D686: Operating Systems for Computer Scientists (chapter 16)

studied byStudied by 2 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 29

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

30 Terms

1

mechanisms

implement the enforcement of protection policies and control access to resources

New cards
2

policies

set rules for how resources should be accessed and used, providing guidelines for access control

New cards
3

principle of least privilege

A design principle stating that every program and every privileged user of the system should operate using the least amount of privilege necessary to complete the job.

New cards
4

permissions

An entity's access rights to an object (e.g., a user's access rights to a file).

New cards
5

compartmentalization

The process of protecting each system component through the use of specific permissions and access restrictions.

New cards
6

audit trail

The collection of activities in a log for monitoring or review.

New cards
7

defense in depth

The theory that more layers of defense provide stronger defense than fewer layers.

New cards
8

privilege separation

a security technique that divides system operations into different levels of access or privileges, restricting higher-privileged tasks to certain users or processes to reduce the risk of unauthorized access or damage to critical system components

New cards
9

protection rings

a model for privilege separation where concentric rings represent different privilege levels, with inner rings having higher privileges

New cards
10

ring 3

the outermost ring with the lowest privileges, where user-mode code runs with restricted access

New cards
11

ring 0

the innermost ring with the highest privileges, where the kernel operates with full access

New cards
12

hypervisor

The computer function that manages the virtual machine; also called a virtual machine manager (VMM).

New cards
13

TrustZone (TZ)

ARM processor implementation of the most secure protection ring.

New cards
14

secure monitor call (SMC)

An ARM processor special instruction that can be used by the kernel to request services from the TrustZone.

New cards
15

hardware objects

The CPU, memory devices, input/output (I/O) devices, and any other physical components that are part of a computer

New cards
16

software objects

The software components that make up a computer or device (files, programs, semaphores, etc.).

New cards
17

need-to-know principle

The principle that only those resources currently needed should be available to use at a given time.

New cards
18

protection domain

In protection, a set of resources that a process may access. In virtualization, a virtual machine manager creates a protection domain for each guest to inform the CPU of which physical memory pages belong to that guest.

New cards
19

access right

The ability to execute an operation on an object.

New cards
20

domain switching

The mechanism for switching dynamic domains

New cards
21

access matrix

An abstract model of protection in which each row represents a domain, each column an object, and each entry a set of access rights.

New cards
22

confinement problem

The problem of guaranteeing that no information initially held in an object can migrate outside of its execution environment.

New cards
23

access list

a set of rules that controls the permissions granted to users or systems for accessing various resources, such as files, directories, or network services

New cards
24

capability list

a protection mechanism listing objects and the permitted operations on each

New cards
25

capability

a token or key representing an object's access rights in a capability list

New cards
26

role-based access control (RBAC)

a method of access control in which roles rather than individual users directly receive permissions, enhancing security and simplifying administration

New cards
27

mandatory access control (MAC)

security settings enforced by system policies that restrict access based on predefined rules and labels.

New cards
28

role

a predefined set of permissions assigned to users based on their organizational position or function within RBAC systems

New cards
29

discretionary access control (DAC)

permission system that allows users to decide who can access files and resources

New cards
30

labels

identifiers assigned to objects or users in a system; used to enforce security policies

New cards
robot