Term
|
Definition
ISO Standard that outlines the specifications of system architectures |
|
|
Term
|
Definition
A formal description & representation of a syste,. the components that make it up, the interactions & |
|
|
Term
|
Definition
Updated version of ISO/IEC 42010:2007 |
|
|
Term
|
Definition
Fundamental organization of a system embodied in its components , their relationships to eachother and to the enviornment |
|
|
Term
Architectural description |
|
Definition
collection of document types to convey an architecture in a formal manner |
|
|
Term
|
Definition
individual, team, or organization with interests in, or concerns relative to a system |
|
|
Term
|
Definition
representation of a whole system from the perspective of a related set of concerns |
|
|
Term
|
Definition
|
|
Term
|
Definition
all the parts of the computer system that are necessary for it to function including the OS etc etc. |
|
|
Term
|
Definition
|
|
Term
|
Definition
a temporary storage location |
|
|
Term
arithmetic logic unit (ALU) |
|
Definition
performs mathematical functions and logical operations on data |
|
|
Term
|
Definition
manages and synchronizes the system while different applications code and OS system instructions are being executed |
|
|
Term
|
Definition
hold variables and temporary results as the ALU works through execution steps |
|
|
Term
special registers (dedicated registers) |
|
Definition
hold information such as the program counter, stack pointer, and program status word. |
|
|
Term
|
Definition
a register that contains the memory address of the instruction to be fetched |
|
|
Term
|
Definition
holds different condition bits |
|
|
Term
|
Definition
a hardwired connection to the RAM chips and the individual IO devices |
|
|
Term
|
Definition
a mode when the processors are handed work as needed |
|
|
Term
|
Definition
a mode when a processor is in a dedicated state |
|
|
Term
|
Definition
International standard that provides guidelines on how to create and maintain system architectures |
|
|
Term
|
Definition
A program loaded in memory within an operating system |
|
|
Term
|
Definition
interleaved execution of more than one program |
|
|
Term
|
Definition
simultaneous execution of more than one program or task by an OS |
|
|
Term
|
Definition
multitasking scheme used by older systems to allow for computer resource time slicing |
|
|
Term
|
Definition
multitasking scheduling scheme used by NEWER OS to allow for computer resource slicing. Used in newer, more stable OS |
|
|
Term
process states (ready, running, blocked) |
|
Definition
processes can be in various activity levels Read- waiting for input Running- instruction being run Blocked- process suspended |
|
|
Term
|
Definition
values assigned to computer components to allow for efficient computer resource time slicing |
|
|
Term
|
Definition
interrupt value assigned to a noncritical OS activity |
|
|
Term
|
Definition
interrupt value assigned to a critical OS activity |
|
|
Term
|
Definition
application that can carry out multiple activities simultaneously by generating different instruction sets |
|
|
Term
|
Definition
two processes cannot complete their activities because they are both waiting for system resources to be released |
|
|
Term
|
Definition
protection mechanism provided by OS that can be implemented as encapsulation |
|
|
Term
|
Definition
a set of subroutines that are shared by different applications and OS processes |
|
|
Term
|
Definition
beginning of address space assigned to a process. Ensures a process does not make a request outside its assigned memory boundary |
|
|
Term
|
Definition
ending of address space assigned to a process |
|
|
Term
|
Definition
physically mapping software to individual memory segments |
|
|
Term
|
Definition
fast and expensive memory type used by CPU to increase reading and writing |
|
|
Term
|
Definition
hardware addresses used by the cpu |
|
|
Term
|
Definition
indirect addressing used by proceses within an OS. Memory manager carries this out |
|
|
Term
|
Definition
memory construct that is made up of individually addressable buffers. This is also how process communication takes place |
|
|
Term
|
Definition
too much data is put into the buffers. Common attack vector used by hackers to run malicious code |
|
|
Term
|
Definition
address space layout randomization |
|
|
Term
|
Definition
memory protection mechanism used by some OSs. addresses used by components or a process are randomize to make it harder for attachers |
|
|
Term
data execution prevention |
|
Definition
(DEP) memory protection mechanism used by some OS. Mem Segments may be marked nonexecutable so that they cannot be misused |
|
|
Term
|
Definition
a tool that marks unused memory segments as usable to ensure that an OS does not run out of memory |
|
|
Term
|
Definition
combination of main memory (RAM) and secondary memory within an OS |
|
|
Term
|
Definition
software or hardware signal that indicates that system resources are needed for instruction processing |
|
|
Term
|
Definition
set of operations and commands that can be implemented by a particular CPU |
|
|
Term
|
Definition
specific design of a microprocessor which includes physical components. |
|
|
Term
application programming interface |
|
Definition
software interface that enables process-to-process interaction. A common way to provide access to standard routines to a set of software programs |
|
|
Term
application programming interface |
|
Definition
software interface that enables process-to-process interaction. A common way to provide access to standard routines to a set of software programs |
|
|
Term
monolithic operating system architecture |
|
Definition
all the code of an OS working in kernel mode in an adhoc or non modularized manner. |
|
|
Term
|
Definition
use of segregation in design decisions to protect software components from negatively interacting with eachother. |
|
|
Term
|
Definition
reduced amount of code running in kernel mode carrying out critical OS functionality |
|
|
Term
hybrid microkernel architecture |
|
Definition
combination of monolithic and microkernel architectures. |
|
|
Term
|
Definition
when the CPU has to change from processing code in user mode to kernel mode. A protection measure that causes a performance hit. |
|
|
Term
|
Definition
creation of simulated enviornments that allow for central control and scalability |
|
|
Term
|
Definition
central program used to manage virtual machines (guests) within a simulated enviornment (host) |
|
|
Term
|
Definition
a strategic tool used to dictate how sensitive information and resources are to be managed and protected. |
|
|
Term
|
Definition
a collection of all the hardware, software, and firmware components within a system that provide security and enforce security policy. |
|
|
Term
|
Definition
trustworthy software channel that is used for communication between two processes that cannot be circumvented. |
|
|
Term
|
Definition
mechanism used to delineate between the components within and outside of the trusted computing base. |
|
|
Term
|
Definition
concept that defines a set of design requirements of a reference validation mechanism. |
|
|
Term
|
Definition
hardware, software and firmware components that fall within the TCB and implement and enforce the reference monitor concept. |
|
|
Term
multilevel security policies |
|
Definition
Policies that outline how a system can simultaneously process information at different classifications for users with different clearance levels |
|
|
Term
|
Definition
first mathematical model of a multilevel security policy that defines the concept of a secure state and necessary modes of access. |
|
|
Term
|
Definition
a model that also ensures that information only flows in a manner that does not violate the system policy and is confidentiality focused. |
|
|
Term
|
Definition
Bell Model Rule Subject cannot read data at a higher security level NO READ UP |
|
|
Term
|
Definition
Bell Model A subject cannot write to an object at a lower security level NO WRITE DOWN |
|
|
Term
strong star property rule |
|
Definition
Bell Model Subject can perform read and write functions only to the objects at its same security level |
|
|
Term
|
Definition
a formal state transition model that describes a set of access control rules designed to ensure data integrity |
|
|
Term
|
Definition
biba model subject cannot read data at a lower integrity level NO READ DOWN |
|
|
Term
|
Definition
bell model a subject cannot modify an object in a higher integrity level NO WRITE UP |
|
|
Term
|
Definition
integrity model implemented to protect the integrity of data and ensures properly formatted transactions take place. has 3 goals of integrity |
|
|
Term
|
Definition
clark wilson rule subjects can access objects only through authorized programs (access triple) |
|
|
Term
|
Definition
clark wilson model separation of duties is enforced |
|
|
Term
|
Definition
clark wilson model auditing is required |
|
|
Term
|
Definition
model in which information is restricted in its flow to only go to and from entities in a way that does not negate or violate the security policy |
|
|
Term
|
Definition
A formal multi-level security model that states the commands and activities performed at one security level should not be seen by, or affect, subjects or objects at a different security level. |
|
|
Term
|
Definition
security model that allows for dynamically changing access controls that protect against conflicts of interest. Also known as the chinese wall model |
|
|
Term
|
Definition
a security model that shows how subjects and objects should be created and deleted. Also addresses how to assign specific access rights. |
|
|
Term
harrison-ruzzo-ullman model |
|
Definition
security model that shows how a finite set of procedures can be available to edit the access rights of a subject. |
|
|
Term
assurance evaluation criteria |
|
Definition
a checklist and process of examining the security relevant parts of a system and assigning the system an assurance rating. |
|
|
Term
|
Definition
Trusted Computer System Evaluation Criteria |
|
|
Term
|
Definition
Also know as the Orange Book |
|
|
Term
|
Definition
US DOD standard used to asses the effectiveness of the security controls built into a system. Replaced by the common criteria |
|
|
Term
|
Definition
information technology security evaluation criteria |
|
|
Term
|
Definition
european standard used to assess the effectiveness of security controls built into a system from functional and assurance perspectives. |
|
|
Term
|
Definition
international standard used to assess the effectiveness of the security controls built into a system from functional and assurance perspectives |
|
|
Term
|
Definition
a technical evaluation of the security components and their compliance to a predefined security policy for the purpose of accreditation. |
|
|
Term
|
Definition
the formal acceptance of the adequacy of a system's overall security by management. |
|
|
Term
|
Definition
A system design that is built upon accepted standards to allow for interoperability |
|
|
Term
|
Definition
a system type that is built upon proprietary procedures, which inhibit interoperability capabilities. |
|
|
Term
|
Definition
Code within software that provides a back door entry capability |
|
|
Term
|
Definition
|
|
Term
|
Definition
when an attacker manipulates the "condition check" step and the "use" step within software to allow for unauthorized activity. |
|
|
Term
|
Definition
When two or more processes attempt to carry out their activity on one resource at the same time. Unexpected behavior can be expected. |
|
|
Term
|
Definition
a model that provides an upper bound and a lower bound of authorized access for subjects |
|
|
Term
|
Definition
uses protection profiles, security targets and ratings (EAL1 to EAL7) |
|
|
Term
|
Definition
combines sections of TCSEC, ITSEC, CTCPEC and the Federal Criteria |
|
|
Term
|
Definition
Evaluates the assurance and functionality of a system's protection mechanism seperately. |
|
|
Term
|
Definition
Evaluates assurance and functionality of a system and places them within one rating. |
|
|
Term
|
Definition
Security Model used mainly in military and govt. oriented systems. |
|
|
Term
|
Definition
2 Security models that are used mainly in the commercial sector |
|
|
Term
|
Definition
The final step in authorizing a system for use in an environment |
|
|
Term
|
Definition
a feature that enables code to be executed without the usual security checks |
|
|
Term
|
Definition
The ITSEC was developed for |
|
|
Term
|
Definition
a channel that enables a process to write data to a storage medium so another process can read it. |
|
|
Term
|
Definition
a channel that enables a process to relay information to another process by modulating its use of system resources. |
|
|
Term
|
Definition
International standard that is used as the basis for the evaluation of security properties of products under the CC framework. |
|
|
Term
|
Definition
Ensures that multiple processes can run concurrently and the processes will not interfere with eachother |
|
|
Term
|
Definition
Security model that address the first goal of integrity- which is to prevent unauthorized users from making modifications. |
|
|
Term
|
Definition
security model that addresses all 3 integrity goals: 1. Prevent unauthorized users from making mods. 2. Prevent authorized users from making improper mods. 3.Maintain internal and external consistency. |
|
|
Term
|
Definition
Process of copying an entire process to or from disk |
|
|
Term
|
Definition
expensive and fast memory that uses small latches called "Flip-Flops" to store bits. |
|
|
Term
dynamic random access memory DRAM |
|
Definition
Memory that stores bits in small capacitors and is slower and cheaper |
|
|
Term
|
Definition
A method that hides unnecessary details from a user |
|
|
Term
|
Definition
CPU visual design that connects the CPU to RAM and Video Controller |
|
|
Term
|
Definition
visual CPU design that connects Input/Output devices directly to CPU. slower |
|
|
Term
Transparent Virtualization |
|
Definition
"Full Virtualization" Runs stock OS like windows and Ubuntu Linux. No changes to the guest OS are required. |
|
|
Term
|
Definition
Virtualization that runs specially modified OS with modified Kernel system calls. |
|
|
Term
|
Definition
A more efficient virtualization option |
|
|
Term
|
Definition
Infrastructure as a service cloud service Linux server hosting |
|
|
Term
|
Definition
platform as a service cloud computing webservice hosting |
|
|
Term
|
Definition
software as a service cloud computing webmail |
|
|
Term
|
Definition
Type of virus written in macro language(ms office or excel) |
|
|
Term
|
Definition
virus that infects the boot sector of a pc. ensures that the virus loads at startup |
|
|
Term
|
Definition
virus that hides itself from the OS and other protective software such as an antivirus software. |
|
|
Term
|
Definition
virus that changes its signature upon infection of a new system. evades signature based antivirus software. |
|
|
Term
|
Definition
virus that spreads via multiple sectors, also called multipart. |
|
|
Term
|
Definition
common criteria level functionally tested |
|
|
Term
|
Definition
common criteria structurally tested |
|
|
Term
|
Definition
common criteria methodically tested and checked |
|
|
Term
|
Definition
common criteria methodically designed, tested, and reviewed |
|
|
Term
|
Definition
common criteria semiformally designed and tested |
|
|
Term
|
Definition
common criteria semiformally verified design and tested |
|
|
Term
|
Definition
common criteria formally verified design and tested |
|
|
Term
verified protection mandatory protection discretionary protection minimal security |
|
Definition
|
|