit buffer overflows?

Overflow buffers to overwrite memory like function pointers and redirect execution toward malicious payloads.

45
New cards

Why are buffer overflows dangerous?

Can cause remote command execution, unauthorized data access, system crashes.

46
New cards

Which programming languages are most vulnerable to buffer overflow?

C and C++ (no built-in protections).

47
New cards

What safer languages provide built-in memory protection?

PERL, Java, JavaScript, C#.

48
New cards

What is a stack-based buffer overflow?

An attack that overwrites a function’s return address stored in the stack memory.

49
New cards

How does the Stack Canary method prevent buffer overflow attacks?

  • A random canary value is placed before the return address.

  • If the canary changes, the program detects an attack and terminates.

50
New cards

What is an integer overflow attack?

Happens when a computed number exceeds storage limits, causing incorrect values and vulnerabilities.

51
New cards

What causes integer overflow?

  • Fixed-length numbers (8, 16, 32, 64-bit)

  • Unchecked arithmetic operations

  • No built-in overflow detection in C.

52
New cards

How do attackers exploit integer overflow?

Input large values to cause overflow, leading to incorrect memory allocation, system crashes, or data corruption.

53
New cards

Example of a wrap-around error?

Adding 1 to 65,535 (max 16-bit unsigned int) wraps around to 0.

54
New cards

What is an insider attack?

Threats from individuals with legitimate access, misusing their privileges.

55
New cards

Types of insider attacks?

  • Privilege escalation

  • Abuse of access rights

  • Logic bombs, backdoors, login spoofing

56
New cards

What is a logic bomb?

Malicious code triggered by specific events (dates, actions) to cause system damage.

57
New cards

Why are logic bombs hard to detect?

They remain dormant until triggered and attackers destroy evidence after activation

58
New cards

What is a backdoor?

A hidden access point bypassing normal authentication, used for unauthorized system control.

59
New cards

Example of a backdoor?

A login system that grants access if the username is "ZZZZZ" regardless of password validity.

60
New cards

What is login spoofing?

A fake login page captures user credentials and forwards them to attackers.

61
New cards

Why is login spoofing dangerous?

  • Users are unaware their credentials are stolen.

  • Attackers gain full access to victim accounts.

62
New cards

Key prevention strategies for insider threats?

  • Thorough vetting during hiring.

  • Security monitoring of employee activities.

  • Legal and contractual safeguards.