Summarize how each of the three tailored file security policies changes the access rights of files under the two default security policies
When tailoring, we answer 4 questions:
Problem of admins logged in as root:
the system couldn’t tell which admin performed a particular task
With Unix “SUDO” and “SetUID” commands, what privileged operation can the user do?
The user can execute a privileged operation as “root”
Admin roles are dangerous, since admins can accidentally execute Trojan horses and other malware in “root,” what are safe alternatives for this?
Temporary rights (UAC), and having two User IDs: a regular user ID that has no special privileges and one special user ID with administrative privileges.
What are three sets of RWX flags?
What is ACL?
Access Control Lists are a general-purpose technique that cluster access rights by row.
How do you build an effective ACL?
In Windows ACL, permissions are applied in a specific order:
Describe the behavior of “sudo” on Unix. When is “sudo” used?
On Unix, sudo is a prepackaged function that runs setuid with the identity of root. It’s used when administrators need to perform serious system changes, allowing them to run programs as root after authenticating with the correct password, without logging in as the root account directly.
When we create a file, explain how that file acquires its initial ACL under Windows.
In Windows, when we create a new file, it simply inherits access rights from the folder in which we save the file.
This is called dyamic ACLs that inherit access rights from the enclosing folder. Files use the “parent” ACL, which is retrieved from their folder.
If we change the ACL for a folder under Windows, what typically happens to the ACLs for the files within that folder?
If we change the ACL for a folder in Windows, the files inside also change their ACLs—as long as they inherit permissions from the folder.