OS Protection and Security

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which of the following is NOT a primary requirement of protection and security in an operating system?

  • Ensuring confidentiality of data
  • Maximizing CPU utilization (correct)
  • Guaranteeing the availability of resources
  • Maintaining the integrity of the system

What is the main purpose of the 'principle of least privilege'?

  • To make it simpler for administrators to manage system policies.
  • To allow users full control over system resources.
  • To prevent unauthorized access and limit potential damage. (correct)
  • To ensure programs have more than enough privileges to perform their tasks.

Why is it generally better to use a SGID program with group ownership instead of a SUID program with root ownership when special privileges are required?

  • SUID programs are deprecated and no longer supported.
  • SGID programs are always faster than SUID programs.
  • SGID programs automatically have fewer privileges than SUID programs.
  • SGID programs limit the potential damage compared to SUID programs. (correct)

What does the 'need to know' principle primarily aim to achieve?

<p>To limit a process's access to only the objects required for its task. (C)</p> Signup and view all the answers

In the context of operating system protection, what does a 'protection domain' define?

<p>The resources that a process is allowed to access. (B)</p> Signup and view all the answers

What is the purpose of an 'access right'?

<p>To grant the ability to execute an operation on an object. (C)</p> Signup and view all the answers

In an access matrix, what do columns typically represent?

<p>Different system resources (C)</p> Signup and view all the answers

What does the ability to 'copy rights' within an access matrix indicate?

<p>The right for processes to duplicate access rights to the same object. (B)</p> Signup and view all the answers

If an asterisk is removed from an original access right, what does this signify?

<p>The right is transferred instead of copied. (B)</p> Signup and view all the answers

What does the 'owner right' in access control provide?

<p>The ability to add new rights or remove existing ones. (A)</p> Signup and view all the answers

What is the purpose of 'control rights' in the context of domain objects?

<p>To allow a process in one domain to affect the rights available in other domains. (A)</p> Signup and view all the answers

Why is a global table implementation of an access matrix often impractical?

<p>It is very large and cannot be kept in memory. (B)</p> Signup and view all the answers

What is the primary advantage of using access lists for objects?

<p>They reduce memory usage by discarding blank entries. (A)</p> Signup and view all the answers

How are capability lists for domains typically protected?

<p>By using a tag or splitting the address space. (A)</p> Signup and view all the answers

In a lock-key mechanism, when is access to a resource granted?

<p>When the domain's keys fit one of the resource's locks. (D)</p> Signup and view all the answers

What does operating system security primarily ensure?

<p>Availability, confidentiality, and integrity. (A)</p> Signup and view all the answers

What is the difference between a 'threat' and an 'attack' in system security?

<p>A threat is the potential for harm, while an attack is an actual security breach. (B)</p> Signup and view all the answers

Which of the following is an example of a 'breach of confidentiality'?

<p>Unauthorized reading of data (B)</p> Signup and view all the answers

What is the primary goal of ensuring 'availability' in system security?

<p>To ensure all system resources are accessible to all authorized users. (D)</p> Signup and view all the answers

Which of the following is an example of a program threat that replicates itself?

<p>Virus (C)</p> Signup and view all the answers

What is the main characteristic of a 'logic bomb'?

<p>It misbehaves only when specific criteria are met. (A)</p> Signup and view all the answers

What is the purpose of port scanning?

<p>To determine a system's vulnerabilities for an attack. (A)</p> Signup and view all the answers

How does a worm typically cause harm to a system?

<p>By exhausting system resources. (D)</p> Signup and view all the answers

What is the primary goal of authentication in operating system security?

<p>To identify every system user and ensure the authenticity of program execution. (A)</p> Signup and view all the answers

What is a key characteristic of one-time passwords?

<p>They are unique and cannot be reused. (D)</p> Signup and view all the answers

Flashcards

OS Protection and Security

Ensuring computer resources like CPU, software and memory are protected, including integrity, confidentiality and availability.

Goals of Protection

Prevent malicious use, ensure shared resource use follows system policies, and minimize damage from errant programs.

Principle of Least Privilege

Programs, users and systems are given only the privileges needed to perform their tasks.

Protection Domain

Specifies resources a process may access, defining objects and operations.

Signup and view all the flashcards

Access Right

The ability to execute an operation on an object within a protection domain.

Signup and view all the flashcards

Access Matrix

A matrix where columns are system resources and rows are protection domains, indicating access rights.

Signup and view all the flashcards

Operating System Security

The process of ensuring OS availability, confidentiality, and integrity against threats.

Signup and view all the flashcards

Threat

A security violation; a program that can potentially harm the system.

Signup and view all the flashcards

Attack

A security violation; unauthorized access to a system resource.

Signup and view all the flashcards

Breach of Integrity

Unauthorized data modification.

Signup and view all the flashcards

Theft of Service

Unauthorized use of resources.

Signup and view all the flashcards

Breach of Confidentiality

Unauthorized reading of data.

Signup and view all the flashcards

Breach of Availability

Unauthorized destruction of data.

Signup and view all the flashcards

Denial of Service

Preventing legitimate use of the system, sometimes accidentally.

Signup and view all the flashcards

Integrity (Security Goal)

Ensuring only authorized users access objects of the system.

Signup and view all the flashcards

Secrecy (Security Goal)

Ensuring system objects are available to authorized users only.

Signup and view all the flashcards

Availability (Security Goal)

Ensuring system resources are accessible to all authorized users.

Signup and view all the flashcards

Virus

Malicious code that replicates, modifies, or deletes user files.

Signup and view all the flashcards

Trojan Horse

Application capturing user credentials to give malicious users access.

Signup and view all the flashcards

Logic Bomb

Software that misbehaves when specific criteria are met.

Signup and view all the flashcards

Trap Door

A security weakness in code allowing illegal actions without user knowledge.

Signup and view all the flashcards

System Threats

Misuse of system services and network connections that causes user problems.

Signup and view all the flashcards

Port Scanning

Automated process to determine system vulnerabilities via TCP/IP connections.

Signup and view all the flashcards

Worm

Process that exhausts system resources, choking performance. It makes self-clones.

Signup and view all the flashcards

Denial of Service

Preventing legitimate users from accessing the system.

Signup and view all the flashcards

Study Notes

  • OS protection and security involve safeguarding computer resources, extending to the operating system and data through ensuring integrity, confidentiality, and availability.
  • The goals of protection are to prevent malicious misuse and ensure resources are used according to system policies set by designers/administrators, and to minimize damage from errant programs.
  • Protection systems provide mechanisms for enforcing policies, with administrators and users responsible for effective implementation.

Principles of Protection

  • The principle of least privilege states programs, users, and systems should be given just enough privileges to perform tasks, minimizing potential harm.
  • Using SGID programs with group ownership instead of SUID with root ownership can limit damage if something goes wrong.
  • The root account should be reserved for tasks needing root privileges, with system administrators using an ordinary account for daily activities.

Domain of Protection

  • A computer can be viewed as a collection of processes and objects (hardware & software).
  • The need to know principle dictates processes should only access objects required for their task, in necessary modes, and during the required timeframe.
  • A protection domain specifies the resources a process can access.
  • An access right is the ability to execute an operation on an object.
  • A domain is a set of < object, { access right set } > pairs.
  • The association between a process and a domain may be static or dynamic, necessitating ways to change domain contents or switch domains.
  • Domains can be realized as users, processes, or procedures.

Access Matrix

  • A the model of protection can be viewed as an access matrix, wherein columns represent system resources, and rows represent protection domains.
  • Entries in the matrix indicate the type of access a domain has to a resource.
  • Domain switching can be supported by providing "switch" access to other domains.

Copy rights

  • The ability to copy rights is an asterisk (*) indicating that processes in a domain can copy access within the same column for the same object.
  • Removing the asterisk means the right is transferred, rather than copied, and is called a transfer right.
  • Copying the right but not the asterisk adds the access right to a new domain without propagating further, termed a limited copy right.
  • The owner right allows adding or removing of existing rights.
  • Control rights allow processes in one domain to affect rights in others.

Implementation of Access Matrix

  • The global table approach involves a large table with < domain, object, rights > entries.
  • The global table approach is difficult to implement due to its size and lack of grouping abilities.
  • Access lists for objects can be implemented by keeping a list of access rights for each object and a default access rights list.
  • Capability lists for domains involve keeping each row of the table as a capability list for that domain, protected via tags or segmented memory.
  • A lock-key mechanism uses locks and keys (unique bit patterns) for resources and domains, respectively, granting access if a domain's key matches a resource's lock.
  • Each method has pros and cons; many systems use a combination of these.

Operating System Security

  • OS security ensures the integrity, confidentiality, and availability of the system.
  • OS security involves protecting systems from viruses, worms, malware, and hacker intrusions, using preventive controls to safeguard system assets from theft, modification, or deletion.
  • Security provides safety for computer resources by assuring the OS's integrity, confidentiality, and availability.

Threats and Attacks

  • Security threats can be malicious or accidental.
  • A threat is a program that has the potential to harm a system.
  • An attack is a security breach that provides unauthorized access to resources.
  • Malicious threats involve destructive code leading to vulnerabilities while accidental threats are typically easier to defend against.
  • Violations to security can include breach of integrity (unauthorized data modification), theft of service (unauthorized resource use), breach of confidentiality (unauthorized data reading), breach of availability (unauthorized data destruction), and denial of service (preventing legitimate system use).
  • System security aims to ensure integrity (preventing unauthorized access and modification), secrecy (limiting access to authorized users), and availability (ensuring all authorized users can access system resources).

Types of Security Threats

  • Program threats occur when a user program leads to malicious actions, examples include viruses, Trojan Horses, Logic Bombs, and Trap Doors
  • Viruses replicate, modify/delete files, and can crash systems.
  • Trojan Horses steal user credentials.
  • Logic Bombs cause software to misbehave when specific criteria are met.
  • Trap Doors are security weaknesses allowing illegal actions without user knowledge.
  • System threats misuse system services and network connections, which can trigger program threats, some examples are Port Scanning, Worms, and Denial of Service.
  • Port Scanning identifies system vulnerabilities.
  • Worms exhaust system resources to choke performance.
  • Denial of Service prevents legitimate system use.
  • Threats to operating systems include malware (viruses, worms, Trojan Horses) that corrupt files, replicate, and can crash a system, and network intrusion (masqueraders, misfeasors, unauthorized users).
  • Buffer overflow is a common issue where more input than allotted overwrites a buffer, which can crash a system or allow inserted malware to take control.

OS Security Measures

  • Authentication verifies users and authenticates programs they execute, generally through username/password, biometric user attribution, or user card/key.
  • One-time passwords add further security and can be implemented through secret keys, random numbers, or network passwords.
  • Firewalls monitor all network traffic for local security.
  • Firewalls is an efficient way of protecting network systems or local systems from any network-based security threat.
  • Physical security is vital because physical access can allow attackers to edit, remove, or steal important files.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Use Quizgecko on...
Browser
Browser