Cyber Security TM256 - Systems Security Block 2

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following is NOT a key security objective of authentication?

  • Confidentiality
  • Integrity
  • Performance (correct)
  • Availability

Multi-Factor Authentication enhances the security of authentication processes.

True (A)

What is the primary purpose of authentication mechanisms?

To verify the identity of an entity accessing a resource in a system.

Passwords are a basic element of approaches to __________.

<p>authentication</p> Signup and view all the answers

Match the following authentication types with their definitions:

<p>Multi-Factor Authentication = Uses two or more verification methods Mandatory Access Control = Access decisions are made by a system-admin Discretionary Access Control = Resource owner decides who can access Role-Based Access Control = Access based on user roles in the organization</p> Signup and view all the answers

Which of the following policies can help prevent compromises of password security?

<p>Implementing password complexity requirements (C)</p> Signup and view all the answers

Establishing accountability does not involve data collection.

<p>False (B)</p> Signup and view all the answers

Name one challenge associated with accountability in systems security.

<p>Log storage and management.</p> Signup and view all the answers

What is the minimum password length typically recommended by password policies?

<p>8 characters (B)</p> Signup and view all the answers

A master password is not required for accessing password management applications.

<p>False (B)</p> Signup and view all the answers

What is the purpose of Two-Factor Authentication (2FA)?

<p>To provide an additional layer of security by requiring a username and password plus confidential information.</p> Signup and view all the answers

Password management applications can help prevent the ________ of previous passwords.

<p>reuse</p> Signup and view all the answers

Which of the following is NOT a functionality of password management applications?

<p>Locking out all users immediately (C)</p> Signup and view all the answers

Match the following types of attacks with their descriptions:

<p>Brute-Force Attack = Systematic guessing of passwords to gain entry Dictionary Attack = Using a predefined list of words to attempt to access accounts Denial of Service (DoS) = Blocking legitimate users from accessing a service Multi-Factor Authentication = Using multiple methods to verify user identity</p> Signup and view all the answers

Users can employ _____ applications to safely manage their passwords.

<p>management</p> Signup and view all the answers

What measures can be taken to counter multiple failed login attempts?

<p>Implement a timeout period to prevent further login attempts.</p> Signup and view all the answers

What is the main advantage of Role-Based Access Control (RBAC)?

<p>It allows automatic assignment of permissions based on roles. (A)</p> Signup and view all the answers

RBAC is less suitable for small organizations due to the labor involved in managing roles.

<p>True (A)</p> Signup and view all the answers

What does DAC stand for in access control models?

<p>Discretionary Access Control</p> Signup and view all the answers

Under RBAC, every user is associated with one or more identified ______.

<p>roles</p> Signup and view all the answers

What is a primary function of a reference monitor?

<p>To enforce access control policies over subjects and objects. (D)</p> Signup and view all the answers

Match the following concepts with their descriptions:

<p>RBAC = Access control model based on user roles DAC = Access control model allowing user discretion Role Hierarchy = Structure where child roles inherit parent roles Reference Monitor = Enforces access control policies over subjects and objects</p> Signup and view all the answers

A child role in a role hierarchy does not inherit transactions from its parent role.

<p>False (B)</p> Signup and view all the answers

One potential disadvantage of RBAC is the occurrence of ______ explosion.

<p>role</p> Signup and view all the answers

What is the primary role of an operating system (OS)?

<p>To manage hardware resources and processes (B)</p> Signup and view all the answers

A monolithic operating system has all components within a trusted boundary.

<p>True (A)</p> Signup and view all the answers

What are two techniques used by operating systems to protect critical data?

<p>Access control and encryption</p> Signup and view all the answers

The core OS, known as the ______, provides essential services to manage hardware resources.

<p>kernel</p> Signup and view all the answers

Match the following operating system types with their characteristics:

<p>Basic Operating System = All components within a trusted boundary Monolithic Operating System = Components are separated into the kernel Access Control = Technique to protect resources Encryption = Technique to secure data</p> Signup and view all the answers

Which of the following is NOT a component of operating system security?

<p>Data analysis (D)</p> Signup and view all the answers

The security of an operating system is only important for the protection of the device itself.

<p>False (B)</p> Signup and view all the answers

What is essential for controlling access to files and devices within an OS?

<p>Access control</p> Signup and view all the answers

Which of the following is a high-level principle of security control?

<p>Confidentiality (D)</p> Signup and view all the answers

Server hardening is the process of enhancing a server’s performance and speed.

<p>False (B)</p> Signup and view all the answers

What command is commonly used in Red Hat Linux to ensure the system is fully updated?

<p>yum update</p> Signup and view all the answers

The process of securing low-level system areas, such as booting and CPU protection, is referred to as __________.

<p>low-level operating system hardening</p> Signup and view all the answers

Match the following server hardening activities with their descriptions:

<p>Replacing the root user account = Enhancing root account security Creating a password policy in Linux = Establishing rules for password complexity Blocking ports that are not required = Improving network security Removing services that are not required = Reducing attack surfaces</p> Signup and view all the answers

Which of the following commands is useful to block unnecessary ports on a Linux server?

<p>iptables (A)</p> Signup and view all the answers

Regular updates to software on a server can significantly reduce security risks.

<p>True (A)</p> Signup and view all the answers

What is the primary purpose of creating a password policy in Linux?

<p>To enforce strong password standards and improve security.</p> Signup and view all the answers

What defines a monolithic operating system?

<p>All OS functions are combined within a single trust boundary. (C)</p> Signup and view all the answers

Multi-server operating systems do not require inter-process communication between components.

<p>False (B)</p> Signup and view all the answers

What is the primary function of a hypervisor in an operating system?

<p>Resource management and scheduling.</p> Signup and view all the answers

In a hypervisor-based operating system, a ________ represents a single user account or group project.

<p>tenant</p> Signup and view all the answers

Which of the following is a characteristic of multi-server operating systems?

<p>They can integrate additional security mechanisms within components. (B)</p> Signup and view all the answers

In a multi-server operating system, applications can easily interact without any communication mechanism.

<p>False (B)</p> Signup and view all the answers

What security objectives are ensured by preventing tenant access to each other's resources?

<p>Confidentiality and availability.</p> Signup and view all the answers

Flashcards

Authentication

Verifying the identity of a user, process, or device accessing a system resource.

Password policies

Rules for creating and using passwords to improve security.

Multi-Factor Authentication

Authentication requiring multiple verification steps (e.g., password, token).

Authorization

Determining what an authenticated entity is permitted to access or do.

Signup and view all the flashcards

Mandatory Access Control

Authorization based on the security level of the user and the object.

Signup and view all the flashcards

Discretionary Access Control

Authorization based on the owner's decision to share.

Signup and view all the flashcards

Role-Based Access Control

Authorization based on job roles, granting access based on roles.

Signup and view all the flashcards

Accountability

Ensuring that actions performed by users or systems are traceable.

Signup and view all the flashcards

Password Length

The minimum number of characters a password must contain.

Signup and view all the flashcards

Password Mix

Requirements for a password to include different types of characters (alphabetic, numeric, symbols).

Signup and view all the flashcards

Password Lifetime

The period of time a password is valid before it needs to be changed.

Signup and view all the flashcards

Password Management App

Software used to securely store and manage multiple passwords.

Signup and view all the flashcards

Multi-Factor Authentication (MFA)

A security method requiring two or more authentication factors.

Signup and view all the flashcards

Brute-Force Attack

An attack that tries many password combinations until successful.

Signup and view all the flashcards

Denial-of-Service (DoS) Attack

An attack that overwhelms a system, preventing legitimate users from accessing it.

Signup and view all the flashcards

DAC

Discretionary Access Control allows users to set fine-grained access rules to objects.

Signup and view all the flashcards

RBAC

Role-Based Access Control manages access through roles, connecting users to specific actions on objects.

Signup and view all the flashcards

Role Hierarchy

A hierarchical structure of roles where child roles inherit parent roles' permissions and have additional actions.

Signup and view all the flashcards

Reference Monitor

A security component that validates access requests, ensuring access control policies are followed.

Signup and view all the flashcards

Access Control Rule

A set of criteria which enables or prevents a subject (user) from acting upon an object.

Signup and view all the flashcards

Role Explosion

In RBAC, the issue of a large number of roles making management complex.

Signup and view all the flashcards

Transaction

A combination of an object and an action that represents authorized user activity on system resources.

Signup and view all the flashcards

What is an Operating System (OS)?

An operating system manages a device's memory, processes, and provides a platform for applications to run.

Signup and view all the flashcards

Why is OS security crucial?

An insecure OS can compromise the entire device, applications, and data, potentially giving attackers access to other networked resources.

Signup and view all the flashcards

What does the OS kernel do?

The kernel provides core services, manages hardware resources, and enforces security measures like access control.

Signup and view all the flashcards

Trusted Boundary

A secure area in a basic OS where all components and users are authenticated and authorized to access the entire system.

Signup and view all the flashcards

Single Domain Design

A basic OS design where all system components are accessible to all users and applications. Less secure.

Signup and view all the flashcards

Monolithic OS Kernel

The central core of a monolithic OS that runs with higher privileges than user applications, providing separation and security.

Signup and view all the flashcards

What is the benefit of kernel separation in a Monolithic OS?

It provides more isolation and security by preventing user applications from directly accessing critical system components.

Signup and view all the flashcards

How did OS designs evolve?

OSs evolved from single-domain designs with less security to more separated designs with a kernel to improve security.

Signup and view all the flashcards

Monolithic OS

An operating system where all functions are combined within a single security boundary, accessible only by the administrator. Applications are isolated outside this boundary and have controlled access to resources.

Signup and view all the flashcards

Multi-server OS

An OS where each component (like the scheduler, memory manager, etc.) has its own security boundary, requiring inter-process communication (IPC) to interact.

Signup and view all the flashcards

Hypervisor

The core management component in a hypervisor-based OS, responsible for resource management (memory, networking, disk) and providing an interface between the hardware and software components.

Signup and view all the flashcards

Tenant

A user account or group representing a project, allocated with resources to create virtual environments within a hypervisor-based OS.

Signup and view all the flashcards

Virtual machine

A software environment emulated by a hypervisor, allowing users to run different operating systems or applications on the same physical hardware.

Signup and view all the flashcards

Inter-Process Communication (IPC)

The mechanism by which different processes or components within an OS (especially in multi-server OS) communicate and exchange information.

Signup and view all the flashcards

Virtual resources

Resources like memory, storage, and networking, emulated and managed by a hypervisor, accessible to tenants and their virtual machines within a hypervisor-based system.

Signup and view all the flashcards

Server Hardening

The process of securing a system's configuration and settings to reduce vulnerabilities.

Signup and view all the flashcards

Linux Server Hardening

Securing a Linux server by updating software, implementing password policies, removing unnecessary services, and blocking ports.

Signup and view all the flashcards

Windows Server Hardening

Securing a Windows server by implementing password policies, using security scanning tools like Windows Defender, and removing unnecessary software.

Signup and view all the flashcards

Yum Update

A Linux command used to update software on a Red Hat system.

Signup and view all the flashcards

BIOS (Basic Input/Output System)

Firmware responsible for managing the start-up process of hardware components and loading the operating system.

Signup and view all the flashcards

Low-Level Operating System Hardening

Securing low-level areas like the boot process, memory, and CPU to prevent attacks.

Signup and view all the flashcards

Confidentiality

Protecting information from unauthorized disclosure, ensuring only authorized individuals can access it.

Signup and view all the flashcards

Integrity

Ensuring information is accurate and complete, preventing unauthorized modifications.

Signup and view all the flashcards

Study Notes

Cyber Security TM256 - Block 2: Systems Security

  • Course offered by Dr. Ahmed Mahfouz at AOU, Oman

  • Part 5: Authentication, authorization, and accountability

    • Authentication: verifying entity identity
    • Password policies: crucial for security
    • Multi-Factor Authentication (2FA): uses username/password & another factor
    • Authorization: right to access system resources
      • Access control models
        • Mandatory Access Control (MAC)
        • Discretionary Access Control (DAC)
        • Role-Based Access Control (RBAC)
    • Accountability: tracking security-relevant actions
      • Establishing accountability: recording events
      • Data collection: mechanisms to record information
      • Log storage and management: maintaining logs
      • Logging obligations: GDPR requirements for logging personal data
  • Part 6: Operating system security

    • Overview of operating systems: fundamental to managing device processes
    • Operating system architecture
      • Basic operating systems
      • Monolithic operating systems
      • Multi-server operating systems
      • Hypervisor-based operating systems
    • Principles of operating system security: confidentiality, integrity, availability
    • Server hardening: securing a system's configuration
      • Keeping Linux up-to-date: using yum command, maintaining software lists, updating and deleting software
      • Server hardening activities: replacing root user account, creating password policies, removing unnecessary services, blocking ports, using scanning tools
    • Low-level operating system hardening: securing low-level areas like booting, memory & CPU
      • Implementing UEFI, establishing trust, testing hardware, selecting boot device, starting OS
  • Learning Outcomes

    • Understand theory and practice of systems security, including threats, controls, and policies
    • Identify threats and vulnerabilities and develop security controls
    • Effectively communicate and analyze problems within a computer environment
    • Stay updated with cyber security developments

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Use Quizgecko on...
Browser
Browser