CHAPTER 4 PPT Flashcards

(13 cards)

1
Q

Summarize how each of the three tailored file security policies changes the access rights of files under the two default security policies

A
  1. Privacy: Overrides a global file sharing policy
  2. Shared Reading: Overrides a global isolation policy
  3. Shared Updating: Overrides either global policy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When tailoring, we answer 4 questions:

A
  1. Which resources are we managing
  2. Which users have access
  3. Deny by default or modify the existing rights
  4. What access rights do nonowners have
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Problem of admins logged in as root:

A

the system couldn’t tell which admin performed a particular task

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

With Unix “SUDO” and “SetUID” commands, what privileged operation can the user do?

A

The user can execute a privileged operation as “root”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Admin roles are dangerous, since admins can accidentally execute Trojan horses and other malware in “root,” what are safe alternatives for this?

A

Temporary rights (UAC), and having two User IDs: a regular user ID that has no special privileges and one special user ID with administrative privileges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are three sets of RWX flags?

A
  • Owner rights (u)
  • Group rights (g)
  • World rights (o)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is ACL?

A

Access Control Lists are a general-purpose technique that cluster access rights by row.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How do you build an effective ACL?

A
  1. Deny by Default is the best general approach
    - start with no rights, or a small set of defaults
    • permissions to owner and administrators
      • add allow rights as needed
  2. Keep the rules as simple as possible
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In Windows ACL, permissions are applied in a specific order:

A
  1. Permissions specifically assigned to that file or directory are applied first
  2. Next, apply those inherited from the enclosing directory
  3. If more permissions inherited, apply them in inheritance order; most recent to least recent
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe the behavior of “sudo” on Unix. When is “sudo” used?

A

On Unix, sudo is a prepackaged function that runs setuid with the identity of root. It’s used when administrators need to perform serious system changes, allowing them to run programs as root after authenticating with the correct password, without logging in as the root account directly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When we create a file, explain how that file acquires its initial ACL under Windows.

A

In Windows, when we create a new file, it simply inherits access rights from the folder in which we save the file.

This is called dyamic ACLs that inherit access rights from the enclosing folder. Files use the “parent” ACL, which is retrieved from their folder.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

If we change the ACL for a folder under Windows, what typically happens to the ACLs for the files within that folder?

A

If we change the ACL for a folder in Windows, the files inside also change their ACLs—as long as they inherit permissions from the folder.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly