OPERATING SYSTEMS SECURITY (WEEK 3)

studied byStudied by 0 people
0.0(0)
Get a hint
Hint

Software platforms made to govern and control a personal computer's (PC) or workstation's fundamental activities.

1 / 40

flashcard set

Earn XP

Description and Tags

reviewer for operating systems security (week3)

41 Terms

1

Software platforms made to govern and control a personal computer's (PC) or workstation's fundamental activities.

DESKTOP OS

New cards
2

Desktop operating systems provide a _________, nowadays are mostly graphical interfaces (GUI), that includes a desktop environment, icons, windows, menus, controls, and a pointer (usually a mouse or touchpad).

CHARACTERISTICS OF OS
User Interface

New cards
3

Users can create, organize, and manage files and folders on their computer's storage devices (e.g., hard drives, SSDs) using the file explorer or file manager provided by the operating system

CHARACTERISTICS OF OS
File Management

New cards
4

The OS manages computer hardware components, such as the central processing unit (CPU), memory (RAM), storage devices, input/output devices (keyboard, mouse, display), and peripherals (printers, scanners).

CHARACTERISTICS OF OS
Hardware Management

New cards
5

Desktop operating systems enable _________, allowing users to run multiple applications concurrently. They allocate system resources efficiently to ensure smooth operation

CHARACTERISTICS OF OS
Multitasking

New cards
6

Operating systems include device drivers that facilitate communication between hardware devices (e.g., graphics card, sound card, network adapter) and the software running on the computer.

CHARACTERISTICS OF OS
Device Drivers

New cards
7

OSs implement _________ measures to protect the computer from threats, including user authentication, access control, firewall settings, and antivirus integration.

CHARACTERISTICS OF OS
Security

New cards
8

Desktop OSs support network connectivity, enabling users to access the internet, connect to local networks, and share resources with other devices. Network protocols and settings are managed by the OS.

CHARACTERISTICS OF OS
Networking

New cards
9

They provide compatibility layers and application programming interfaces (APIs) that allow software developers to create applications that run on the OS.

CHARACTERISTICS OF OS
Software Compatibility

New cards
10

Users create and manage accounts with unique profiles and settings. Access to system resources and files is controlled through user authentication and permissions.

CHARACTERISTICS OF OS
User Account Management

New cards
11

Operating systems implement _________ mechanisms that define which users or processes can access specific files, directories, or system resources.

DESKTOP COMPUTER SECURITY
Access Control

New cards
12

OSs assign file permissions to regulate who can read, write, or execute files and directories.

DESKTOP COMPUTER SECURITY
File Permissions.

New cards
13

___________ filter network traffic, allowing users to control which applications and services can communicate over the network.

DESKTOP COMPUTER SECURITY
Firewalls

New cards
14

Operating systems often support ____________ software, which scans for and removes malicious software, such as viruses, Trojans, and spyware

DESKTOP COMPUTER SECURITY
Antivirus and Anti-Malware Integration

New cards
15

Desktop operating systems release regular _____________ to address known vulnerabilities.

DESKTOP COMPUTER SECURITY
Security Updates and Patches

New cards
16

__________ is a feature that ensures that only trusted and signed operating system components and drivers are loaded during system startup.

DESKTOP COMPUTER SECURITY
Secure Boot

New cards
17

DESKTOP COMPUTER SECURITY
Encryption

New cards
18

OSs provide________ features to secure data at rest and in transit

DESKTOP COMPUTER SECURITY
Encryption

New cards
19

Operating systems generate logs and maintain audit trails of system activities.

DESKTOP COMPUTER SECURITY
Audit Trails and Logging

New cards
20

OSs allow administrators to enforce strong password policies, password expiration, and account lockout rules.

DESKTOP COMPUTER SECURITY
User Account Policies

New cards
21

Some operating systems use __________ techniques to isolate applications from one another and from system resources


DESKTOP COMPUTER SECURITY
Application Sandboxing

New cards
22

OSs often rely on __________ to verify the authenticity and integrity of software updates and applications

DESKTOP COMPUTER SECURITY
Digital Signatures

New cards
23

often referred to as user-level or user-space, is one of the privilege levels in the security architecture of an operating system. A restricted mode where most applications and processes run

User mode

New cards
24

They are not allowed to execute sensitive or privileged operations directly, such as accessing hardware resources or modifying the operating system kernel.

FUNCTIONS OF USER MODE
Restricted Privileges

New cards
25

Each user mode process runs in its own isolated environment, ensuring that one process cannot interfere with or directly access the memory or resources of another process.

FUNCTIONS OF USER MODE
Isolation

New cards
26

User mode processes can interact with the kernel and request access to system resources through system calls or API functions.

FUNCTIONS OF USER MODE
System Calls

New cards
27

The operating system manages and allocates system resources, such as memory, CPU time, and I/O devices, on behalf of user mode processes

FUNCTIONS OF USER MODE
Resource Management

New cards
28

Errors or exceptions that occur in user mode processes typically do not disrupt the entire system.

FUNCTIONS OF USER MODE
Error Handling

New cards
29

User mode processes execute within the context of a specific user account

FUNCTIONS OF USER MODE
User Account Context

New cards
30

Some operating systems or security tools implement _________ techniques to further isolate and control the behavior of user mode applications.

FUNCTIONS OF USER MODE
Application Sandbox

New cards
31

It operates at the highest privilege level and is responsible for managing and controlling the core functions of the operating system and hardware resources

Kernel Mode

New cards
32

Kernel mode operates with _______, allowing it to access and control all hardware resources and execute sensitive and privileged instructions.

Functions of Kernel Mode
Highest Privilege

New cards
33

The kernel is responsible for managing and allocating system resources, including CPU time, memory, input/output devices, and peripheral hardware

Functions of Kernel Mode
System Resource Management

New cards
34

User mode processes interact with the kernel through system calls or API functions to request access to hardware resources and perform privileged operations

Functions of Kernel Mode
System Calls

New cards
35

Enable communication between the operating system and hardware devices, typically run in kernel mode.

Functions of Kernel Mode
Device Drivers

New cards
36

Kernel mode enforces security policies and access control mechanisms to protect system resources and ensure data integrity.

Functions of Kernel Mode
Security Enforcement

New cards
37

Kernel mode is responsible for handling critical system errors and exceptions.

Functions of Kernel Mode
Error Handling

New cards
38

ernel mode processes are isolated from user mode processes to prevent unauthorized access or interference. ________________ mechanisms, such as virtual memory and isolation. hardware memory management units (MMUs), help enforce this

Functions of Kernel Mode
Memory Protection

New cards
39

The_________, including the scheduler, file system, memory manager, and process manager, operate in kernel mode

Functions of Kernel Mode
Operating System Core

New cards
40

Kernel mode can execute privileged CPU instructions that user mode cannot

Functions of Kernel Mode
Privileged Instructions

New cards
41

Ensuring the integrity of the kernel is paramount. Any compromise of the kernel could lead to security breaches, system instability, or unauthorized access to sensitive data

Functions of Kernel Mode
System Integrity

New cards

Explore top notes

note Note
studied byStudied by 80 people
... ago
5.0(3)
note Note
studied byStudied by 19 people
... ago
5.0(1)
note Note
studied byStudied by 24 people
... ago
5.0(1)
note Note
studied byStudied by 15 people
... ago
5.0(1)
note Note
studied byStudied by 42 people
... ago
5.0(2)
note Note
studied byStudied by 27 people
... ago
5.0(1)
note Note
studied byStudied by 13 people
... ago
5.0(1)
note Note
studied byStudied by 35266 people
... ago
4.8(98)

Explore top flashcards

flashcards Flashcard (64)
studied byStudied by 9 people
... ago
5.0(1)
flashcards Flashcard (38)
studied byStudied by 7 people
... ago
5.0(1)
flashcards Flashcard (53)
studied byStudied by 7 people
... ago
5.0(1)
flashcards Flashcard (46)
studied byStudied by 6 people
... ago
5.0(1)
flashcards Flashcard (27)
studied byStudied by 16 people
... ago
5.0(1)
flashcards Flashcard (50)
studied byStudied by 1 person
... ago
5.0(1)
flashcards Flashcard (58)
studied byStudied by 12 people
... ago
5.0(1)
flashcards Flashcard (28)
studied byStudied by 110 people
... ago
5.0(1)
robot