Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
48 Cards in this Set
- Front
- Back
REAL STORAGE
|
THE MAIN MEMORY IN A VIRTUAL MEMORY SYSTEM(TEMPORARY STORAGE)
|
|
SECONDARY STORAGE
|
NONVOLATILE STORAGE MEDIA(HARD DISKS, TAPES)
|
|
VITURAL MEMORY
|
RAM AND SECONDARY STORAGE COMBINED
|
|
SEQUENTIAL MEMORY
|
MUST BE ACCESSED IN ORDER FOROM BEGINNING TO END(TAPES)
|
|
RANDOM ACCESS MEMORY(RAM)
|
CONTENTS LOST AFTER POWER OUTAGE
|
|
READ ONLY MEMORY(ROM)
|
CONTENTS MAINTAINED AFTER POWER OUTAGE
|
|
PROCESS
|
EXECUTION PROGRAM WITH ITS OWN MEMORY SPACE
|
|
THREAD
|
INSTRUCTION SET AND DATA THAT MUST BE WORKED ON BY THE CPU
|
|
multithreading systems
|
processmultiple threads simultaneously
|
|
multitasking systems
|
process multiple processes simultaneously
|
|
multiprocessing systems
|
multiple processors that share common operatin systemns and memory
|
|
RING 0
|
KERNEL; MOST PRIVILEGED INTERACTS MOST DIRECTLY WITH HARDWARE
|
|
RING 1
|
REMAINING OS COMPONENTS
|
|
RING 2
|
INPUT/OUTPUT SOFTWARE
|
|
RING 3
|
USER APPLICATIONS
|
|
DEDICATED SECURITY MODE
|
SUBJECTS CLEARANCE FOR ALL INFO AND 'NEED TO KNOW'
|
|
SYSTEM HIGH SECURITY MODE
|
SUBJECTS CLEARANCE FOR ALL INFO AND 'NEED TO KNOW' FOR SOME INFO
|
|
COMPARTMENTED SECURITY MODE
|
SUBJECTS CLEARANCE FOR MOST RESTRICTIVE INFO AND 'NEED TO KNOW'
|
|
MULTILEVEL MODE
|
SUBJECT CLEARANCE AND 'NEED TO KNOW' FOR REQUESTED ACCESS
|
|
TRUSTED COMPUTING BASE (TCB)
|
ALL PROTECTION MECHANISMS WITHIN A SYSTEM
|
|
SECURITY PERIMETER
|
BOUNDARY BETWEEN ITEMS INSIDE AND OUTSIDE THE TCB
|
|
SECURITY KERNEL
|
CONTROLS ACCESS OF ALL SUBJECTS
|
|
THE REFERENCE MONITOR
|
ABSTRACT MACHINE THAT HOLDS ALL ACCESS RULES FOR THE SYSTEM
|
|
STATE MACHINE MODEL
|
ALLOWS OS TO TRANSISTION ONLY BETWEEN A SERIES OF WELL DIFINED STATED
|
|
ACCESS MATRIX MODEL
|
ACL's (COLUMNS) AND ACEs (ROWS) OF READ WRITE EXECUTE PERMISSIONS
|
|
TAKE GRANT MODEL
|
DIRECTED GRAPHS ILLUSTRATE SECURITY PERMISSIONS THAT OBJECTS CAN TAKE/GRANT
|
|
BELL-LAPADULA MODEL
|
LATTICE BASED NO READ UP NO WRITE DOWN
|
|
BIBA MODEL
|
LATTICE BASED NO WRITE UP NO READ DOWN
|
|
CLARK WILSON MODEL
|
ENFORCED SEPARATION OF DUTIES TO MAINTAIN DATA INTEGRITY
|
|
ORANGE BOOK
|
INCLUDES THE DOD TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA (TCSEC)
|
|
RED BOOK
|
ADDRESSES NETWORK PORTION OF TCSEC
|
|
PURPLE BOOK
|
DATABASE SECURITY IN TRUSTED SYSTEMS
|
|
GREEN BOOK
|
PASSWORDMAMAGEMENT IN TRUSTED SYSTEMS
|
|
AMBER BOOK
|
CONFIGURATION MANAGEMENT IN TRUSTED SYSTEMS
|
|
SECURITY POLICY
|
EXPLICIT WELL DEFINED AND ENFORCED BY THE COMPUTER SYSTEM (MAC AND DAC)
|
|
INDENTIFICATION
|
PROCESS USED TO RECOGNIZE AN INDIVIDUAL USER
|
|
LABELS
|
MUST STORE AND PRESERVE THE INTEGRITY OF ACCESS CONTROL LABELS
|
|
DOCUMANTATION
|
SECURITY FEATURES USERS GUIDE; TRUSTED FACILITY MANUAL; TEST DOCUMENTATION; AND DESIGN DOCUMENTATION
|
|
ACCOUNTABILITY
|
IDENTIFICATION AUTHENTICATION AND AUDITING
|
|
LIFECYCLE ASSURANCE
|
CONFIDENCE THAT A TRUSTED SYSTEM IS DESIGNED, DEVELOPED AND MAINTAINED
|
|
CERTIFICATION
|
EVALUATIONOF SECURITY FEATURES OF A SYSTEM
|
|
ACCREDITATION
|
DECLARATION BY DAA THAT SYSTEM IS APPROBED TO OPERATE
|
|
COVERT CHANNELS
|
ATTACKS THAT CREATE A CAPABILITY TO REANSFER INFORMATION BETWEEN PROCESSES
|
|
TIMING CHANNELS
|
CONVERT CHANNEL FOR PASSING UNAUTHORIZED INFORMATION THROUGH MODULATION
|
|
STORAGE CHANNELS
|
HIDDENCOMMUNICATIONS THROUGH MODIFICATION OF A STORED OBJECT
|
|
SALAMI ATTACKS
|
COMMITTING SMALLER CRIMES IN HOPES OF LARGETR CRIME GOING UNNOTICED
|
|
TIME OF CHECK TO TIME OF USE(TOC.TOU)
|
SEQUENCE OF STEPS A SYSTEM USES TO COMPLETE A TASK
|
|
BUFFER OVER FLOW ATTACKS
|
TOO MUCH DATA IS ACCEPTED INTO AN APPLICATION OR OPERATING SYSTEM
|