Chapter 12 - Operating System Security - Computer Security: Principles and Practice, 2nd Edition

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/14

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

15 Terms

1
New cards

The three operating system security layers are

physical hardware, operating system kernel, and user applications and utilities

2
New cards

The aim of the specific system installation planning process is to

maximize security while minimizing costs

3
New cards

System security begins with

installation of the operating system

4
New cards

The final step in the process of initially securing the base operating system is

security testing

5
New cards

is a reactive control that can only inform you about bad things that have already happened

Logging

6
New cards

Is the process of making copies of data at regular intervals allowing the recovery of lost or corrupted data over relatively short time periods of a few hours to some weeks

Backup

7
New cards

Is the process of retaining copies of data over extended periods of time, being months or years, in order to meet legal and operational requirements to access past data

archive

8
New cards

_________ systems should validate all patches on test systems before deploying them to production systems

change controlled

9
New cards

Unix and Linux systems grant access permissions for each resource using the __________ ommand

chmod

10
New cards

Unix and Linux systems use a __________________ which restricts the server's view of the file system to just a specified portion

chroot jail

11
New cards

Configuration information in Windows systems is centralized in the __________, which forms a database of keys and values

registry

12
New cards

________________________ refers to a technology that provides an abstraction of the computing resources that run in a simulated environment

virtualization

13
New cards

Guest OSs are managed by a _____________________ or ______________, that coordinates access between each of the guests and the actual physical hardware resources

hypervisor or VMM

14
New cards

______________________________________ systems are more common in clients, where they run along side other applications on the host OS, and are used to support applications for alternate operating system versions or types

Hosted virtualization

15
New cards

______________________________________ systems are typically seen in servers, with the goal of improving the execution efficiency of the hardware

Native virtualization