Chapter 6 - 6.2.4

studied byStudied by 0 people
0.0(0)
Get a hint
Hint

Multi-program execution

1 / 18

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

19 Terms

1

Multi-program execution

Machines that can run more than one program simultaneously, raising the need for protection mechanisms to prevent interference between programs.

New cards
2

Access controls

Security measures at the application level that enforce domain-specific policies, such as restricting bank staff from viewing account details without proper authentication.

New cards
3

Middleware

Software that acts as a bridge between applications and databases, enforcing protection properties for data access.

New cards
4

Android app isolation

The operating system treats apps from different companies as separate users, protecting their data from each other.

New cards
5

Discretionary Access Control (DAC)

A protection mechanism where access rights are determined by the machine operator.

New cards
6

Mandatory Access Control (MAC)

A protection mechanism controlled by the vendor, safeguarding the operating system from malware modifications.

New cards
7

Protection domain

A set of processes or threads that share access to the same resources, rather than focusing on individual programs.

New cards
8

Access control matrices

Tools for implementing and modeling protection mechanisms, but can become unwieldy in large organizations.

New cards
9

Groups vs

Groups are lists of principals, while roles are fixed sets of access permissions that can be assumed by principals.

New cards
10

Access Control List (ACL)

A method of storing access rights column-wise, commonly used in Unix systems for managing file security.

New cards
11

ACL advantages

Simple implementation and user-managed file security, widely adopted in Unix-based systems.

New cards
12

ACL disadvantages

Inefficient for runtime security checks and tedious for auditing user access across many files.

New cards
13

Unix file permissions

Files have read, write, and execute attributes for owner, group, and world, with root having unrestricted access.

New cards
14

Set-user-id (suid)

A file attribute allowing a program to run with the privileges of its owner, which can lead to security vulnerabilities if misused.

New cards
15

Stateful access rules

Rules that complicate user revocation and tracking of file access, especially after termination.

New cards
16

Capability-based protection

A system where rights can be delegated easily, improving runtime security checks compared to ACLs.

New cards
17

IBM AS/400

A system that popularized capability-based protection in the mainstream computing market.

New cards
18

Public key certificates

Cryptographic tools that function as capabilities, allowing secure access delegation.

New cards
19

Trust relationships

The alignment of system trust with real-world trust dynamics to enhance security and reliability in access control.

New cards

Explore top notes

note Note
studied byStudied by 36 people
... ago
5.0(1)
note Note
studied byStudied by 12 people
... ago
5.0(1)
note Note
studied byStudied by 9 people
... ago
5.0(1)
note Note
studied byStudied by 18 people
... ago
5.0(2)
note Note
studied byStudied by 57 people
... ago
5.0(1)
note Note
studied byStudied by 19 people
... ago
5.0(3)
note Note
studied byStudied by 19 people
... ago
5.0(2)
note Note
studied byStudied by 136 people
... ago
5.0(2)

Explore top flashcards

flashcards Flashcard (51)
studied byStudied by 13 people
... ago
5.0(1)
flashcards Flashcard (27)
studied byStudied by 32 people
... ago
5.0(2)
flashcards Flashcard (51)
studied byStudied by 45 people
... ago
4.5(6)
flashcards Flashcard (70)
studied byStudied by 5 people
... ago
5.0(1)
flashcards Flashcard (32)
studied byStudied by 13 people
... ago
5.0(1)
flashcards Flashcard (20)
studied byStudied by 7 people
... ago
5.0(1)
flashcards Flashcard (38)
studied byStudied by 11 people
... ago
5.0(1)
flashcards Flashcard (20)
studied byStudied by 94 people
... ago
5.0(2)
robot