• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/48

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

48 Cards in this Set

  • Front
  • Back
REAL STORAGE
THE MAIN MEMORY IN A VIRTUAL MEMORY SYSTEM(TEMPORARY STORAGE)
SECONDARY STORAGE
NONVOLATILE STORAGE MEDIA(HARD DISKS, TAPES)
VITURAL MEMORY
RAM AND SECONDARY STORAGE COMBINED
SEQUENTIAL MEMORY
MUST BE ACCESSED IN ORDER FOROM BEGINNING TO END(TAPES)
RANDOM ACCESS MEMORY(RAM)
CONTENTS LOST AFTER POWER OUTAGE
READ ONLY MEMORY(ROM)
CONTENTS MAINTAINED AFTER POWER OUTAGE
PROCESS
EXECUTION PROGRAM WITH ITS OWN MEMORY SPACE
THREAD
INSTRUCTION SET AND DATA THAT MUST BE WORKED ON BY THE CPU
multithreading systems
processmultiple threads simultaneously
multitasking systems
process multiple processes simultaneously
multiprocessing systems
multiple processors that share common operatin systemns and memory
RING 0
KERNEL; MOST PRIVILEGED INTERACTS MOST DIRECTLY WITH HARDWARE
RING 1
REMAINING OS COMPONENTS
RING 2
INPUT/OUTPUT SOFTWARE
RING 3
USER APPLICATIONS
DEDICATED SECURITY MODE
SUBJECTS CLEARANCE FOR ALL INFO AND 'NEED TO KNOW'
SYSTEM HIGH SECURITY MODE
SUBJECTS CLEARANCE FOR ALL INFO AND 'NEED TO KNOW' FOR SOME INFO
COMPARTMENTED SECURITY MODE
SUBJECTS CLEARANCE FOR MOST RESTRICTIVE INFO AND 'NEED TO KNOW'
MULTILEVEL MODE
SUBJECT CLEARANCE AND 'NEED TO KNOW' FOR REQUESTED ACCESS
TRUSTED COMPUTING BASE (TCB)
ALL PROTECTION MECHANISMS WITHIN A SYSTEM
SECURITY PERIMETER
BOUNDARY BETWEEN ITEMS INSIDE AND OUTSIDE THE TCB
SECURITY KERNEL
CONTROLS ACCESS OF ALL SUBJECTS
THE REFERENCE MONITOR
ABSTRACT MACHINE THAT HOLDS ALL ACCESS RULES FOR THE SYSTEM
STATE MACHINE MODEL
ALLOWS OS TO TRANSISTION ONLY BETWEEN A SERIES OF WELL DIFINED STATED
ACCESS MATRIX MODEL
ACL's (COLUMNS) AND ACEs (ROWS) OF READ WRITE EXECUTE PERMISSIONS
TAKE GRANT MODEL
DIRECTED GRAPHS ILLUSTRATE SECURITY PERMISSIONS THAT OBJECTS CAN TAKE/GRANT
BELL-LAPADULA MODEL
LATTICE BASED NO READ UP NO WRITE DOWN
BIBA MODEL
LATTICE BASED NO WRITE UP NO READ DOWN
CLARK WILSON MODEL
ENFORCED SEPARATION OF DUTIES TO MAINTAIN DATA INTEGRITY
ORANGE BOOK
INCLUDES THE DOD TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA (TCSEC)
RED BOOK
ADDRESSES NETWORK PORTION OF TCSEC
PURPLE BOOK
DATABASE SECURITY IN TRUSTED SYSTEMS
GREEN BOOK
PASSWORDMAMAGEMENT IN TRUSTED SYSTEMS
AMBER BOOK
CONFIGURATION MANAGEMENT IN TRUSTED SYSTEMS
SECURITY POLICY
EXPLICIT WELL DEFINED AND ENFORCED BY THE COMPUTER SYSTEM (MAC AND DAC)
INDENTIFICATION
PROCESS USED TO RECOGNIZE AN INDIVIDUAL USER
LABELS
MUST STORE AND PRESERVE THE INTEGRITY OF ACCESS CONTROL LABELS
DOCUMANTATION
SECURITY FEATURES USERS GUIDE; TRUSTED FACILITY MANUAL; TEST DOCUMENTATION; AND DESIGN DOCUMENTATION
ACCOUNTABILITY
IDENTIFICATION AUTHENTICATION AND AUDITING
LIFECYCLE ASSURANCE
CONFIDENCE THAT A TRUSTED SYSTEM IS DESIGNED, DEVELOPED AND MAINTAINED
CERTIFICATION
EVALUATIONOF SECURITY FEATURES OF A SYSTEM
ACCREDITATION
DECLARATION BY DAA THAT SYSTEM IS APPROBED TO OPERATE
COVERT CHANNELS
ATTACKS THAT CREATE A CAPABILITY TO REANSFER INFORMATION BETWEEN PROCESSES
TIMING CHANNELS
CONVERT CHANNEL FOR PASSING UNAUTHORIZED INFORMATION THROUGH MODULATION
STORAGE CHANNELS
HIDDENCOMMUNICATIONS THROUGH MODIFICATION OF A STORED OBJECT
SALAMI ATTACKS
COMMITTING SMALLER CRIMES IN HOPES OF LARGETR CRIME GOING UNNOTICED
TIME OF CHECK TO TIME OF USE(TOC.TOU)
SEQUENCE OF STEPS A SYSTEM USES TO COMPLETE A TASK
BUFFER OVER FLOW ATTACKS
TOO MUCH DATA IS ACCEPTED INTO AN APPLICATION OR OPERATING SYSTEM