Access Control Vulnerabilities

The Most Common Security Problem with Shared Object Usage

Prev Question Next Question

Question

What security problem is most likely to exist if an operating system permits objects to be used sequentially by multiple users without forcing a refresh of the objects?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

A.

This question is asking you to consider the effects of object reuse.

Object reuse is "reassigning to subject media that previously contained information.

Object reuse is a security concern because if insufficient measures were taken to erase the information on the media, the information may be disclosed to unauthorized personnel." This concept relates to Security Architecture and Design, because it is in level C2: Controlled Access Protection, of the Orange Book, where "The object reuse concept must be invoked, meaning that any medium holding data must not contain any remnants of information after it is release for another subject to use." REFERENCE: AIO Version 5 (Shon Harris), page 360 and TIPTON, Hal, (ISC)2, Introduction to the CISSP Exam presentation.

The security problem that is most likely to exist if an operating system permits objects to be used sequentially by multiple users without forcing a refresh of the objects is A. Disclosure of residual data.

When multiple users access the same object sequentially without a refresh, it is possible that sensitive data from the previous user's session may be left behind in the object, which can be viewed or accessed by the next user. This is known as residual data or data remanence.

Residual data can include passwords, confidential information, and other sensitive data that may compromise the security and confidentiality of the system. If an attacker gains access to this residual data, they may be able to use it to compromise the system further or launch an attack against other systems.

To prevent disclosure of residual data, operating systems should ensure that objects are refreshed between each user's access to the object. Refreshing an object clears any residual data from the previous user's session, ensuring that the next user cannot access or view the previous user's data.

Therefore, it is important for security administrators to ensure that objects are properly refreshed between user sessions to prevent the disclosure of residual data, which can compromise the security and confidentiality of the system.