OS Security

Cards (2)

  • Weak File Permissions
    • Proper security dictates the principle of least privilege. In a work environment, you want any file accessible only by those who need to access it to get work done
    • Weak file permissions make it easy for the adversary to attack confidentiality and integrity. They can attack confidentiality as weak permissions allow them to access files they should not be able to access. Moreover, they can attack integrity as they might modify files that they should not be able to edit.
  • Access to Malicious Programs
    • Depending on the type of malicious program, it can attack confidentiality, integrity, and availability.
    • Some types of malicious programs, such as Trojan horses, give the attacker access to your system. Consequently, the attacker would be able to read your files or even modify them.
    • Some types of malicious programs attack availability. One such example is ransomware. Ransomware is a malicious program that encrypts the user's files.