Chapter 4 Flashcards

(31 cards)

1
Q

What are some types of Tailored Policies?

A

Privacy, Shared reading, and Shared updating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are administrative groups?

A

A group that allows a user access to administrative functions. Also has special privileges for managing the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

With Unix “SUDO” and “SetUID” commands, what privileged operation can the user do?

A

The user can execute a privileged operation as “root”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

While users could log in as “root” to do admin tasks, what was the system’s main problem?

A

The system could not tell which admin performed a particular task.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Admin roles are dangerous, since admins can accidentally execute Trojan horses and other malware in “root,” what are safe alternatives for this?

A

Temporary rights (UAC), and having two User IDs: a regular user ID that has no special privileges and one special user ID with administrative privileges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are three sets of RWX flags?

A
  • Owner rights (u)
  • Group rights (g)
  • World rights (o)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is ACL?

A

Access Control Lists are a general-purpose technique that cluster access rights by row.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How do you build an effective ACL?

A
  1. Deny by Default is the best general approach
    - start with no rights, or a small set of defaults
    • permissions to owner and administrators
      • add allow rights as needed
  2. Keep the rules as simple as possible
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Summarize how each of the three tailored file security policies changes the access rights of files under the two default security policies.

A

Privacy overrides global file sharing policy

Shared reading overrides global isolation policy

Shared updating overrides either global policy

not sure pa

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Explain why it is safer for administrators to use two different accounts when working with a computer. Explain the difference between the two accounts.

A

This is safer because a virus can spread quicker with an admin account since it is logged into “root.” A lesser privileged account can lessen risk of compromise.

Or

It is safer for administrators to use two accounts because:
• The regular user ID has no special privileges, so if malware or mistakes happen while using it, the system is less likely to be damaged.
• The administrative user ID has full privileges and can make serious system changes, but it should only be used when needed.

Using two accounts reduces risk: everyday tasks are done safely with the regular account, and the admin account is used only when necessary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Describe the behavior of “sudo” on Unix. When is “sudo” used?

A

On Unix, sudo is a prepackaged function that runs setuid with the identity of root. It’s used when administrators need to perform serious system changes, allowing them to run programs as root after authenticating with the correct password, without logging in as the root account directly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe the behavior of the padlock icon on Apple’s OS X. When is the padlock used?

A

On Apple’s OS X, the padlock icon controls access to sensitive parts of the system. When clicked, it prompts for an administrator’s password; if the correct password is entered, the padlock switches to “unlocked” and the system enables the associated controls. It is used to allow regular users to modify critical system preferences and adjust rights on files and folders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe the behavior of user account control (UAC) on modern versions of Microsoft Windows. In what circumstances does a UAC pop-up appear?

A

It pops up when the user tries to run an administrative function and asks the user for an admin password before allowing access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Summarize the behavior of Unix file-permission flags. Identify the sets of users that such permissions can control and what access rights are enforced for each set.

A
  • uses file permission flags to indicate access rights (read, write, execute/search)
  • three sets of identities
    • owner rights (user rights)
    • group rights
    • world rights

the owner typically has the right to read and write the file. Users in the files’ group, and all other users, customarily receive permission to read the file but not to write it. If a file is executable , then anyone granted the right to read the file also is granted permission to execute it. In practice, most files that have execute permission also have read permission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Explain how Unix-like systems decide which of its three sets of access rights to apply when a particular user’s process opens a file.

A

If the “root” user accesses a file, the system grants full access to the file.
If the file’s owner accesses a file, the system applies the owner rights.
If a group member (who is not the file’s owner) accesses the file, the system applies the group rights.
If the user is neither the owner nor a member of the file’s group, the system applies the world rights.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

List the columns that we need to provide when describing security controls implemented with Unix-style permission flags.

A
  • Control number
  • File
  • Owner
  • Owning Group
  • Owner access rights
  • Group access rights
  • World access rights
  • Policy statement
17
Q

Describe the basic features of an access control list.

A

ACLs list all users and grant appropriate access to each.

18
Q

Explain how access restrictions on a folder or directory can block a user’s access to a file, even if the file itself may be readable by that user.

A

An effective ACL implementation has been implemented to make it easier to manage rights in file hierarchies. Files and folders automatically inherit changes made to an enclosing folder’s access rights. This takes precedence in access control, disregarding the permissions of that specific file.

19
Q

When we create a file, explain how that file acquires its initial ACL under Windows.

A

In Windows, when we create a new file, it simply inherits access rights from the folder in which we save the file.

This is called dyamic ACLs that inherit access rights from the enclosing folder. Files use the “parent” ACL, which is retrieved from their folder.

20
Q

If we change the ACL for a folder under Windows, what typically happens to the ACLs for the files within that folder?

A

If we change the ACL for a folder in Windows, the files inside also change their ACLs—as long as they inherit permissions from the folder.

21
Q

Why is a program containing a Trojan considered malicious?

A

A Trojan is hard to detect since it appears as part of a legitimate program, thus allowing it to do malicious activities.

22
Q

Explain how a Trojan program can make secret data belonging to one user visible to another user.

A

It looks into protected folders and copies each one to an unauthorized user.

It looks in restricted directories and copied whatever files the process could find.

23
Q

Describe the typical contents of an entry in an event log.

A
  • Time and date
  • Source - component that detected the event
  • User identity - user associated with event
  • Type - what happened
  • Details of event
24
Q

Describe the typical steps taken to log an event

A
  • A program detects a significant event and emits a log entry to describe it
  • The logging process retrieves the event, and discards less-significant events
  • The logging process saves the event in a log file
  • Administrators monitor the logs for significant events that demand action
25
Summarize some laws, regulations, and industry standards that lead systems to maintain event logs.
If 3 points: ANSI X-standards: used by the banking industry to protect electronic fund transfers. PCI - DSS: used by “Payment Card Industry” to protect credit card transactions ISO 27000: family or international standards for security system quality improvement If 5 points: SOX (Sarbanes-Oxley Act): Enacted by Congress in 2002, SOX establishes requirements for financial and accounting practices. While not explicitly stating logging, effective logging can demonstrate compliance with its broader security rules HIPAA (Health Insurance Portability and Accountability Act): Passed in 1996, HIPAA sets security standards for certain types of health information. Its implementation rules specifically call for system logging GLBA (Gramm-Leach-Bliley Act): Passed in 1999, GLBA requires financial institutions to protect customer information against security threats. Event logging is an essential part of demonstrating compliance with these security measures. FISMA (Federal Information Security Management Act): Passed in 2002, FISMA requires U.S. government agencies to implement agency-wide information security programs. The NIST Risk Management Framework, which promotes system monitoring including event logging, is used to comply with FISMA PCI DSS (Payment Card Industry Data Security Standard): This is an industry standard for entities that issue and process credit and debit cards. A key requirement is that organizations track all access to network resources and cardholder data, which necessitates event logging. If 8 points then all
26
Explain three ways to incorporate external security requirements into the six-phase security process.
- Interpret external requirements in the context of identified risks and then combine them with our other security requirements - Analyze any legal risks that could come - Treat certifications as assets
27
File sharing recognizes three sets of access rights
1. Owner rights: the person who owns the folder, who has full rights to read, modify, or delete anything in the folder. This cant be changed from the file sharing window 2. Reader rights: users with the right to read files in the folder 3. Reader/Write rights: users who can both read and write files in the folder
28
What is transitive trust
If we trust a particular entity to protect our data, then we implicitly trust anyone that the entity trusts. Example: If we trust program 1 and program 1 trusts program 2, we trust program 2
29
What is trust but verify
If we want to prevent a bad outcome but we can’t directly control the relevant events, then we should monitor those events closely instead.
30
What is information systems audit
Formal review of the system’s integrity and of the data it maintains regarding the organization’s business.
31
If we create a Windows ACL in which we “Deny” all permissions to Alice, but we “Grant” all permissions to everyone, does Alice have any access to the file?
The "Deny" rule takes precedence; therefore, Alice won't have any access to the file despite all permissions to everyone is granted.