Cyber Security PYQ
Describe the types of VM based isolation.
Following are the types of Virtual Machine based isolation : a. Process Virtual Machines: b. System Virtual Machines (Hypervisor Virtual Machines): c. Hosted Virtual Machines: … Read more
What do you understand by VM based isolation?
VM (Virtual Machine) based isolation refers to the use of virtualization technology to create isolated environments on a computer system. Isolated Environment: A VM is … Read more
Explain error 404 digital hacking in India part 2 chase.
Israel’s Power Grid Hack: Hydropower Plant Hack in Upstate New York (2014): Cyber Worm Targeting Iran’s Infrastructure: Bangladesh Best Group Hacking Indian Websites: Virus for … Read more
Discuss confinement techniques in details.
Following are the various confinement techniques :
Define SUID, SGID and sticky bits with basic difference.
There are three special permissions that are available for executablefiles and directories: Differences: Aspect SUID (Set User ID) SGID (Set Group ID) Sticky Bit Purpose … Read more
Explain basic permission bits on non-directories and directories files.
Every file and directory in our UNIX/Linux system has following threepermissions : Non-Directories (Regular Files): Directories: So, in summary:
Describe detour used in Unix user ids and process ids.
User IDs (UIDs): Types of UIDs in Processes: Subjects and Principals: Objects: User Accounts and UID 0: Mapping Users to Principals:
Describe confinement principle in brief.
The confinement principle is like a security rule that prevents a server from spilling out information that should be kept secret according to the user. … Read more
Differentiate between DAC and MAC.
Aspect DAC (Discretionary Access Control) MAC (Mandatory Access Control) 1. Type of Access Control DAC is a type of access control MAC is a type … Read more