D686: Operating Systems for Computer Scientists (chapter 14)

studied byStudied by 2 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 103

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

104 Terms

1

mount point

The location within the file structure where a file system is attached

New cards
2

raw disk

Direct access to a secondary storage device as an array of blocks with no file system.

New cards
3

bootstrap loader

The small program that loads the kernel as part of the bootstrap procedure.

New cards
4

dual-booted

A term describing a computer that can boot one of two or more installed operating systems.

New cards
5

root partition

The storage partition that contains the kernel and the root file system; the one mounted at boot.

New cards
6

new technology file system (NTFS)

Microsoft-designed file system, successor to FAT32, supports 64-bit volume sizes, provides journaling for reliability, file-based data compression

New cards
7

EXT2

second extended file system, no journaling, and recommended for flash drives and USB drives.

New cards
8

EXT3

third extended file system, supports journaling, and reduces file system corruption risk

New cards
9

EXT4

fourth extended file system supports large file and system sizes, and new features like multiblock allocation, delayed allocation, and journal checksum

New cards
10

master file table (MFT)

contains file records like inodes, organized in a B-Tree structure, managed like any other file

New cards
11

metafiles

special files managed like regular files, including log file, volume file, attribute definition file, bitmap file, boot file, bad cluster file, and root directory

New cards
12

volume bitmap

identifies free space within the volume, can grow dynamically

New cards
13

file record

entry in MFT containing attributes such as file name, creation date, permissions, can contain small files and directories, or pointers to file data for large files

New cards
14

data streams

multiple data streams can be associated with a file, default is the mainstream

New cards
15

directories

contain file names and references, organized as a sorted B+ tree for large directories, redundant data for optimization.

New cards
16

EXT2/EXT3/EXT4 file systems

Linux file systems, each with distinct features and capabilities

New cards
17

security

the protection of computer systems and data from unauthorized access, corruption, and breaches, ensuring data integrity, confidentiality, and proper user authentication

New cards
18

protection

rules and tools used to control who can access and use system resources, making sure only authorized users and processes can interact with files and data

New cards
19

attacker

a person trying to harm or gain unauthorized access to a computer system

New cards
20

attack

an attempt to harm or gain unauthorized access to a computer system

New cards
21

threat

a potential danger to the security of a system 

New cards
22

security violations

unauthorized actions or breaches that compromise the confidentiality, integrity, or availability of a system, data, or network

New cards
23

denial-of-service (DoS)

blocking the normal use of a system by overwhelming it with requests that slow or stop its normal functions

New cards
24

masquerading

pretending to be someone else to gain unauthorized access

New cards
25

replay attack

repeating a valid data transmission to trick a system

New cards
26

man-in-the-middle attack

when an attacker secretly intercepts and alters the communication between two parties

New cards
27

session hijacking

taking control of a communication session between two parties

New cards
28

privilege escalation

gaining more privileges than a person or system should have

New cards
29

secure

The state of a system whose resources are used and accessed as intended under all circumstances.

New cards
30

intruder

Someone attempting to breach security.

New cards
31

hacker

Someone attempting to breach computer security.

New cards
32

attacker

Someone attempting to breach a computer system's security.

New cards
33

threat

The potential for a security violation.

New cards
34

attack

An attempt to break a computer system's security.

New cards
35

denial-of-service

Preventing legitimate use of a system.

New cards
36

masquerading

A practice in which a participant in a communication pretends to be someone else (another host or another person).

New cards
37

authentication

The process of correctly identifying a person or device. In cryptography, constraining the set of potential senders of a message.

New cards
38

replay attack

The malicious or fraudulent repetition of a valid transmission.

New cards
39

man-in-the-middle attack

An attack in which the attacker sits in the middle of the data flow of a communication, masquerading as the sender to the receiver and vice versa

New cards
40

session hijacking

The interception of a communication.

New cards
41

privilege escalation

The enabling of more privileges than an entity (process, system, person) should have.

New cards
42

attack surface

The sum of the methods available to attack a system (e.g., all of the network ports that are open, plus physical access).

New cards
43

social engineering

A practice in which an attacker tricks someone into performing some task for the attacker (such as sending the attacker confidential information).

New cards
44

phishing

A class of social engineering attacks in which a legitimate-looking e-mail or website tricks a user into breaching confidentiality or enabling privilege escalation.

New cards
45

malware

software created to harm, exploit, or take control of computer systems

New cards
46

logic bomb

malware that activates when specific conditions are met

New cards
47

ransomware

malware that locks or encrypts your computer files and demands payment to unlock them

New cards
48

spyware

a type of malware that secretly collects information about a person or organization

New cards
49

trap door

a hidden way into a computer system left by an attacker for future access

New cards
50

back door

a secret method of accessing a computer system, often left by an attacker after a successful hack

New cards
51

Trojan Horse

a program that appears harmless but performs harmful actions

New cards
52

code-injection attack

an attack where harmful code is added to a good program

New cards
53

virus

a harmful piece of code that copies itself and can damage or change files and programs

New cards
54

worm

malware that spreads itself between computers without human help

New cards
55

secure by default

Describes a system or computer whose initial configuration decreases its attack surface.

New cards
56

zombie systems

Compromised systems that are being used by attackers without the owners' knowledge

New cards
57

sniffing

An attack in which the attacker monitors network traffic to obtain useful information.

New cards
58

spoof

The imitation of a legitimate identifier (such as an IP address) by an illegitimate user or system.

New cards
59

distributed denial-of-service attack (DDoS)

An attack from multiple sources (frequently a botnet of zombies) with the purpose of denying legitimate use of the attacked resource.

New cards
60

cryptography

A tool used to constrain the potential senders and/or receivers of a message (or stored data).

New cards
61

keys

In the context of protection, unique bit patterns held by domains corresponding with unique bit patterns (locks) held by objects. Generally, secrets used in cryptography.

New cards
62

encryption

The use of cryptography to limit the receivers of a message or access to data.

New cards
63

cryptography

A tool used to constrain the potential senders and/or receivers of a message (or stored data)

New cards
64

keys

In the context of protection, unique bit patterns held by domains corresponding with unique bit patterns (locks) held by objects. Generally, secrets used in cryptography.

New cards
65

encryption

The use of cryptography to limit the receivers of a message or access to data.

New cards
66

symmetric encryption algorithm

A cryptography algorithm in which the same keys are used to encrypt and decrypt the message or data.

New cards
67

data-encryption standard (DES)

A cipher (algorithm for doing encryption and decryption) provided by the U.S. National Institute of Standards and Technology (NIST).

New cards
68

block cipher

A cipher that works on blocks of data (rather than bits).

New cards
69

triple DES

A modification of DES that uses the same algorithm three times and uses two or three keys to make the encryption more difficult to break.

New cards
70

advanced encryption standard (AES)

The NIST cipher designed to replace DES and triple DES.

New cards
71

stream cipher

A cipher that encrypts or decrypts a stream of bits or bytes (rather than a block).

New cards
72

keystream

An infinite set of bits used to encrypt a plain-text stream through an XOR operation in a stream cipher.

New cards
73

asymmetric encryption algorithm

A cipher algorithm in which different keys are used for encryption and decryption.

New cards
74

public key encryption

A cipher algorithm in which different keys are used for encryption and decryption.

New cards
75

RSA

The most widely used public key cipher.

New cards
76

public key

In asymmetric encryption algorithm, a key that can be distributed for encrypting and decrypting.

New cards
77

private key

In an asymmetric encryption algorithm, a key that must be kept private for use in authenticating, encrypting, and decrypting.

New cards
78

hash function

A function that takes data as its input, performs a numeric operation on the data, and returns a numeric value. Also, an algorithm for creating a hash (a small, fixed-size block of data calculated from a larger data set, used to determine if a message has been changed).

New cards
79

message digest

The calculation resulting from a hash function

New cards
80

hash value

The calculation resulting from a hash function.

New cards
81

SHA-1

An algorithm for creating a hash (a small, fixed-size block of data calculated from a larger data set, used to determine if a message has been changed).

New cards
82

message-authentication code (MAC)

A cryptographic checksum calculated in symmetric encryption; used to authenticate short values.

New cards
83

digital-signature algorithm

A cryptographic checksum calculated in asymmetric encryption; used to authenticate a message.

New cards
84

digital signature

The authenticator produced by a digital-signature algorithm

New cards
85

code signing

The use of a digital signature to authenticate a program

New cards
86

nonrepudiation

Proof that an entity performed an action (frequently performed by digital signatures).

New cards
87

out-of-band

In networking, a term describing data delivered in a manner independent of the main data stream (e.g., delivery of a symmetric key in a paper document).

New cards
88

digital certificate

A public key digitally signed by a trusted party

New cards
89

certificate authority

A trusted signer of digital certificates

New cards
90

Internet protocol security (IPSec)

A network protocol suite providing authentication and symmetric-key encryption of packets of network data.

New cards
91

Internet key exchange (IKE)

A protocol that uses public key encryption to allow secure symmetric key exchange for IPSec.

New cards
92

virtual private network (VPN)

An encrypted tunnel between two systems, commonly using IPSec, allowing secure remote access.

New cards
93

transport layer security (TLS)

A cryptographic protocol that enables two computers to communicate securely; the standard protocol by which web browsers communicate to web servers.

New cards
94

session key

The TLS symmetric key, used for a web communication session, exchanged via asymmetric cryptography.

New cards
95

user authentication

The identification of a user of a computer.

New cards
96

password

A secret key, usually used to authenticate a user to a computer.

New cards
97

shoulder surfing

Attempting to learn a password or other secret information by watching the target user at the keyboard.

New cards
98

sniff

In network communication, to capture information by recording data as it is transmitted.

New cards
99

paired password

In authentication, a challenge-response set of secret keys, where only the correct response to the challenge provides authentication

New cards
100

one-time password

A password that is only valid once.

New cards
robot