Podcast
Questions and Answers
What happens once a process changes its user ID from root (ID 0) to another user ID?
What happens once a process changes its user ID from root (ID 0) to another user ID?
- It can continue running with the new user ID. (correct)
- It loses access to all files.
- It can revert back to root ID.
- It becomes a regular process without elevated privileges.
A user account grants administrative privileges by default.
A user account grants administrative privileges by default.
False (B)
Name one important file that contains user password information.
Name one important file that contains user password information.
/etc/shadow
The ______ protocol is a challenge-response authentication method used to verify user identities.
The ______ protocol is a challenge-response authentication method used to verify user identities.
Match the following authentication protocols with their description:
Match the following authentication protocols with their description:
What does the term 'pass the hash' refer to?
What does the term 'pass the hash' refer to?
Kerberos is the only authentication protocol supported in larger Windows networks.
Kerberos is the only authentication protocol supported in larger Windows networks.
What is the primary function of Pluggable Authentication Modules (PAM)?
What is the primary function of Pluggable Authentication Modules (PAM)?
The activity of user authentication in PAM includes mechanisms like passwords, tokens, and ______.
The activity of user authentication in PAM includes mechanisms like passwords, tokens, and ______.
Match the PAM activities with their descriptions:
Match the PAM activities with their descriptions:
What flag is used to indicate the highest privilege level in a protection ring model?
What flag is used to indicate the highest privilege level in a protection ring model?
Ring 3 allows direct interaction with the physical hardware.
Ring 3 allows direct interaction with the physical hardware.
What is the process called that determines if an entity is allowed access to a resource?
What is the process called that determines if an entity is allowed access to a resource?
A system call is a request from user space to the OS to perform a certain ___.
A system call is a request from user space to the OS to perform a certain ___.
Match the following PAM control flags with their descriptions:
Match the following PAM control flags with their descriptions:
Which of the following is NOT a type of system call?
Which of the following is NOT a type of system call?
To execute a ring 0 instruction from ring 3, a SIGILL (illegal instruction) occurs.
To execute a ring 0 instruction from ring 3, a SIGILL (illegal instruction) occurs.
Name two examples of operations that can be performed by system calls.
Name two examples of operations that can be performed by system calls.
What is a primary characteristic of viruses?
What is a primary characteristic of viruses?
Trojans are self-replicating malware programs.
Trojans are self-replicating malware programs.
What is the term for malware that runs at the kernel level to hide its presence?
What is the term for malware that runs at the kernel level to hide its presence?
A malware type known for encrypting data and demanding ransom is called ______.
A malware type known for encrypting data and demanding ransom is called ______.
Match the following types of malware with their descriptions:
Match the following types of malware with their descriptions:
What is the primary responsibility of the Trusted Code Base (TCB)?
What is the primary responsibility of the Trusted Code Base (TCB)?
Which of the following methods do worms primarily use to spread?
Which of the following methods do worms primarily use to spread?
Loadable kernel modules can execute sequentially and perform automatic cleanup.
Loadable kernel modules can execute sequentially and perform automatic cleanup.
Signature-based detection of malware is effective at detecting zero-day malware.
Signature-based detection of malware is effective at detecting zero-day malware.
What is the main advantage of using loadable kernel modules?
What is the main advantage of using loadable kernel modules?
What is one possible countermeasure to combat rootkits?
What is one possible countermeasure to combat rootkits?
In Unix, persistent data on background storage is organized in ______.
In Unix, persistent data on background storage is organized in ______.
The primary function of ______ is to disable the usual functioning of a computer until a demanded payment is made.
The primary function of ______ is to disable the usual functioning of a computer until a demanded payment is made.
Match the following file-related syscalls with their functions:
Match the following file-related syscalls with their functions:
What is a significant drawback of antivirus software?
What is a significant drawback of antivirus software?
Which of the following statements is true regarding file descriptors?
Which of the following statements is true regarding file descriptors?
Behavior-based malware detection is fully reliable for newly developed malware.
Behavior-based malware detection is fully reliable for newly developed malware.
Access Control allows unrestricted access to resources.
Access Control allows unrestricted access to resources.
What type of malware is characterized by modifying its appearance to avoid detection?
What type of malware is characterized by modifying its appearance to avoid detection?
What is the purpose of the access() syscall?
What is the purpose of the access() syscall?
The ______ hierarchy organizes files in Unix.
The ______ hierarchy organizes files in Unix.
Bootkits are installed in the ______ of the hard drive to ensure re-infection at each reboot.
Bootkits are installed in the ______ of the hard drive to ensure re-infection at each reboot.
Match the malware detection techniques with their descriptions:
Match the malware detection techniques with their descriptions:
Which of the following file descriptors represents standard output?
Which of the following file descriptors represents standard output?
The file system in Unix operates in user space.
The file system in Unix operates in user space.
What do loadable kernel modules allow the kernel to do?
What do loadable kernel modules allow the kernel to do?
Match the following concepts with their meanings:
Match the following concepts with their meanings:
Which command is used to manually load a kernel module into the kernel?
Which command is used to manually load a kernel module into the kernel?
Everything in Unix is represented as a file.
Everything in Unix is represented as a file.
What does the Biba model primarily protect?
What does the Biba model primarily protect?
In the Biba model, a subject is allowed to read objects below its integrity level.
In the Biba model, a subject is allowed to read objects below its integrity level.
What security context format is used in type enforcement?
What security context format is used in type enforcement?
The __________ allows multiple isolated user-space instances to run on a single host OS.
The __________ allows multiple isolated user-space instances to run on a single host OS.
Match the following virtualization methods to their descriptions:
Match the following virtualization methods to their descriptions:
Which of the following is a disadvantage of using LSM (Linux Security Modules)?
Which of the following is a disadvantage of using LSM (Linux Security Modules)?
The chroot command changes the working directory for a process.
The chroot command changes the working directory for a process.
Identify the two types of mounts in the context of namespaces.
Identify the two types of mounts in the context of namespaces.
Application isolation in Android is enforced through __________ and __________.
Application isolation in Android is enforced through __________ and __________.
Which component of the Android Application Framework provides user interfaces?
Which component of the Android Application Framework provides user interfaces?
Unprivileged containers map container user root to host’s user root.
Unprivileged containers map container user root to host’s user root.
What is the purpose of the Android Security Framework's permission framework?
What is the purpose of the Android Security Framework's permission framework?
In type enforcement, access must be explicitly granted by __________.
In type enforcement, access must be explicitly granted by __________.
Which of the following is NOT a characteristic of OS-level virtualization?
Which of the following is NOT a characteristic of OS-level virtualization?
Flashcards
Root Account
Root Account
A user account with the highest privileges, allowing access to modify any file and impersonate any other user.
Classical Unix Authentication
Classical Unix Authentication
A system in which users provide their password to authenticate, and the system verifies it by comparing the provided password with a hashed version stored in a file.
Centralized Authentication
Centralized Authentication
A network-based authentication system where user information is centrally stored, allowing users to access any machine on the network with a single login.
NTLM Authentication Protocol
NTLM Authentication Protocol
Signup and view all the flashcards
Root Account Security
Root Account Security
Signup and view all the flashcards
Pass-the-Hash Attack
Pass-the-Hash Attack
Signup and view all the flashcards
Kerberos
Kerberos
Signup and view all the flashcards
NTLM
NTLM
Signup and view all the flashcards
Pluggable Authentication Modules (PAM)
Pluggable Authentication Modules (PAM)
Signup and view all the flashcards
PAM 'Auth' Activity
PAM 'Auth' Activity
Signup and view all the flashcards
Authorization
Authorization
Signup and view all the flashcards
Protection Rings
Protection Rings
Signup and view all the flashcards
System Calls
System Calls
Signup and view all the flashcards
PAM (Pluggable Authentication Modules)
PAM (Pluggable Authentication Modules)
Signup and view all the flashcards
Process Control
Process Control
Signup and view all the flashcards
File Management
File Management
Signup and view all the flashcards
Device Management
Device Management
Signup and view all the flashcards
Session
Session
Signup and view all the flashcards
Trusted Code Base (TCB)
Trusted Code Base (TCB)
Signup and view all the flashcards
Loadable Kernel Modules
Loadable Kernel Modules
Signup and view all the flashcards
Virtual File System
Virtual File System
Signup and view all the flashcards
File Descriptor
File Descriptor
Signup and view all the flashcards
Access Control
Access Control
Signup and view all the flashcards
Security Context
Security Context
Signup and view all the flashcards
File Permissions
File Permissions
Signup and view all the flashcards
Code Verification
Code Verification
Signup and view all the flashcards
Everything is a file abstraction
Everything is a file abstraction
Signup and view all the flashcards
File Descriptor Leak
File Descriptor Leak
Signup and view all the flashcards
Permission checking
Permission checking
Signup and view all the flashcards
Standard Input (stdin)
Standard Input (stdin)
Signup and view all the flashcards
Standard Output (stdout)
Standard Output (stdout)
Signup and view all the flashcards
Standard Error (stderr)
Standard Error (stderr)
Signup and view all the flashcards
Virus
Virus
Signup and view all the flashcards
Worm
Worm
Signup and view all the flashcards
Trojan
Trojan
Signup and view all the flashcards
Rootkit
Rootkit
Signup and view all the flashcards
Damage Routine
Damage Routine
Signup and view all the flashcards
Ransomware
Ransomware
Signup and view all the flashcards
Spyware
Spyware
Signup and view all the flashcards
Targeted Malware
Targeted Malware
Signup and view all the flashcards
Digital Vandalism
Digital Vandalism
Signup and view all the flashcards
Malware Detection
Malware Detection
Signup and view all the flashcards
Signature-based malware detection
Signature-based malware detection
Signup and view all the flashcards
Code Polymorphism
Code Polymorphism
Signup and view all the flashcards
Packers
Packers
Signup and view all the flashcards
Behavior-based malware detection
Behavior-based malware detection
Signup and view all the flashcards
Antivirus Software
Antivirus Software
Signup and view all the flashcards
Simple Integrity
Simple Integrity
Signup and view all the flashcards
The Integrity Property
The Integrity Property
Signup and view all the flashcards
Linux Security Modules (LSM)
Linux Security Modules (LSM)
Signup and view all the flashcards
Type Enforcement
Type Enforcement
Signup and view all the flashcards
chroot Jail
chroot Jail
Signup and view all the flashcards
OS-level virtualization
OS-level virtualization
Signup and view all the flashcards
Emulation
Emulation
Signup and view all the flashcards
Software full virtualization
Software full virtualization
Signup and view all the flashcards
Paravirtualization
Paravirtualization
Signup and view all the flashcards
Hardware Full Virtualization
Hardware Full Virtualization
Signup and view all the flashcards
Linux Containers (LXC)
Linux Containers (LXC)
Signup and view all the flashcards
Namespaces
Namespaces
Signup and view all the flashcards
Control groups (cgroups)
Control groups (cgroups)
Signup and view all the flashcards
Android Runtime
Android Runtime
Signup and view all the flashcards
Android Security Framework
Android Security Framework
Signup and view all the flashcards
Study Notes
Authentication
- Authentication is the process of verifying the identity of an entity.
- Operating systems manage access to resources.
- Authentication ensures that the entity is who they claim to be.
- Typical authentication methods include:
- Something you know (passwords, challenge-responses)
- Something you are (biometrics like fingerprints)
- Something you have (tokens, smartcards)
- Multifactor authentication combines multiple methods.
- Authentication failures can lead to impersonation.
Unix Users
- Root accounts are superusers with user ID 0.
- Root processes handle system boot, user authentication, administration, and network services.
- Root accesses and modifies permission on all files.
- Root processes can impersonate any other user, changing their User IDs.
- This process cannot be reversed.
Authentication Over Networks
- Large networks centralize user information.
- Users can log in to any machine.
- Various protocols exist (example: challenge-response).
- Centralized login servers can be vulnerable to failure.
Pluggable Authentication Modules (PAM)
- PAM allows programs to use a central authentication mechanism (rather than each program handling authentication independently).
- This centralization improves security and reduces complexity.
- PAM is a library that provides a common interface for multiple programs to access the same authentication system.
Authorization
-
Authorization determines if entity X is permitted to access resource Y.
-
Operating systems need to control access to resources.
-
Different privilege levels (rings) control access (ring 0 being the highest privilege).
-
Non-privileged code must request an operation from the Operating System if it needs to access privileged resources.
-
Privileged code can directly access resources.
-
System calls are used for transitions between ring 3 and ring 0.
File Systems in Unix
- Data on storage devices is structured logically as files.
- Files include names and information like access and modification times.
- Files are organized in a directory hierarchy.
- The file system maps logical information to physical storage on a device.
- System calls are used to access and manipulate files.
Access Control
- Access control (AC) is the selective restriction of resource access.
- Mechanisms authorize subjects to perform operations on objects.
- A protection system defines the access control specification.
- Reference monitors enforce the specification.
- Protection systems can be discretionary or mandatory.
- Mandatory control restricts access modification.
- Discretionary control allows users to manage their own access.
Protection model: matching
- Processes need to match the file's owner, a group ID within the group of the file or use other permissions.
Setuid
- Setuid allows a program to be run with the permissions of the file owner, which can permit operations that the user shouldn't normally be allowed.
- A program that is designed to have the permissions of the user who owns the program's executable needs very careful design.
Memory
- Processes use virtual addresses, not physical memory addresses.
- This process is managed by a Memory Management Unit (MMU).
- Virtual memory addresses are mapped to physical addresses by MMU, using a Page Table. This mapping is cached in the Translation Lookaside Buffer (TLB).
- Memory is segmented into fixed-size pages.
- Processes use virtual addresses, and the abstraction of the OS memory system simplifies accessing the memory system.
- Memory access control prevents improper access attempts.
Malware Detection
- Antivirus techniques and strategies will be discussed.
- Methods like signature-based detection (looking for known malicious patterns) and behavior-based detection (monitoring unusual activities) are used.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.