Podcast
Questions and Answers
Which of the following is NOT a key security objective of authentication?
Which of the following is NOT a key security objective of authentication?
- Confidentiality
- Integrity
- Performance (correct)
- Availability
Multi-Factor Authentication enhances the security of authentication processes.
Multi-Factor Authentication enhances the security of authentication processes.
True (A)
What is the primary purpose of authentication mechanisms?
What is the primary purpose of authentication mechanisms?
To verify the identity of an entity accessing a resource in a system.
Passwords are a basic element of approaches to __________.
Passwords are a basic element of approaches to __________.
Match the following authentication types with their definitions:
Match the following authentication types with their definitions:
Which of the following policies can help prevent compromises of password security?
Which of the following policies can help prevent compromises of password security?
Establishing accountability does not involve data collection.
Establishing accountability does not involve data collection.
Name one challenge associated with accountability in systems security.
Name one challenge associated with accountability in systems security.
What is the minimum password length typically recommended by password policies?
What is the minimum password length typically recommended by password policies?
A master password is not required for accessing password management applications.
A master password is not required for accessing password management applications.
What is the purpose of Two-Factor Authentication (2FA)?
What is the purpose of Two-Factor Authentication (2FA)?
Password management applications can help prevent the ________ of previous passwords.
Password management applications can help prevent the ________ of previous passwords.
Which of the following is NOT a functionality of password management applications?
Which of the following is NOT a functionality of password management applications?
Match the following types of attacks with their descriptions:
Match the following types of attacks with their descriptions:
Users can employ _____ applications to safely manage their passwords.
Users can employ _____ applications to safely manage their passwords.
What measures can be taken to counter multiple failed login attempts?
What measures can be taken to counter multiple failed login attempts?
What is the main advantage of Role-Based Access Control (RBAC)?
What is the main advantage of Role-Based Access Control (RBAC)?
RBAC is less suitable for small organizations due to the labor involved in managing roles.
RBAC is less suitable for small organizations due to the labor involved in managing roles.
What does DAC stand for in access control models?
What does DAC stand for in access control models?
Under RBAC, every user is associated with one or more identified ______.
Under RBAC, every user is associated with one or more identified ______.
What is a primary function of a reference monitor?
What is a primary function of a reference monitor?
Match the following concepts with their descriptions:
Match the following concepts with their descriptions:
A child role in a role hierarchy does not inherit transactions from its parent role.
A child role in a role hierarchy does not inherit transactions from its parent role.
One potential disadvantage of RBAC is the occurrence of ______ explosion.
One potential disadvantage of RBAC is the occurrence of ______ explosion.
What is the primary role of an operating system (OS)?
What is the primary role of an operating system (OS)?
A monolithic operating system has all components within a trusted boundary.
A monolithic operating system has all components within a trusted boundary.
What are two techniques used by operating systems to protect critical data?
What are two techniques used by operating systems to protect critical data?
The core OS, known as the ______, provides essential services to manage hardware resources.
The core OS, known as the ______, provides essential services to manage hardware resources.
Match the following operating system types with their characteristics:
Match the following operating system types with their characteristics:
Which of the following is NOT a component of operating system security?
Which of the following is NOT a component of operating system security?
The security of an operating system is only important for the protection of the device itself.
The security of an operating system is only important for the protection of the device itself.
What is essential for controlling access to files and devices within an OS?
What is essential for controlling access to files and devices within an OS?
Which of the following is a high-level principle of security control?
Which of the following is a high-level principle of security control?
Server hardening is the process of enhancing a server’s performance and speed.
Server hardening is the process of enhancing a server’s performance and speed.
What command is commonly used in Red Hat Linux to ensure the system is fully updated?
What command is commonly used in Red Hat Linux to ensure the system is fully updated?
The process of securing low-level system areas, such as booting and CPU protection, is referred to as __________.
The process of securing low-level system areas, such as booting and CPU protection, is referred to as __________.
Match the following server hardening activities with their descriptions:
Match the following server hardening activities with their descriptions:
Which of the following commands is useful to block unnecessary ports on a Linux server?
Which of the following commands is useful to block unnecessary ports on a Linux server?
Regular updates to software on a server can significantly reduce security risks.
Regular updates to software on a server can significantly reduce security risks.
What is the primary purpose of creating a password policy in Linux?
What is the primary purpose of creating a password policy in Linux?
What defines a monolithic operating system?
What defines a monolithic operating system?
Multi-server operating systems do not require inter-process communication between components.
Multi-server operating systems do not require inter-process communication between components.
What is the primary function of a hypervisor in an operating system?
What is the primary function of a hypervisor in an operating system?
In a hypervisor-based operating system, a ________ represents a single user account or group project.
In a hypervisor-based operating system, a ________ represents a single user account or group project.
Which of the following is a characteristic of multi-server operating systems?
Which of the following is a characteristic of multi-server operating systems?
In a multi-server operating system, applications can easily interact without any communication mechanism.
In a multi-server operating system, applications can easily interact without any communication mechanism.
What security objectives are ensured by preventing tenant access to each other's resources?
What security objectives are ensured by preventing tenant access to each other's resources?
Flashcards
Authentication
Authentication
Verifying the identity of a user, process, or device accessing a system resource.
Password policies
Password policies
Rules for creating and using passwords to improve security.
Multi-Factor Authentication
Multi-Factor Authentication
Authentication requiring multiple verification steps (e.g., password, token).
Authorization
Authorization
Signup and view all the flashcards
Mandatory Access Control
Mandatory Access Control
Signup and view all the flashcards
Discretionary Access Control
Discretionary Access Control
Signup and view all the flashcards
Role-Based Access Control
Role-Based Access Control
Signup and view all the flashcards
Accountability
Accountability
Signup and view all the flashcards
Password Length
Password Length
Signup and view all the flashcards
Password Mix
Password Mix
Signup and view all the flashcards
Password Lifetime
Password Lifetime
Signup and view all the flashcards
Password Management App
Password Management App
Signup and view all the flashcards
Multi-Factor Authentication (MFA)
Multi-Factor Authentication (MFA)
Signup and view all the flashcards
Brute-Force Attack
Brute-Force Attack
Signup and view all the flashcards
Denial-of-Service (DoS) Attack
Denial-of-Service (DoS) Attack
Signup and view all the flashcards
DAC
DAC
Signup and view all the flashcards
RBAC
RBAC
Signup and view all the flashcards
Role Hierarchy
Role Hierarchy
Signup and view all the flashcards
Reference Monitor
Reference Monitor
Signup and view all the flashcards
Access Control Rule
Access Control Rule
Signup and view all the flashcards
Role Explosion
Role Explosion
Signup and view all the flashcards
Transaction
Transaction
Signup and view all the flashcards
What is an Operating System (OS)?
What is an Operating System (OS)?
Signup and view all the flashcards
Why is OS security crucial?
Why is OS security crucial?
Signup and view all the flashcards
What does the OS kernel do?
What does the OS kernel do?
Signup and view all the flashcards
Trusted Boundary
Trusted Boundary
Signup and view all the flashcards
Single Domain Design
Single Domain Design
Signup and view all the flashcards
Monolithic OS Kernel
Monolithic OS Kernel
Signup and view all the flashcards
What is the benefit of kernel separation in a Monolithic OS?
What is the benefit of kernel separation in a Monolithic OS?
Signup and view all the flashcards
How did OS designs evolve?
How did OS designs evolve?
Signup and view all the flashcards
Monolithic OS
Monolithic OS
Signup and view all the flashcards
Multi-server OS
Multi-server OS
Signup and view all the flashcards
Hypervisor
Hypervisor
Signup and view all the flashcards
Tenant
Tenant
Signup and view all the flashcards
Virtual machine
Virtual machine
Signup and view all the flashcards
Inter-Process Communication (IPC)
Inter-Process Communication (IPC)
Signup and view all the flashcards
Virtual resources
Virtual resources
Signup and view all the flashcards
Server Hardening
Server Hardening
Signup and view all the flashcards
Linux Server Hardening
Linux Server Hardening
Signup and view all the flashcards
Windows Server Hardening
Windows Server Hardening
Signup and view all the flashcards
Yum Update
Yum Update
Signup and view all the flashcards
BIOS (Basic Input/Output System)
BIOS (Basic Input/Output System)
Signup and view all the flashcards
Low-Level Operating System Hardening
Low-Level Operating System Hardening
Signup and view all the flashcards
Confidentiality
Confidentiality
Signup and view all the flashcards
Integrity
Integrity
Signup and view all the flashcards
Study Notes
Cyber Security TM256 - Block 2: Systems Security
-
Course offered by Dr. Ahmed Mahfouz at AOU, Oman
-
Part 5: Authentication, authorization, and accountability
- Authentication: verifying entity identity
- Password policies: crucial for security
- Multi-Factor Authentication (2FA): uses username/password & another factor
- Authorization: right to access system resources
- Access control models
- Mandatory Access Control (MAC)
- Discretionary Access Control (DAC)
- Role-Based Access Control (RBAC)
- Access control models
- Accountability: tracking security-relevant actions
- Establishing accountability: recording events
- Data collection: mechanisms to record information
- Log storage and management: maintaining logs
- Logging obligations: GDPR requirements for logging personal data
-
Part 6: Operating system security
- Overview of operating systems: fundamental to managing device processes
- Operating system architecture
- Basic operating systems
- Monolithic operating systems
- Multi-server operating systems
- Hypervisor-based operating systems
- Principles of operating system security: confidentiality, integrity, availability
- Server hardening: securing a system's configuration
- Keeping Linux up-to-date: using yum command, maintaining software lists, updating and deleting software
- Server hardening activities: replacing root user account, creating password policies, removing unnecessary services, blocking ports, using scanning tools
- Low-level operating system hardening: securing low-level areas like booting, memory & CPU
- Implementing UEFI, establishing trust, testing hardware, selecting boot device, starting OS
-
Learning Outcomes
- Understand theory and practice of systems security, including threats, controls, and policies
- Identify threats and vulnerabilities and develop security controls
- Effectively communicate and analyze problems within a computer environment
- Stay updated with cyber security developments
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.