CHAPTER 3 PPT Flashcards

(19 cards)

1
Q

Explain the role of a file name and path in locating a file on a hard drive.

A

File name selects the right file in the final directory in the path

Path identifies the directory entries to follow to find the file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe the four basic access rights for files and other resources in general. (CRUD)

A

Create - a new instance of the resource

Read - the contents of a particular resource

Update - or write or modify a particular resource

Delete - or destroy an existing resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe the format of an executable file.

A

The executable file has a header which contains the magic number, program size, and layout information.

magic number - a standard data value that appears in the first location of the excutable file

program size - indications of the size of the block of machine instructions that make up the program itself

layout information - addresses and offsets to be used to lay out variables and stack locations in the program’s data section

After the header, the rest of the file contains machine instructions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Explain the difference between a virus, a worm, and a Trojan

A

Virus - Infects via program installed by user

Worm - Infects via network connection by exploiting server vulnerabilities

Trojan - Is a malware that first appears benign, but tricks the user into executing it

Or

*	Virus – Malicious code that attaches itself to a file or program and spreads when the file is run. Needs human action to activate.
*	Worm – Self-replicating malware that spreads across networks without user action.
*	Trojan – Malware disguised as a legitimate program to trick users into installing it, then performs harmful actions.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name the two requirements that must remain true in order for an operating system to enforce its policy.

A
  1. The OS protections are always applied when we access our files, and
  2. There is no way to bypass the OS protections
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

objectives for sharing files

A
  • provide computing facilities for authorized users
  • preserve the chain of control
  • permit/prevent general sharing of information among users
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is window of vulnerability

A

Time during which an exploit exists but computers aren’t patched

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Information states

A
  • Storage state - the information is stored and is not currently being processed. We also call this state “data at rest.”
  • Processing state - the information is being used by an active process to make decisions or to transform the information into another form. This is “data in use.”
  • Transmission state - the information is being moved from one storage area to another. This is “data in motion.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

List the typical steps a vendor follows to release a software patch. PATCHING PROCESS

A
  1. colect error reports
  2. prioritize errors and assign to engineers
  3. the engineer develops software to fix the error
  4. software fixes are chosen for a patch
  5. the patch is tested
  6. the patch is released
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

example of modern malware

A
  • Waledac - spreads throgh email; creates a botnet that spreads spam and more malware
  • Conficker, also called Downadup - spread through internet via windows vulnerabilities; created a botnet used for spam and malware distribution
  • Pushdo/Cutwail - a botnet and spam package that used to produce 7 million messages a day
  • ZeuS/Gameover - creates botnet focused on financial fraud
  • Cryptolocker/Cryptowall - form of “ransomware” that uses encryption to hold a computer hostage.
  • Stuxnet/Flame attacks control logic in industrial plants; probable target was iranian nuclear sites
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Describe the components of a state diagram

A

A technique to illustrate a system’s behavior
– Each state is a separate situation
– Arrows between states show transitions
• A transition indicates both cause and effect
• An event causes the transition
• An action may take place at the transition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

explain security patch race

A
  • the software developer races to develop a fix to eliminate the problem
  • attackers race to write software that exploits the problem and lets them attack computers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

set of flags for each type of process

A
  • processes belonging to the file’s owner
  • processes belonging to the system
  • processes belonging to others: the world
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is execute access right

A

Helps distinguish data files from programs. Must have the “execute” right to execute a file containing a program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

list of risks:

A
  1. Denial of service: someone deletes some of our files or damages software, making all or part of the computer unusable.
  2. Subversion: a program gets a virus infection or suffers some other malware damage.
  3. Masquerade: one user logs in, trying to pretend to be another user.
  4. Disclosure: some of our personal data is disclosed.
  5. Forgery: someone modifies one of our files without our knowledge, so their statements are presented as our own
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Explain the difference between a default permit policy and one that enforces Deny by Default.

A

Default permit allows all access except for blocked one.

Deny by default blocks all access unless granted.

17
Q

What is window of vulnerability

A

Time during which an exploit exists but computers aren’t patched

18
Q

From the access matrix, there are two obvious strategies for combining access rights:

A
  1. Cluster by column: associate access rights with users or processes.
  2. Cluster by row: associate access rights with resources like files.
19
Q

a set of flags for each type of process

A
  • processes belonging to the file’s owner
    • processes belonging to the system
    • processes belonging to others - the world