d686 all

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/829

flashcard set

Earn XP

Description and Tags

all the terms

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

830 Terms

1
New cards

mechanisms

implement the enforcement of protection policies and control access to resources

2
New cards

policies

set rules for how resources should be accessed and used, providing guidelines for access control

3
New cards

principle of least privilege

A design principle stating that every program and every privileged user of the system should operate using the least amount of privilege necessary to complete the job.

4
New cards

permissions

An entity's access rights to an object (e.g., a user's access rights to a file).

5
New cards

compartmentalization

The process of protecting each system component through the use of specific permissions and access restrictions.

6
New cards

audit trail

The collection of activities in a log for monitoring or review.

7
New cards

defense in depth

The theory that more layers of defense provide stronger defense than fewer layers.

8
New cards

principle of least privilege

A design principle stating that every program and every privileged user of the system should operate using the least amount of privilege necessary to complete the job.

9
New cards

protection rings

a model for privilege separation where concentric rings represent different privilege levels, with inner rings having higher privileges

10
New cards

ring 3

the outermost ring with the lowest privileges, where user-mode code runs with restricted access

11
New cards

ring 0

the innermost ring with the highest privileges, where the kernel operates with full access

12
New cards

hypervisor

The computer function that manages the virtual machine; also called a virtual machine manager (VMM).

13
New cards

TrustZone (TZ)

ARM processor implementation of the most secure protection ring.

14
New cards

secure monitor call (SMC)

An ARM processor special instruction that can be used by the kernel to request services from the TrustZone.

15
New cards

hardware objects

The CPU, memory devices, input/output (I/O) devices, and any other physical components that are part of a computer

16
New cards

software objects

The software components that make up a computer or device (files, programs, semaphores, etc.).

17
New cards

need-to-know principle

The principle that only those resources currently needed should be available to use at a given time.

18
New cards

protection domain

In protection, a set of resources that a process may access. In virtualization, a virtual machine manager creates a protection domain for each guest to inform the CPU of which physical memory pages belong to that guest.

19
New cards

access right

The ability to execute an operation on an object.

20
New cards

domain switching

The mechanism for switching dynamic domains

21
New cards

access matrix

An abstract model of protection in which each row represents a domain, each column an object, and each entry a set of access rights.

22
New cards

confinement problem

The problem of guaranteeing that no information initially held in an object can migrate outside of its execution environment.

23
New cards

access list

a set of rules that controls the permissions granted to users or systems for accessing various resources, such as files, directories, or network services

24
New cards

capability list

a protection mechanism listing objects and the permitted operations on each

25
New cards

capability

a token or key representing an object's access rights in a capability list

26
New cards

role-based access control (RBAC)

a method of access control in which roles rather than individual users directly receive permissions, enhancing security and simplifying administration

27
New cards

mandatory access control (MAC)

security settings enforced by system policies that restrict access based on predefined rules and labels.

28
New cards

role

a predefined set of permissions assigned to users based on their organizational position or function within RBAC systems

29
New cards

discretionary access control (DAC)

permission system that allows users to decide who can access files and resources

30
New cards

labels

identifiers assigned to objects or users in a system; used to enforce security policies

31
New cards

mount point

The location within the file structure where a file system is attached

32
New cards

raw disk

Direct access to a secondary storage device as an array of blocks with no file system.

33
New cards

bootstrap loader

The small program that loads the kernel as part of the bootstrap procedure.

34
New cards

dual-booted

A term describing a computer that can boot one of two or more installed operating systems.

35
New cards

root partition

The storage partition that contains the kernel and the root file system; the one mounted at boot.

36
New cards

new technology file system (NTFS)

Microsoft-designed file system, successor to FAT32, supports 64-bit volume sizes, provides journaling for reliability, file-based data compression

37
New cards

EXT2

second extended file system, no journaling, and recommended for flash drives and USB drives.

38
New cards

EXT3

third extended file system, supports journaling, and reduces file system corruption risk

39
New cards

EXT4

fourth extended file system supports large file and system sizes, and new features like multiblock allocation, delayed allocation, and journal checksum

40
New cards

master file table (MFT)

contains file records like inodes, organized in a B-Tree structure, managed like any other file

41
New cards

metafiles

special files managed like regular files, including log file, volume file, attribute definition file, bitmap file, boot file, bad cluster file, and root directory

42
New cards

volume bitmap

identifies free space within the volume, can grow dynamically

43
New cards

file record

entry in MFT containing attributes such as file name, creation date, permissions, can contain small files and directories, or pointers to file data for large files

44
New cards

data streams

multiple data streams can be associated with a file, default is the mainstream

45
New cards

directories

contain file names and references, organized as a sorted B+ tree for large directories, redundant data for optimization.

46
New cards

EXT2/EXT3/EXT4 file systems

Linux file systems, each with distinct features and capabilities

47
New cards

security

the protection of computer systems and data from unauthorized access, corruption, and breaches, ensuring data integrity, confidentiality, and proper user authentication

48
New cards

protection

rules and tools used to control who can access and use system resources, making sure only authorized users and processes can interact with files and data

49
New cards

attacker

a person trying to harm or gain unauthorized access to a computer system

50
New cards

attack

an attempt to harm or gain unauthorized access to a computer system

51
New cards

threat

a potential danger to the security of a system 

52
New cards

security violations

unauthorized actions or breaches that compromise the confidentiality, integrity, or availability of a system, data, or network

53
New cards

denial-of-service (DoS)

blocking the normal use of a system by overwhelming it with requests that slow or stop its normal functions

54
New cards

masquerading

pretending to be someone else to gain unauthorized access

55
New cards

replay attack

repeating a valid data transmission to trick a system

56
New cards

man-in-the-middle attack

when an attacker secretly intercepts and alters the communication between two parties

57
New cards

session hijacking

taking control of a communication session between two parties

58
New cards

privilege escalation

gaining more privileges than a person or system should have

59
New cards

secure

The state of a system whose resources are used and accessed as intended under all circumstances.

60
New cards

intruder

Someone attempting to breach security.

61
New cards

hacker

Someone attempting to breach computer security.

62
New cards

attacker

Someone attempting to breach a computer system's security.

63
New cards

threat

The potential for a security violation.

64
New cards

attack

An attempt to break a computer system's security.

65
New cards

denial-of-service

Preventing legitimate use of a system.

66
New cards

masquerading

A practice in which a participant in a communication pretends to be someone else (another host or another person).

67
New cards

authentication

The process of correctly identifying a person or device. In cryptography, constraining the set of potential senders of a message.

68
New cards

replay attack

The malicious or fraudulent repetition of a valid transmission.

69
New cards

man-in-the-middle attack

An attack in which the attacker sits in the middle of the data flow of a communication, masquerading as the sender to the receiver and vice versa

70
New cards

session hijacking

The interception of a communication.

71
New cards

privilege escalation

The enabling of more privileges than an entity (process, system, person) should have.

72
New cards

attack surface

The sum of the methods available to attack a system (e.g., all of the network ports that are open, plus physical access).

73
New cards

social engineering

A practice in which an attacker tricks someone into performing some task for the attacker (such as sending the attacker confidential information).

74
New cards

phishing

A class of social engineering attacks in which a legitimate-looking e-mail or website tricks a user into breaching confidentiality or enabling privilege escalation.

75
New cards

malware

software created to harm, exploit, or take control of computer systems

76
New cards

logic bomb

malware that activates when specific conditions are met

77
New cards

ransomware

malware that locks or encrypts your computer files and demands payment to unlock them

78
New cards

spyware

a type of malware that secretly collects information about a person or organization

79
New cards

trap door

a hidden way into a computer system left by an attacker for future access

80
New cards

back door

a secret method of accessing a computer system, often left by an attacker after a successful hack

81
New cards

Trojan Horse

a program that appears harmless but performs harmful actions

82
New cards

code-injection attack

an attack where harmful code is added to a good program

83
New cards

virus

a harmful piece of code that copies itself and can damage or change files and programs

84
New cards

worm

malware that spreads itself between computers without human help

85
New cards

secure by default

Describes a system or computer whose initial configuration decreases its attack surface.

86
New cards

zombie systems

Compromised systems that are being used by attackers without the owners' knowledge

87
New cards

sniffing

An attack in which the attacker monitors network traffic to obtain useful information.

88
New cards

spoof

The imitation of a legitimate identifier (such as an IP address) by an illegitimate user or system.

89
New cards

distributed denial-of-service attack (DDoS)

An attack from multiple sources (frequently a botnet of zombies) with the purpose of denying legitimate use of the attacked resource.

90
New cards

cryptography

A tool used to constrain the potential senders and/or receivers of a message (or stored data).

91
New cards

keys

In the context of protection, unique bit patterns held by domains corresponding with unique bit patterns (locks) held by objects. Generally, secrets used in cryptography.

92
New cards

encryption

The use of cryptography to limit the receivers of a message or access to data.

93
New cards

cryptography

A tool used to constrain the potential senders and/or receivers of a message (or stored data)

94
New cards

keys

In the context of protection, unique bit patterns held by domains corresponding with unique bit patterns (locks) held by objects. Generally, secrets used in cryptography.

95
New cards

encryption

The use of cryptography to limit the receivers of a message or access to data.

96
New cards

symmetric encryption algorithm

A cryptography algorithm in which the same keys are used to encrypt and decrypt the message or data.

97
New cards

data-encryption standard (DES)

A cipher (algorithm for doing encryption and decryption) provided by the U.S. National Institute of Standards and Technology (NIST).

98
New cards

block cipher

A cipher that works on blocks of data (rather than bits).

99
New cards

triple DES

A modification of DES that uses the same algorithm three times and uses two or three keys to make the encryption more difficult to break.

100
New cards

advanced encryption standard (AES)

The NIST cipher designed to replace DES and triple DES.