L3 Operating System Security Fundamentals

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Top five vulnerabilities that lead to cyberattacks?

1: Remote code Execution: Execute or modify command code remotely. -lead to denial-of-service and elevation of privileges. 2: Denial-of-Service:Deny or degrade service to users. 3: Elevation of Privileges: Gain capability without proper authorization. 4: Information disclosure: Expose sensitive information to unauthorized users. 5: Spoofing: Impersonate someone else to access sensitive information.

What is Digital token(Security token)?

1: Small electronic device. 2: Displays a number unique to the token holder; used with the holder's PIN as a password. 3: Uses a different password each time.

Attacks using phishing are targeted how

1: Spam Phishing: Is a widespread attack aimed at many users. 2: Spear Phishing: and by extension Whaling: use personalized info to target particular users.

What are the best practices of User Administration?

1: Use consistent naming convention. 2: Always provide a password to an account and force the user to change it at the first logon. 3: Protect passwords. 4: Do not use default passwords. 5: Create a specific file system for users. 6: Educate users on how to select a password 7: lock non-used accounts 8: Grant privileges on a per host basis 9: Do not grant privileges to all machines 10: Use ssh,scp, and Secure FTP 11: isolate a system after a compromise 12: Perform random auditing procedures.

What does a centralized directory database store?

1: Users(User name and user ID) 2: Passwords 3: Internal telephone directory 4: Security Keys

Authentication:

1: Validates the identity of the user. 2: Physical Authentication 3: Digital Authentication

What are Physical authentications?

1: allows physical entrance to company property. 2: Magnetic cards and biometric measures.

What does a Digital Card do?

1: known as security card or smart card. 2: Similar to a credit card; uses an electronic circuit instead of a magnetic strip. 3: Stores user identification information

What are best password Policy?

1: matches your company missions. 2: Enforced at all levels of the organization.

options for fixing corrupted Memory

1: stop using the program 2: apply a patch( Service pack) to fix it.

Uses for Email

1: tool mostly widely used by public. 2: Tool used by hackers to insert Viruses, Worms, Spam, Others. 3: Used to send private and confidential data as well as offensive material. 4: Used by employees to communicate with: Clients, Colleagues,Friends.

What are best practices for FTP?

1: use secure FTP utility if possible 2: Make two FTP directories: -One for uploads with write permissions only. - One for downloads with read permissions only 3: Use specific accounts with limited permissions 4: Log and scan FTP activities 5: allow only authorized operations.

What is Public Key Infrastructures(PKI)

1: user keeps a private key 2: Authentication firm holds a public key 3: Encrypt and decrypt data using both keys

Operating system:

1:Collection of programs that allows programs and users to interact with the computer resources. 2: Main access point to the DBMS

What is it important to protect Files?

1:Files must be protected from unauthorized reading and writing actions. 2: Data resides in files; protecting files protects data.

What are the reasons for blocking file sharing:

1:Malicious code 2: Adware and spyware 3: Privacy and confidentiality 4: Pornography 5: Copyright issues.

Key functions of an Operating System

1:Multitasking, Multisharing 2: Computer resources management 3: Controls the flow of activities 4: Provides a user interface 5: Administers user actions and accounts 6:Runs software utilities and programs 7:Enforce security measures 8:Schedule jobs 9: Provide tools to configure the operating system and hardware

File Permissions in UNIX/Linux

1:Three permissions Settings: Owner;Group to which owner belongs; all other users. 2: Each setting consist of RWX(R for reading, W for writing, and X for executing.

What is Authentication?

1:Verifies user identity. 2: Permits access to the operating system.

What is a Vulnerability?

A vulnerability is effectively an error in the code or the logic of operation within the OS or the application software.

Define Baiting

Abuses your natural curiosity to coax you into exposing yourself to an attacker.

What is SSL(Secure Socket Layer)

Authentication information is transmitted over the network in an encrypted form.

File Permissions in Windows

Change permission on the Security tab on a files's properties dialog box. 2: Allow indicates grant; Deny indicates revoke.

What does chmod do?

Command used to change file permissions.

NT LAN Manager (NTLM)

Developed by Microsoft. It Employs a challenge/response authentication protocol.

What are Digital certificates?

Digital passport that identifies and verifies holder of certificate.

What is DDos?

Distributed denial-of-service (DDOS) is a large scale attacks involves multiple compromised system attempting to exploit the target from many directions at once.

What is elevation of privilege?

Elevation of privilege(Privilege Escalation)- gives an attacker authorization permissions beyond those initially granted.

What is Kerberos?

Kerberos is a network authentication protocol, which is designed to provide strong authentication for client/server applications by using secret-key cryptography. It uses cryptography so that a client and server can prove their identity to each other across an insecure network connection.

What is information deisclosure

Occurs when software bugs are exploited to obtain personal data stored in a computer's memory.

Phishing Attacks

Phishing attackers pretend to be a trusted institution or individual in an attempt to persuade you to expose personal data and other valubles.

Define Voice Phishing(Vishing)

Phone calls may be automated message systems recording all your inputs. Sometimes, a live person might speak with you to increase trust and urgency

File Permissions

Read,Write, and execute privileges

What is the main component of an operating system security Environment?

Services: Used to gain access to the OS and its features. Include: 1: User authentication 2: Remote access 3: Administration tasks 4: Password Policies

What is Social engineering?

Social engineering is a manipulation technique that exploits human error to gain private information, access, or valuables.

Define DNS cache poisoning attacks

Specifically infect your device with routing instructions for the legitimate URL or multiple URLs to connect to fraudulent websites.

What is Spoofing

Spoofing is the process of impersonating someone by tampering with the authentication process using a username and password.

What does RADIUS do?

Used by network devices to provide a centralized authentication mechanism.

What are Digital Authentications:

Verifies user identity by digital means.

Program Errors

an error in the program code may allow a computer virus to access the device and take control.

Quid pro quo phishing attack

an exchange of your personal info for some reward or other compensation.

Define Watering Hole Attacks

infect popular webpages with malware to impact many users at a time

Scareware:

is a form of malware used to frighten you into taking an action.

Define tailgating

is the act of trailing an authorized staff member into a restricted-access area.

DNS Spoofing

manipulates your browser and web servers to travel to malicious websites when you enter a legitimate URL.

Define Whaling attacks:

specifically aim at high-value targets like celebrities, upper management, and high government officials.

Define Pretexting

uses a deceptive identity as the "pretext" for establishing trust, such as directly impersonating a vendor or a facility employee.

Components of an OS Security Environment

*Used as access points to the database. 1:Services Layer 2: Files Layer 3: Memory Layer

What does Secure Remote Password(SRP) do?

1: Password is not stored locally 2: Invulnerable to brute force or dictionary attacks.

What does Authorization do

1: Process that decides whether users are permitted to perform the functions they request. 2: Authorization is not performed until the user is authenticated. 3: Deals with privileges and rights.

What is OS Security Environment

1: A compromised OS can compromise a database Environment 2:Physically protect the computer running the OS(Padlocks, Chain locks, Guards, Cameras).

What are the vulnerabilities of UNIX/LINUX

1: BIND Domain Name System 2: Remote Procedure Calls( RPC) 3: Apache Web Server 4: General UNIX authentication accounts with no passwords or weak passwords. 5: Clear text Services 6: Sendmail 7: Simple Network Management Protocol (SNMP) 8:Secure Shell(SSH) 9: Misconfiguration of Enterprise Services NIS(Network Information Services/NFS(Network File Systems).

What does User Administration do?

1: Creates user accounts. 2: Set password policies 3: Grant privileges to users.

Authorization:

1: Determines whether the user is permitted to perform the function he or she request. 2: Is not performed until the user is authenticated. 3: Deals with privileges and rights that have been granted to the user.

What is LDAP(Lightweight Directory Access Protocol)

1: Developed by the University of Michigan. 2: Efficient for reading but not suited for frequently changing information.

Email Security Solutions

1: Do not configure e-mail server on the same machine where sensitive data resides. 2: Do not disclose technical details about the e-mail server.

Common threats for Files?

1: File Permission 2: File Sharing

Security problems with files:

1: File permission. 2: File transfer and sharing

Password Policy

1: First line of defense 2: Must match your company missions 3: Must be enforced at all levels of the organization

What are the components of a Password Policies?

1: First line of defense. 2: Dictionary attack: permutation of words in dictionary. 3: Make hard for hackers entering your systems.

Two types of DoS vulnerabilities:

1: Flood attacks: occur when a system receives too many request, causing the services to slow down and eventually stop. --includes buffer overflow attacks, ICMP attacks, SYN flood attacks. 2: Crash attacks

Concerns with Memory?

1: Hardware memory available on the system can be corrupted by badly written software. 2: Can harm data integrity

What are the top vulnerabilities to Windows systems?

1: Internet Information Services(IIS) 2: Microsoft SQL Server(MSSQL) 3: Windows Authentication 4: Internet Explorer (IE) 5: Windows Remote Access Services 6: Microsoft Data Access Components( MDAC) 7: Windows Scripting Host (WSH) 8: Microsoft Outlook and Outlook Express 9: Windows Peer-to-Peer Files Sharing (P2P) 10: Simple Network Management Protocol (SNMP)

What does FTP stand for, and how is it used?

1: Internet service for transferring files from one computer to another. 2: Transmit usernames and passwords in plaintext. 3: Root account cannot be used with FTP. 4: Anonymous FTP: ability to log on to the FTP server without being authenticated.

What does Sharing Files do?

1: Naturally leads to security risks and threats 2: Peer-to-peer programs: allow users to share files over the internet.

What are the best practices for Password Policies?

1: Password aging 2: Password Reuse 3: Password History 4: Password encryption 5: Password storage and protection 6: Password complexity 7: Logon retries 8: Single sign-on enables a user to log in once and gain access to the resources of multiple software systems without being prompted to log in again.


Ensembles d'études connexes

Chemistry - Lipids and Lipoproteins

View Set

Gov Chapter 6 Political Parties Vocabulary

View Set

HIS1100--Module 10--Modern America (10.32.M-10.35.T)

View Set

CHAPTER 26 - Survivors of Abuse or Neglect

View Set

Chemistry Exam #4 Ch. 7&8 #'s 1-59

View Set

Home Vertical Happy Hour Q2 2021

View Set

Market-Based Management Chapter 4: The Customer Experience and Value Creation

View Set

AP Comparative Gov & Politics - Exam Review PRACTICE QUESTIONS

View Set