OPERATING SYSTEMS SECURITY (WEEK 3)

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/40

flashcard set

Earn XP

Description and Tags

reviewer for operating systems security (week3)

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

41 Terms

1
New cards

Software platforms made to govern and control a personal computer's (PC) or workstation's fundamental activities.

DESKTOP OS

2
New cards

Desktop operating systems provide a _________, nowadays are mostly graphical interfaces (GUI), that includes a desktop environment, icons, windows, menus, controls, and a pointer (usually a mouse or touchpad).

CHARACTERISTICS OF OS
User Interface

3
New cards

Users can create, organize, and manage files and folders on their computer's storage devices (e.g., hard drives, SSDs) using the file explorer or file manager provided by the operating system

CHARACTERISTICS OF OS
File Management

4
New cards

The OS manages computer hardware components, such as the central processing unit (CPU), memory (RAM), storage devices, input/output devices (keyboard, mouse, display), and peripherals (printers, scanners).

CHARACTERISTICS OF OS
Hardware Management

5
New cards

Desktop operating systems enable _________, allowing users to run multiple applications concurrently. They allocate system resources efficiently to ensure smooth operation

CHARACTERISTICS OF OS
Multitasking

6
New cards

Operating systems include device drivers that facilitate communication between hardware devices (e.g., graphics card, sound card, network adapter) and the software running on the computer.

CHARACTERISTICS OF OS
Device Drivers

7
New cards

OSs implement _________ measures to protect the computer from threats, including user authentication, access control, firewall settings, and antivirus integration.

CHARACTERISTICS OF OS
Security

8
New cards

Desktop OSs support network connectivity, enabling users to access the internet, connect to local networks, and share resources with other devices. Network protocols and settings are managed by the OS.

CHARACTERISTICS OF OS
Networking

9
New cards

They provide compatibility layers and application programming interfaces (APIs) that allow software developers to create applications that run on the OS.

CHARACTERISTICS OF OS
Software Compatibility

10
New cards

Users create and manage accounts with unique profiles and settings. Access to system resources and files is controlled through user authentication and permissions.

CHARACTERISTICS OF OS
User Account Management

11
New cards

Operating systems implement _________ mechanisms that define which users or processes can access specific files, directories, or system resources.

DESKTOP COMPUTER SECURITY
Access Control

12
New cards

OSs assign file permissions to regulate who can read, write, or execute files and directories.

DESKTOP COMPUTER SECURITY
File Permissions.

13
New cards

___________ filter network traffic, allowing users to control which applications and services can communicate over the network.

DESKTOP COMPUTER SECURITY
Firewalls

14
New cards

Operating systems often support ____________ software, which scans for and removes malicious software, such as viruses, Trojans, and spyware

DESKTOP COMPUTER SECURITY
Antivirus and Anti-Malware Integration

15
New cards

Desktop operating systems release regular _____________ to address known vulnerabilities.

DESKTOP COMPUTER SECURITY
Security Updates and Patches

16
New cards

__________ is a feature that ensures that only trusted and signed operating system components and drivers are loaded during system startup.

DESKTOP COMPUTER SECURITY
Secure Boot

17
New cards

DESKTOP COMPUTER SECURITY
Encryption

18
New cards

OSs provide________ features to secure data at rest and in transit

DESKTOP COMPUTER SECURITY
Encryption

19
New cards

Operating systems generate logs and maintain audit trails of system activities.

DESKTOP COMPUTER SECURITY
Audit Trails and Logging

20
New cards

OSs allow administrators to enforce strong password policies, password expiration, and account lockout rules.

DESKTOP COMPUTER SECURITY
User Account Policies

21
New cards

Some operating systems use __________ techniques to isolate applications from one another and from system resources


DESKTOP COMPUTER SECURITY
Application Sandboxing

22
New cards

OSs often rely on __________ to verify the authenticity and integrity of software updates and applications

DESKTOP COMPUTER SECURITY
Digital Signatures

23
New cards

often referred to as user-level or user-space, is one of the privilege levels in the security architecture of an operating system. A restricted mode where most applications and processes run

User mode

24
New cards

They are not allowed to execute sensitive or privileged operations directly, such as accessing hardware resources or modifying the operating system kernel.

FUNCTIONS OF USER MODE
Restricted Privileges

25
New cards

Each user mode process runs in its own isolated environment, ensuring that one process cannot interfere with or directly access the memory or resources of another process.

FUNCTIONS OF USER MODE
Isolation

26
New cards

User mode processes can interact with the kernel and request access to system resources through system calls or API functions.

FUNCTIONS OF USER MODE
System Calls

27
New cards

The operating system manages and allocates system resources, such as memory, CPU time, and I/O devices, on behalf of user mode processes

FUNCTIONS OF USER MODE
Resource Management

28
New cards

Errors or exceptions that occur in user mode processes typically do not disrupt the entire system.

FUNCTIONS OF USER MODE
Error Handling

29
New cards

User mode processes execute within the context of a specific user account

FUNCTIONS OF USER MODE
User Account Context

30
New cards

Some operating systems or security tools implement _________ techniques to further isolate and control the behavior of user mode applications.

FUNCTIONS OF USER MODE
Application Sandbox

31
New cards

It operates at the highest privilege level and is responsible for managing and controlling the core functions of the operating system and hardware resources

Kernel Mode

32
New cards

Kernel mode operates with _______, allowing it to access and control all hardware resources and execute sensitive and privileged instructions.

Functions of Kernel Mode
Highest Privilege

33
New cards

The kernel is responsible for managing and allocating system resources, including CPU time, memory, input/output devices, and peripheral hardware

Functions of Kernel Mode
System Resource Management

34
New cards

User mode processes interact with the kernel through system calls or API functions to request access to hardware resources and perform privileged operations

Functions of Kernel Mode
System Calls

35
New cards

Enable communication between the operating system and hardware devices, typically run in kernel mode.

Functions of Kernel Mode
Device Drivers

36
New cards

Kernel mode enforces security policies and access control mechanisms to protect system resources and ensure data integrity.

Functions of Kernel Mode
Security Enforcement

37
New cards

Kernel mode is responsible for handling critical system errors and exceptions.

Functions of Kernel Mode
Error Handling

38
New cards

ernel mode processes are isolated from user mode processes to prevent unauthorized access or interference. ________________ mechanisms, such as virtual memory and isolation. hardware memory management units (MMUs), help enforce this

Functions of Kernel Mode
Memory Protection

39
New cards

The_________, including the scheduler, file system, memory manager, and process manager, operate in kernel mode

Functions of Kernel Mode
Operating System Core

40
New cards

Kernel mode can execute privileged CPU instructions that user mode cannot

Functions of Kernel Mode
Privileged Instructions

41
New cards

Ensuring the integrity of the kernel is paramount. Any compromise of the kernel could lead to security breaches, system instability, or unauthorized access to sensitive data

Functions of Kernel Mode
System Integrity