Cyber Security Past Paper

Access Control

For a directory D, the access control bits considered about the list of filenames. (different from a file F)

r for reading the names of the files contained

w to change the list of filenames in the directory
  	create, delete, rename or move a file in it

The “sticky bit”  (10-th access control bit in *Berkeley Unix*)
  	For D with access w, then a F inside can be removed/renamed only by the *owner* of F [or D].

x to access the contents or attributes of a file in it (directory traversal/search)
  	dereference the inode of a known filename in it

set-user/group-ID

[Without] Process started by user U will have the same value U stored as the effective, real, and saved user ID and cannot change any of them.

[With] When a program file F with owner O is started by user U, the real user ID will be set to U, both the effective and the saved user ID of the process will be set to O.

Buffer overflow

SQL injection

Malfunction

CSRF, XSS

Password

Confidentiality, Integrity, Availability

Physical Security