Podcast
Questions and Answers
What happens once a process changes its user ID from root (ID 0) to another user ID?
What happens once a process changes its user ID from root (ID 0) to another user ID?
A user account grants administrative privileges by default.
A user account grants administrative privileges by default.
False
Name one important file that contains user password information.
Name one important file that contains user password information.
/etc/shadow
The ______ protocol is a challenge-response authentication method used to verify user identities.
The ______ protocol is a challenge-response authentication method used to verify user identities.
Signup and view all the answers
Match the following authentication protocols with their description:
Match the following authentication protocols with their description:
Signup and view all the answers
What does the term 'pass the hash' refer to?
What does the term 'pass the hash' refer to?
Signup and view all the answers
Kerberos is the only authentication protocol supported in larger Windows networks.
Kerberos is the only authentication protocol supported in larger Windows networks.
Signup and view all the answers
What is the primary function of Pluggable Authentication Modules (PAM)?
What is the primary function of Pluggable Authentication Modules (PAM)?
Signup and view all the answers
The activity of user authentication in PAM includes mechanisms like passwords, tokens, and ______.
The activity of user authentication in PAM includes mechanisms like passwords, tokens, and ______.
Signup and view all the answers
Match the PAM activities with their descriptions:
Match the PAM activities with their descriptions:
Signup and view all the answers
What flag is used to indicate the highest privilege level in a protection ring model?
What flag is used to indicate the highest privilege level in a protection ring model?
Signup and view all the answers
Ring 3 allows direct interaction with the physical hardware.
Ring 3 allows direct interaction with the physical hardware.
Signup and view all the answers
What is the process called that determines if an entity is allowed access to a resource?
What is the process called that determines if an entity is allowed access to a resource?
Signup and view all the answers
A system call is a request from user space to the OS to perform a certain ___.
A system call is a request from user space to the OS to perform a certain ___.
Signup and view all the answers
Match the following PAM control flags with their descriptions:
Match the following PAM control flags with their descriptions:
Signup and view all the answers
Which of the following is NOT a type of system call?
Which of the following is NOT a type of system call?
Signup and view all the answers
To execute a ring 0 instruction from ring 3, a SIGILL (illegal instruction) occurs.
To execute a ring 0 instruction from ring 3, a SIGILL (illegal instruction) occurs.
Signup and view all the answers
Name two examples of operations that can be performed by system calls.
Name two examples of operations that can be performed by system calls.
Signup and view all the answers
What is a primary characteristic of viruses?
What is a primary characteristic of viruses?
Signup and view all the answers
Trojans are self-replicating malware programs.
Trojans are self-replicating malware programs.
Signup and view all the answers
What is the term for malware that runs at the kernel level to hide its presence?
What is the term for malware that runs at the kernel level to hide its presence?
Signup and view all the answers
A malware type known for encrypting data and demanding ransom is called ______.
A malware type known for encrypting data and demanding ransom is called ______.
Signup and view all the answers
Match the following types of malware with their descriptions:
Match the following types of malware with their descriptions:
Signup and view all the answers
What is the primary responsibility of the Trusted Code Base (TCB)?
What is the primary responsibility of the Trusted Code Base (TCB)?
Signup and view all the answers
Which of the following methods do worms primarily use to spread?
Which of the following methods do worms primarily use to spread?
Signup and view all the answers
Loadable kernel modules can execute sequentially and perform automatic cleanup.
Loadable kernel modules can execute sequentially and perform automatic cleanup.
Signup and view all the answers
Signature-based detection of malware is effective at detecting zero-day malware.
Signature-based detection of malware is effective at detecting zero-day malware.
Signup and view all the answers
What is the main advantage of using loadable kernel modules?
What is the main advantage of using loadable kernel modules?
Signup and view all the answers
What is one possible countermeasure to combat rootkits?
What is one possible countermeasure to combat rootkits?
Signup and view all the answers
In Unix, persistent data on background storage is organized in ______.
In Unix, persistent data on background storage is organized in ______.
Signup and view all the answers
The primary function of ______ is to disable the usual functioning of a computer until a demanded payment is made.
The primary function of ______ is to disable the usual functioning of a computer until a demanded payment is made.
Signup and view all the answers
Match the following file-related syscalls with their functions:
Match the following file-related syscalls with their functions:
Signup and view all the answers
What is a significant drawback of antivirus software?
What is a significant drawback of antivirus software?
Signup and view all the answers
Which of the following statements is true regarding file descriptors?
Which of the following statements is true regarding file descriptors?
Signup and view all the answers
Behavior-based malware detection is fully reliable for newly developed malware.
Behavior-based malware detection is fully reliable for newly developed malware.
Signup and view all the answers
Access Control allows unrestricted access to resources.
Access Control allows unrestricted access to resources.
Signup and view all the answers
What type of malware is characterized by modifying its appearance to avoid detection?
What type of malware is characterized by modifying its appearance to avoid detection?
Signup and view all the answers
What is the purpose of the access() syscall?
What is the purpose of the access() syscall?
Signup and view all the answers
The ______ hierarchy organizes files in Unix.
The ______ hierarchy organizes files in Unix.
Signup and view all the answers
Bootkits are installed in the ______ of the hard drive to ensure re-infection at each reboot.
Bootkits are installed in the ______ of the hard drive to ensure re-infection at each reboot.
Signup and view all the answers
Match the malware detection techniques with their descriptions:
Match the malware detection techniques with their descriptions:
Signup and view all the answers
Which of the following file descriptors represents standard output?
Which of the following file descriptors represents standard output?
Signup and view all the answers
The file system in Unix operates in user space.
The file system in Unix operates in user space.
Signup and view all the answers
What do loadable kernel modules allow the kernel to do?
What do loadable kernel modules allow the kernel to do?
Signup and view all the answers
Match the following concepts with their meanings:
Match the following concepts with their meanings:
Signup and view all the answers
Which command is used to manually load a kernel module into the kernel?
Which command is used to manually load a kernel module into the kernel?
Signup and view all the answers
Everything in Unix is represented as a file.
Everything in Unix is represented as a file.
Signup and view all the answers
What does the Biba model primarily protect?
What does the Biba model primarily protect?
Signup and view all the answers
In the Biba model, a subject is allowed to read objects below its integrity level.
In the Biba model, a subject is allowed to read objects below its integrity level.
Signup and view all the answers
What security context format is used in type enforcement?
What security context format is used in type enforcement?
Signup and view all the answers
The __________ allows multiple isolated user-space instances to run on a single host OS.
The __________ allows multiple isolated user-space instances to run on a single host OS.
Signup and view all the answers
Match the following virtualization methods to their descriptions:
Match the following virtualization methods to their descriptions:
Signup and view all the answers
Which of the following is a disadvantage of using LSM (Linux Security Modules)?
Which of the following is a disadvantage of using LSM (Linux Security Modules)?
Signup and view all the answers
The chroot command changes the working directory for a process.
The chroot command changes the working directory for a process.
Signup and view all the answers
Identify the two types of mounts in the context of namespaces.
Identify the two types of mounts in the context of namespaces.
Signup and view all the answers
Application isolation in Android is enforced through __________ and __________.
Application isolation in Android is enforced through __________ and __________.
Signup and view all the answers
Which component of the Android Application Framework provides user interfaces?
Which component of the Android Application Framework provides user interfaces?
Signup and view all the answers
Unprivileged containers map container user root to host’s user root.
Unprivileged containers map container user root to host’s user root.
Signup and view all the answers
What is the purpose of the Android Security Framework's permission framework?
What is the purpose of the Android Security Framework's permission framework?
Signup and view all the answers
In type enforcement, access must be explicitly granted by __________.
In type enforcement, access must be explicitly granted by __________.
Signup and view all the answers
Which of the following is NOT a characteristic of OS-level virtualization?
Which of the following is NOT a characteristic of OS-level virtualization?
Signup and view all the answers
Study Notes
Authentication
- Authentication is the process of verifying the identity of an entity.
- Operating systems manage access to resources.
- Authentication ensures that the entity is who they claim to be.
- Typical authentication methods include:
- Something you know (passwords, challenge-responses)
- Something you are (biometrics like fingerprints)
- Something you have (tokens, smartcards)
- Multifactor authentication combines multiple methods.
- Authentication failures can lead to impersonation.
Unix Users
- Root accounts are superusers with user ID 0.
- Root processes handle system boot, user authentication, administration, and network services.
- Root accesses and modifies permission on all files.
- Root processes can impersonate any other user, changing their User IDs.
- This process cannot be reversed.
Authentication Over Networks
- Large networks centralize user information.
- Users can log in to any machine.
- Various protocols exist (example: challenge-response).
- Centralized login servers can be vulnerable to failure.
Pluggable Authentication Modules (PAM)
- PAM allows programs to use a central authentication mechanism (rather than each program handling authentication independently).
- This centralization improves security and reduces complexity.
- PAM is a library that provides a common interface for multiple programs to access the same authentication system.
Authorization
-
Authorization determines if entity X is permitted to access resource Y.
-
Operating systems need to control access to resources.
-
Different privilege levels (rings) control access (ring 0 being the highest privilege).
-
Non-privileged code must request an operation from the Operating System if it needs to access privileged resources.
-
Privileged code can directly access resources.
-
System calls are used for transitions between ring 3 and ring 0.
File Systems in Unix
- Data on storage devices is structured logically as files.
- Files include names and information like access and modification times.
- Files are organized in a directory hierarchy.
- The file system maps logical information to physical storage on a device.
- System calls are used to access and manipulate files.
Access Control
- Access control (AC) is the selective restriction of resource access.
- Mechanisms authorize subjects to perform operations on objects.
- A protection system defines the access control specification.
- Reference monitors enforce the specification.
- Protection systems can be discretionary or mandatory.
- Mandatory control restricts access modification.
- Discretionary control allows users to manage their own access.
Protection model: matching
- Processes need to match the file's owner, a group ID within the group of the file or use other permissions.
Setuid
- Setuid allows a program to be run with the permissions of the file owner, which can permit operations that the user shouldn't normally be allowed.
- A program that is designed to have the permissions of the user who owns the program's executable needs very careful design.
Memory
- Processes use virtual addresses, not physical memory addresses.
- This process is managed by a Memory Management Unit (MMU).
- Virtual memory addresses are mapped to physical addresses by MMU, using a Page Table. This mapping is cached in the Translation Lookaside Buffer (TLB).
- Memory is segmented into fixed-size pages.
- Processes use virtual addresses, and the abstraction of the OS memory system simplifies accessing the memory system.
- Memory access control prevents improper access attempts.
Malware Detection
- Antivirus techniques and strategies will be discussed.
- Methods like signature-based detection (looking for known malicious patterns) and behavior-based detection (monitoring unusual activities) are used.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Explore the essential concepts of authentication, focusing on the role of Unix users and superuser privileges. This quiz covers methods like passwords and biometrics, as well as the importance of multifactor authentication in network scenarios. Test your knowledge on user identity verification and system administration.