Chapter 3 Flashcards

(42 cards)

1
Q

Explain the role of a file name and path in locating a file on a hard drive.

A

File name selects the right file in the final directory in the path

Path identifies the directory entries to follow to find the file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe the four basic access rights for files and other resources in general. (CRUD)

A

Create - a new instance of the resource

Read - the contents of a particular resource

Update - or write or modify a particular resource

Delete - or destroy an existing resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Give reasons why a user would protect a file from read or write access by other users.

A

To ensure that the contents of said file cannot be viewed or tampered with by other users.

or

  • to safeguard sensitive information
  • prevent unauthorized modifications
  • reduce the risk of data breaches or accidental loss
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does the operating system decide what permissions to apply when a user creates a new file?

A

Systems tend to implement either of two mechanisms to apply initial access rights:

  1. Default rights: the system applies a standard set of permissions to all files a particular user creates
  2. Inherited rights: the system applies permissions inherited from one or more enclosing directories
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Explain how the four basic access rights of files and directories interact.

A

These rights determine what users can do to files and directories. Directories tie files together, a file exists because of its directory entry. To delete it, we need to change said directory entry.

Or

The four basic access rights are Create, Read, Update, and Delete (CRUD), and they apply differently depending on whether the object is a file or a directory, but they also interact with each other.

Here’s the interaction:
• Read (R): On a file, it lets you open and view its contents. On a directory, it lets you list the names of files inside.
• Create (C / Write): On a file, it means writing or adding new content. On a directory, it means creating a new file or subdirectory inside it.
• Update (U): On a file, it allows editing the contents. On a directory, it allows modifying directory entries (like renaming a file).
• Delete (D): To delete a file, you need delete rights on the directory that contains it, not just the file itself—because removing a file requires removing its directory entry.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does it mean to have “Execute” access to a file?

A

Execute access lets a user run a program file, but it does not imply the right to copy it or visually examine the executable instructions

Also helps distinguish data files from programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is “Seek” access and how is it different from “Read” access?

A

The seek is separate from the read access; it allows the user’s process to search a directory for a particular name in a file’s path, but not to examine the directory as a whole.

The read access allows the user to list the files in a directory and look at file details stored in that directory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe the format of an executable file.

A

The executable file has a header which contains the magic number, program size, and layout information.

magic number - a standard data value that appears in the first location of the excutable file

program size - indications of the size of the block of machine instructions that make up the program itself

layout information - addresses and offsets to be used to lay out variables and stack locations in the program’s data section

After the header, the rest of the file contains machine instructions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why would we restrict access to executable files?

A

To keep the system safe from unauthorized use, and other forms of malicious activity. Also to protect the system from malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe how a virus operates and spreads.

A

viruses are carried by programs, when the program executes, the virus spreads to other programs on the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Explain the difference between a virus, a worm, and a Trojan

A

Virus - Infects via program installed by user

Worm - Infects via network connection by exploiting server vulnerabilities

Trojan - Is a malware that first appears benign, but tricks the user into executing it

Or

•	Virus – Malicious code that attaches itself to a file or program and spreads when the file is run. Needs human action to activate.
•	Worm – Self-replicating malware that spreads across networks without user action.
•	Trojan – Malware disguised as a legitimate program to trick users into installing it, then performs harmful actions.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When we wish to specify file-access rights, which elements serve as subjects and objects in the access matrix?

A

Subjects = users or processes; Objects = files or resources in the access matrix.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Explain the difference between a default permit policy and one that enforces Deny by Default.

A

Default permit allows all access except for blocked one.

Deny by default blocks all access unless granted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Name the two requirements that must remain true in order for an operating system to enforce its policy.

A
  1. The OS protections are always applied when we access our files, and
  2. There is no way to bypass the OS protections
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Do most modern operating systems specify file permissions with a “cluster by row” or “cluster by column” strategy?

A

Most use a “cluster by row” (list all rights for each subject) approach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Summarize the information needed to specify a file’s access rights using permission flags

A
  • sets of flags to specify access rights (read, write, and execute)
  • a set of flags for each type of process
    • processes belonging to the file’s owner
    • processes belonging to the system
    • processes belonging to others - the world
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Describe the differences between an access matrix and a table of compact access rules.

A

Access matrix has users in rows and files in columns, with each intersection showing the users rights

Table of compact access rules have columns for file types, the owner, world access, and requirements

18
Q

Explain how the Morris worm took advantage of a failure to use Least Privilege.

A

It exploited the fact that Unix systems ran processes with the “root” user identity.

19
Q

Describe the components of a state diagram.

A
  • Storage state - the information is stored and is not currently being processed. We also call this state “data at rest.”
  • Processing state - the information is being used by an active process to make decisions or to transform the information into another form. This is “data in use.”
  • Transmission state - the information is being moved from one storage area to another. This is “data in motion.
20
Q

List the typical steps a vendor follows to release a software patch.

A
  1. colect error reports
  2. prioritize errors and assign for investigation
  3. the engineer develops a fix for the software program
  4. another engineering team reviews proposed bug fixes for release in an upcoming patch
  5. test the patch
  6. release the patch
21
Q

Explain two different situations in which a window of vulnerability might arise.

A
  • A black hat constructs a zero-day exploit.
  • when we install new software from a DVD or other distribution media.

not sure

22
Q

When we look in our directories at the files, we distinguish between two file types

A
  1. Data files, like a word-processing file containing an essay, a spreadsheet, or a configuration file used by a program or the operating system
  2. Executable files that contain application programs or other programs.
23
Q

explain the contents of the file header of executable file types

A
  1. magic number - a standard data value that appears in the first location of the executable file.
  2. program size - indications of the size of the block of machine instructions that make up the program itself.
  3. layout information - addresses and offsets to be used to lay out variables and stack locations in the program’s data section.
24
Q

common types of executable files

A
  • application programs
  • operating system kernel
  • device drivers
  • shared libraries
25
What are the two categories of programming language programs?
Compiler and Interpreter
26
What are two defense measures taken for macro viruses?
- Authentication: the application software only runs a macro program if it can authenticate the file’s source, and the user trusts that source - Sandboxing: the application software runs the macro program with heavy restrictions on what it can do
27
example of modern malware
* Waledac - spreads throgh email; creates a botnet that spreads spam and more malware * Conficker, also called Downadup - spread through internet via windows vulnerabilities; created a botnet used for spam and malware distribution * Pushdo/Cutwail - a botnet and spam package that used to produce 7 million messages a day * ZeuS/Gameover - creates botnet focused on financial fraud * Cryptolocker/Cryptowall - form of “ransomware” that uses encryption to hold a computer hostage. * Stuxnet/Flame attacks control logic in industrial plants; probable target was iranian nuclear sites
28
different propagation techniques used in modern malware:
* Infect flash drives * Drive-by downloads * Worm propagation * Trojan infection * Email infection
29
list of risks:
1. Denial of service: someone deletes some of our files or damages software, making all or part of the computer unusable. 2. Subversion: a program gets a virus infection or suffers some other malware damage. 3. Masquerade: one user logs in, trying to pretend to be another user. 4. Disclosure: some of our personal data is disclosed. 5. Forgery: someone modifies one of our files without our knowledge, so their statements are presented as our own
30
two global policies:
1. isolation policy - grant no access to other user's files 2. file-sharing policy - grant read access to other user's files
31
specific tailored policies:
privacy - block all access to certain files in a sharing environment shared reading - grant read-only access to certain files in an isolation environment shared updating - grant full access to certain files in either environment
32
in general, the access matrix describes three things:
1. what we are sharing (objects) 2. with whom we share them (subjects) 3. what rights each subject has to each object
33
objectives for sharing files
- provide computing facilities for authorized users - preserve the chain of control - permit/prevent general sharing of information among users
34
two policy alternatives or general types of policies:
1. global policies - applied to all users by default 2. tailored policies - modify rights for specific sets of files
35
File systems mostly fall into either of two categories
windows systems and unix-based systems
36
basic access rights to a directory are:
read, write, and seek
37
listing of possible rights a system could grant for access to a directory:
- create a new directory - delete a directory - seek a directory for an entry - read a directory - create new files in a directory - delete files in a directory
38
first and most important executable file
kernel of the OS
39
Common types of executable files
- application programs - operating system kernel - device drivers - shared libraries
40
types of virs infection
- application program infects when it is run - boot sector virus infects when bootstrapped - usb virus infects when plugged in - email virus infects if attachment is run
41
What is window of vulnerability
Time during which an exploit exists but computers aren’t patched
42
From the access matrix, there are two obvious strategies for combining access rights:
1. Cluster by column: associate access rights with users or processes. 2. Cluster by row: associate access rights with resources like files.