Explain the role of a file name and path in locating a file on a hard drive.
File name selects the right file in the final directory in the path
Path identifies the directory entries to follow to find the file
Describe the four basic access rights for files and other resources in general. (CRUD)
Create - a new instance of the resource
Read - the contents of a particular resource
Update - or write or modify a particular resource
Delete - or destroy an existing resource
Describe the format of an executable file.
The executable file has a header which contains the magic number, program size, and layout information.
magic number - a standard data value that appears in the first location of the excutable file
program size - indications of the size of the block of machine instructions that make up the program itself
layout information - addresses and offsets to be used to lay out variables and stack locations in the program’s data section
After the header, the rest of the file contains machine instructions.
Explain the difference between a virus, a worm, and a Trojan
Virus - Infects via program installed by user
Worm - Infects via network connection by exploiting server vulnerabilities
Trojan - Is a malware that first appears benign, but tricks the user into executing it
Or
* Virus – Malicious code that attaches itself to a file or program and spreads when the file is run. Needs human action to activate. * Worm – Self-replicating malware that spreads across networks without user action. * Trojan – Malware disguised as a legitimate program to trick users into installing it, then performs harmful actions.
Name the two requirements that must remain true in order for an operating system to enforce its policy.
objectives for sharing files
What is window of vulnerability
Time during which an exploit exists but computers aren’t patched
Information states
List the typical steps a vendor follows to release a software patch. PATCHING PROCESS
example of modern malware
Describe the components of a state diagram
A technique to illustrate a system’s behavior
– Each state is a separate situation
– Arrows between states show transitions
• A transition indicates both cause and effect
• An event causes the transition
• An action may take place at the transition
explain security patch race
set of flags for each type of process
What is execute access right
Helps distinguish data files from programs. Must have the “execute” right to execute a file containing a program
list of risks:
Explain the difference between a default permit policy and one that enforces Deny by Default.
Default permit allows all access except for blocked one.
Deny by default blocks all access unless granted.
What is window of vulnerability
Time during which an exploit exists but computers aren’t patched
From the access matrix, there are two obvious strategies for combining access rights:
a set of flags for each type of process