Chapter 15 - D686 - Operating Systems

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/63

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 7:01 AM on 11/2/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

64 Terms

1
New cards

security

the protection of computer systems and data from unauthorized access, corruption, and breaches, ensuring data integrity, confidentiality, and proper user authentication

2
New cards

protection

rules and tools used to control who can access and use system resources, making sure only authorized users and processes can interact with files and data

3
New cards

attacker

a person trying to harm or gain unauthorized access to a computer system

4
New cards

attack

an attempt to harm or gain unauthorized access to a computer system

5
New cards

threat

a potential danger to the security of a system

6
New cards

security violations

unauthorized actions or breaches that compromise the confidentiality, integrity, or availability of a system, data, or network

7
New cards

denial-of-service (DoS)

blocking the normal use of a system by overwhelming it with requests that slow or stop its normal functions

8
New cards

masquerading

pretending to be someone else to gain unauthorized access

9
New cards

replay attack

repeating a valid data transmission to trick a system

10
New cards

man-in-the-middle attack

when an attacker secretly intercepts and alters the communication between two parties

11
New cards

session hijacking

taking control of a communication session between two parties

12
New cards

privilege escalation

gaining more privileges than a person or system should have

13
New cards

attack surface

The sum of the methods available to attack a system (e.g., all of the network ports that are open, plus physical access).

14
New cards

social engineering

A practice in which an attacker tricks someone into performing some task for the attacker (such as sending the attacker confidential information).

15
New cards

phishing

A class of social engineering attacks in which a legitimate-looking e-mail or website tricks a user into breaching confidentiality or enabling privilege escalation.

16
New cards

malware

software created to harm, exploit, or take control of computer systems

17
New cards

logic bomb

malware that activates when specific conditions are met

18
New cards

ransomware

malware that locks or encrypts your computer files and demands payment to unlock them

19
New cards

spyware

a type of malware that secretly collects information about a person or organization

20
New cards

trap door

a hidden way into a computer system left by an attacker for future access

21
New cards

back door

a secret method of accessing a computer system, often left by an attacker after a successful hack

22
New cards

Trojan Horse

a program that appears harmless but performs harmful actions

23
New cards

code-injection attack

an attack where harmful code is added to a good program

24
New cards

virus

a harmful piece of code that copies itself and can damage or change files and programs

25
New cards

worm

malware that spreads itself between computers without human help

26
New cards

secure by default

Describes a system or computer whose initial configuration decreases its attack surface.

27
New cards

zombie systems

Compromised systems that are being used by attackers without the owners' knowledge.

28
New cards

sniffing

An attack in which the attacker monitors network traffic to obtain useful information.

29
New cards

spoof

The imitation of a legitimate identifier (such as an IP address) by an illegitimate user or system.

30
New cards

distributed denial-of-service attack (DDoS)

An attack from multiple sources (frequently a botnet of zombies) with the purpose of denying legitimate use of the attacked resource.

31
New cards

cryptography

the practice of securing communication and data by restricting who can read or send information

32
New cards

keys

secret codes used in cryptography to encrypt and decrypt messages, ensuring only authorized parties can read the information

33
New cards

encryption

The use of cryptography to limit the receivers of a message or access to data.

34
New cards

symmetric encryption algorithm

A cryptography algorithm in which the same keys are used to encrypt and decrypt the message or data.

35
New cards

data-encryption standard (DES)

A cipher (algorithm for doing encryption and decryption) provided by the U.S. National Institute of Standards and Technology (NIST).

36
New cards

block cipher

A cipher that works on blocks of data (rather than bits).

37
New cards

advanced encryption standard (AES)

The NIST cipher designed to replace DES and triple DES.

38
New cards

asymmetric encryption algorithm

A cipher algorithm in which different keys are used for encryption and decryption.

39
New cards

public key encryption

A cipher algorithm in which different keys are used for encryption and decryption.

40
New cards

RSA

The most widely used public key cipher

41
New cards

public key

In asymmetric encryption algorithm, a key that can be distributed for encrypting and decrypting.

42
New cards

private key

In an asymmetric encryption algorithm, a key that must be kept private for use in authenticating, encrypting, and decrypting.

43
New cards

authentication

the process of verifying the identity of a person or device, ensuring they are who they claim to be

44
New cards

On UNIX systems, the _____ value is added to the password to ensure that if two passwords are the same, they result in different hash values.

salt

45
New cards

user authentication

The identification of a user of a computer.

46
New cards

password

A secret key, usually used to authenticate a user to a computer.

47
New cards

shoulder surfing

Attempting to learn a password or other secret information by watching the target user at the keyboard.

48
New cards

sniff

In network communication, to capture information by recording data as it is transmitted.

49
New cards

paired password

In authentication, a challenge-response set of secret keys, where only the correct response to the challenge provides authentication.

50
New cards

one-time password

A password that is only valid once.

51
New cards

passphrase

A longer, generally more secure password composed of multiple words.

52
New cards

personal identification number

A usually short and not very secure password composed of some combination of digits 0-9.

53
New cards

two-factor authentication

Authentication based on two separate sources of data (e.g., a brain providing a password and a finger providing a fingerprint).

54
New cards

multifactor authentication

Authentication based on two or more sources of data, with more sources generally providing stronger authentication.

55
New cards

What ensures system integrity and data preservation in computer systems?

Ensuring security

56
New cards

How does a breach of confidentiality differ from a breach of integrity? 

A breach of confidentiality involves unauthorized reading of data, while a breach of integrity involves modifying data.

57
New cards

Which method allows an attacker to intercept and alter communication between two parties?

Man-in-the-middle attack

58
New cards

How does the four-layered security model protect systems?

By securing each layer

59
New cards

What disguises itself as legitimate software to perform harmful actions?

Trojan horse

60
New cards

How does a logic bomb operate within a system

It activates under specific conditions

61
New cards

Which type of network attack involves taking control of an active communication session?

Session hijacking

62
New cards

What is the goal of a denial-of-service attack?

Disrupting system use

63
New cards

Which technique ensures data has not been altered during transmission?

Digital signatures

64
New cards

What converts data into a code to prevent unauthorized access?

Encryption