• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/51

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

51 Cards in this Set

  • Front
  • Back
What is temporary storage, high speed memory, immediately accessible to CPU?
Registers (buffers)
What are resources live in memory called?

Provide process resources that it requests. Process table keeps list of these.
Stack
What holds different condition bits such as whether CPU should be working in User Mode (problem state) or privileged mode (kernel or supervisor mode)?
Program Status Word (PSW)
What are Busses? List 2 kinds of busses.
commute instructions to memory
Data buses - moves data
Address buses - used for input/output or identify areas of memory to read from/write to
32 bit and 64 bit refer to width of the bus - more data bits per clock cycle
What is the name of the type of RAM in which data must be continually and dynamically refreshed so bits don't disappear?
Cheap and slow
Dynamic RAM (DRAM)
What is the name of the type of RAM which hold bits in memory cells without capacitors? Requires more transistors than DRAM. Faster but takes more space
Fast and expensive
Static RAM (SRAM)
Type of RAM that is faster than DRAM because can capture next block of data while first is being sent to CPU
Extended data out DRAM (EDO DRAM)
Type of RAM that builds upon EDO DRAM. Can send more data at once
Burst EDO DRAM (BEDO DRAM)
What kind of I/O device works with data on fixed sized blocks each with own unique address? Disc drive is an example
Block Device
What kind of I/O device works with streams of characters without any fixed sizes. Not addressable. A printer, network interface or mouse are examples.
Character devices
What kind of I/O device signals interrupt the controller indicating it is done? Device may have to wait.
Interrupts
What kind of recovery continues to function despite failure?
Fault tolerant
What kind of recovery is it when program execution is terminated and system protected from compromise when hardware or software failure occurs?
Fail safe
What kind of recovery allows for non-critical processing to be terminated when failure occurs?
Fail soft or resilient
What kind of recovery is it when the machine switches to hot backup?
Failover
What does this describe:
Total combination of protection mechanisms within the computer system. Includes hardware, software and firmware.
Enforce rules of how subjects and objects interact
Originated from the Orange Book
Trusted Computer Base (TCB)
What are 4 functions of the TCB?
1) process activation
2) execution domain switching
(when a process needs to call upon a process in a higher protection ring)
3) memory protection
4) I/O operations
What is an abstract machine that mediates all access subjects have to objects?
Reference Monitor
What is the difference between a security policy and a security model?
Security policy defines abstract goals and security model provides the how to
What operates in the security environment at the highest level of classification of the information within the computer. In other words, all users on that system must have clearance to access the info on that system.
Single State Machine
What type of security models are interested in the snapshot of the system at a moment in time. Many activities can alter state (state transitions). If something unsafe happens, system must save itself. Error message, reboot, freeze.
State Machine Model
What type of security model:
Describes strict layers of subjects and objects and defines clear rules that allow or disallow interactions
Provides upper bound and lower bound of authorized access for subjects
Uses security clearance and labels
Multi level lattice models
What type of security model has one to one relationships between subjects and objects?
Matrix models
What type of security model help ensure that high level actions (inputs) do not determine what low level users can see (outputs)?
Actions that take place at a higher security level do not affect or interfere with actions at a lower level
Noninterference models
What type of security model is not as concerned with subject to object relationship?
How data is allowed or not allowed between objects
Information flow models
What is a covert channel?
A way for an entity to receive info in unauthorized way

Caused by:
Improper oversight in development
Improper implementation of access controls
Existence of shared resource between two entities
What are the three rules for Bell LaPadula?
1. The simple security rule - subject cannot read to a higher security level - no read up
2. *-property rule - subject cannot write to lower security level - no write down
3. Strong star property rule - can only read and write to equal classification.
What are the three rules for the Biba model?
1. Simple integrity axiom - subject cannot read data from lower integrity level - no read down
2. *-integrity axiom - subject cannot write data to a higher integrity level - no write up
3. Invocation property - cannot request service (invoke) to subjects of a higher integrity
Is Clark Wilson an Integrity Model or Confidentiality Model?
Integrity model.

Meets all three goals of integrity
1. Subjects can access objects only through authorized programs (access triple)
2. Separation of duties is enforced
3. Auditing is required
Describe the Brewer and Nash Model.
AKA Chinese Wall model
Protect against conflicts of interest
Based on information flow model
What are the 4 levels of TCSEC?
A - Verified Protection
B - Mandatory Protection
C - Discretionary Protection
D - Minimal Protection
Which evaluation criteria is used in Europe?
ITSEC
Which evaluation criteria is the Orange Book?
TCSEC
What is certification?
comprehensive technical evaluation of the security components and their compliance for the purpose of accreditation.
What is accreditation
formal acceptance of the adequacy of a systems security and functionality
What are the three rules of Integrity?
1. Subjects can access objects only through authorized programs (access triple)
2. Separation of duties is enforced
3. Auditing is required
What are the three Integrity goals?
1. Preventing unauthorised users from making any modifications
2. Preventing authorised users from making unauthorised modifications
3. Maintaining internal and external consistency
What is the Access Triple?
Subject and object are oriented by introducing a third access element - programs - resulting in what is called an access triple, which prevents unauthorized users from modifying data or programs
What is Abstraction?
Finding commonality between objects and exploiting to make objects simpler to manage.
What are control units?
manages and synchronizes the system while instructions being executed. Fetches and interprets code
What is Pipelining?
Combines steps of different instructions.
What are Complex-Instruction-Set-Computer (CISC)?
Performs many operations per instruction
What are Reduced-Instruction-Set-Computer (RISC)?
Simpler instructions using fewer cycles
What is a Scalar processor?
execute one instruction at a time
What is a Superscalar processor?
enables concurrent execution of multiple instructions
What is Electrically Erasable ROM (EEPROM)?
Flash memory, can be written. More modern form of EPROM
What is Direct (absolute) Addressing?
CPU addresses memory by directly specifying the address
What is Register Direct Addressing?
CPU addresses memory by directly specifying the address the registers within a CPU
What is Register indirect addressing?
CPU addresses memory by addressing the register for the data's address in main memory
What is Indexed addressing?
CPU addresses memory by using an index register
What is Indirect addressing?
CPU addresses memory by addressing the desired location of the program in memory