• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/10

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

10 Cards in this Set

  • Front
  • Back
Two systems can have the exact same hardware, software components, and applications, but provide different levels of protection because of the different security policies and ___________ the two systems were built upon.
security models
A _________ contains a control unit, which controls the timing of the execution of instructions and data, and an ALU, which performs mathematical functions and logical operations.
CPU
Most systems use protection rings. The more privileged processes run in the ___________ rings and have access to all or most of the system resources. Applications run in the ____________ and have access to a smaller amount of resources.
Privileged processes run lower-numbered rings. Applications run in higher-numbered rings.
Operating system processes are executed in __________, and applications are executed in user mode, also known as "problem state".
privileged mode or supervisor mode
__________ storage is nonvolatile and can be a hard drive, CD-ROM drive, floppy drive, tape backup, or a jump drive.
Secondary
__________ storage combines RAM and secondary storage so the system seems to have a larger bank of memory.
Virtual
A __________ situation occurs when two processes are trying to access the same resource at the same time.
deadlock
Security mechanisms can focus on different issues, work at different layers, and vary in complexity. The more complex a security mechanism is, the less amount of ________ it can usually provide.
assurance
Not all system components fall under the trusted computing base (TCB), which includes only those system components that enforce the security policy directly and protect the system. These components are within the __________.
security perimeter
Components that make up the TCB are _________, __________, and _________ that provide some type of security protection.
hardware, software, and firmware