Module 3.2.2 - Fork Bombs & CIA Triad

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/8

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 9:02 PM on 5/23/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

9 Terms

1
New cards

Availability

The classification from the information security CIA triad that is targeted by a Denial of Service attack, such as a fork bomb.

2
New cards

Process table

The system component that eventually fills up during a fork bomb attack, preventing the creation of any new processes.

3
New cards

ulimit -u

The Linux BASH command and flag used by system administrators to prevent fork bomb attacks by setting limits on the number of processes a user can initiate.

4
New cards

categorize, threats, security

The CIA triad allows security professionals to __ various __ and attacks and is a key concept in information __.

5
New cards

virus, service, processes, table

A fork bomb is also known as a rabbit __ or wabbit and is a denial of __ attack that targets a system by launching new __ until no more can be created because the process __ is full.

6
New cards

availability, system

A fork bomb is an attack on __ as it prevents users from being able to use __ when they need them.

7
New cards

Confidentiality

The element of the CIA triad that means information must be kept private and secure.

8
New cards

Integrity

The element of the CIA triad which means that data should not be modified, deleted or added to by unauthorized persons or systems.

9
New cards

Availability

The element of the CIA triad which means that systems must be available to whomever requires them.