Term
|
Definition
International standard that provides guidelines on how to create and maintain system architectures. |
|
|
Term
central processing unit (CPU) |
|
Definition
A silicon component made up of integrated chips with millions of transistors that carry out the execution of instructions within a computer. |
|
|
Term
arithmetic logic unit (ALU) |
|
Definition
Component of the CPU that carries out logic and mathematical functions as they are laid out in the programming code being processed by the CPU. |
|
|
Term
|
Definition
Part of the CPU that oversees the collection of instructions and data from memory and how they are passed to the processing components of the CPU. |
|
|
Term
|
Definition
Small, temporary memory storage units integrated and used by the CPU during its processing functions. |
|
|
Term
|
Definition
Temporary memory location the CPU uses during its processes of executing instructions. The ALU’s “scratch pad” it uses while carrying out logic and math functions. |
|
|
Term
|
Definition
Temporary memory location that holds critical processing parameters. They hold values as in the program counter, stack pointer, and program status word. |
|
|
Term
|
Definition
Holds the memory address for the following instructions the CPU needs to act upon. |
|
|
Term
|
Definition
Memory segment used by processes to communicate instructions and data to each other. |
|
|
Term
|
Definition
Condition variable that indicates to the CPU what mode (kernel or user) instructions need to be carried out in. |
|
|
Term
User mode (problem state) |
|
Definition
Protection mode that a CPU works within when carrying out less trusted process instructions. |
|
|
Term
Kernel mode (supervisory state, privilege mode) |
|
Definition
Mode that a CPU works within when carrying out more trusted process instructions. The process has access to more computer resources when working in kernel versus user mode. |
|
|
Term
|
Definition
Physical connections between processing components and memory segments used to communicate the physical memory addresses being used during processing procedures. |
|
|
Term
|
Definition
Physical connections between processing components and memory segments used to transmit data being used during processing procedures. |
|
|
Term
Symmetric mode multiprocessing |
|
Definition
When a computer has two or more CPUs and each CPU is being used in a load-balancing method. |
|
|
Term
Asymmetric mode multiprocessing |
|
Definition
When a computer has two or more CPUs and one CPU is dedicated to a specific program while the other CPUs carry out general processing procedures. |
|
|
Term
|
Definition
Program loaded in memory within an operating system. |
|
|
Term
|
Definition
Interleaved execution of more than one program (process) or task by a single operating system. |
|
|
Term
|
Definition
Simultaneous execution of more than one program (process) or task by a single operating system. |
|
|
Term
|
Definition
Multitasking scheduling scheme used by older operating systems to allow for computer resource time slicing. Processes had too much control over resources, which would allow for the programs or systems to “hang.” |
|
|
Term
|
Definition
Multitasking scheduling scheme used by operating systems to allow for computer resource time slicing. Used in newer, more stable operating systems. |
|
|
Term
Process states (ready, running, blocked) |
|
Definition
Processes can be in various activity levels. Ready = waiting for input. Running = instructions being executed by CPU. Blocked = process is “suspended.” |
|
|
Term
|
Definition
Values assigned to computer components (hardware and software) to allow for efficient computer resource time slicing. |
|
|
Term
|
Definition
Interrupt value assigned to a noncritical operating system activity. |
|
|
Term
|
Definition
Interrupt value assigned to a critical operating system activity. |
|
|
Term
|
Definition
Instruction set generated by a process when it has a specific activity that needs to be carried out by an operating system. When the activity is finished, the thread is destroyed. |
|
|
Term
|
Definition
Applications that can carry out multiple activities simultaneously by generating different instruction sets (threads). |
|
|
Term
|
Definition
Two processes cannot complete their activities because they are both waiting for system resources to be released. |
|
|
Term
|
Definition
Protection mechanism provided by operating systems that can be implemented as encapsulation, time multiplexing of shared resources, naming distinctions, and virtual memory mapping. |
|
|
Term
Dynamic link libraries (DLLs) |
|
Definition
A set of subroutines that are shared by different applications and operating system processes. |
|
|
Term
|
Definition
Beginning of address space assigned to a process. Used to ensure a process does not make a request outside its assigned memory boundaries. |
|
|
Term
|
Definition
Ending of address space assigned to a process. Used to ensure a process does not make a request outside its assigned memory boundaries. |
|
|
Term
|
Definition
Memory sticks that are plugged into a computer’s motherboard and work as volatile memory space for an operating system. |
|
|
Term
|
Definition
Nonvolatile memory that is used on motherboards for BIOS functionality and various device controllers to allow for operating system-to-device communication. Sometimes used for off-loading graphic rendering or cryptographic functionality. |
|
|
Term
|
Definition
Physically mapping software to individual memory segments. |
|
|
Term
|
Definition
Fast and expensive memory type that is used by a CPU to increase read and write operations. |
|
|
Term
|
Definition
Hardware addresses used by the CPU. |
|
|
Term
|
Definition
Indirect addressing used by processes within an operating system. The memory manager carries out logical-to-absolute address mapping. |
|
|
Term
|
Definition
Memory construct that is made up of individually addressable buffers. Process-to-process communication takes place through the use of stacks. |
|
|
Term
|
Definition
Too much data is put into the buffers that make up a stack. Common attack vector used by hackers to run malicious code on a target system. |
|
|
Term
Address space layout randomization (ASLR) |
|
Definition
Memory protection mechanism used by some operating systems. The addresses used by components of a process are randomized so that it is harder for an attacker to exploit specific memory vulnerabilities. |
|
|
Term
Data execution prevention (DEP) |
|
Definition
Memory protection mechanism used by some operating systems. Memory segments may be marked as nonexecutable so that they cannot be misused by malicious software. |
|
|
Term
|
Definition
Tool that marks unused memory segments as usable to ensure that an operating system does not run out of memory. |
|
|
Term
|
Definition
Combination of main memory (RAM) and secondary memory within an operating system. |
|
|
Term
|
Definition
Software or hardware signal that indicates that system resources (i.e., CPU) are needed for instruction processing. |
|
|
Term
|
Definition
Set of operations and commands that can be implemented by a particular processor (CPU). |
|
|
Term
|
Definition
Specific design of a microprocessor, which includes physical components (registers, logic gates, ALU, cache, etc.) that support a specific instruction set. |
|
|
Term
Application programming interface |
|
Definition
Software interface that enables process-to-process interaction. Common way to provide access to standard routines to a set of software programs. |
|
|
Term
Monolithic operating system architecture |
|
Definition
All of the code of the operating system working in kernel mode in an ad hoc and nonmodularized manner. |
|
|
Term
Layered operating system architecture |
|
Definition
Architecture that separates system functionality into hierarchical layers. |
|
|
Term
|
Definition
Use of segregation in design decisions to protect software components from negatively interacting with each other. Commonly enforced through strict interfaces. |
|
|
Term
|
Definition
Reduced amount of code running in kernel mode carrying out critical operating system functionality. Only the absolutely necessary code runs in kernel mode, and the remaining operating system code runs in user mode. |
|
|
Term
Hybrid microkernel architecture |
|
Definition
Combination of monolithic and microkernel architectures. The microkernel carries out critical operating system functionality, and the remaining functionality is carried out in a client\server model within kernel mode. |
|
|
Term
|
Definition
When the CPU has to change from processing code in user mode to kernel mode. This is a protection measure, but it causes a performance hit. |
|
|
Term
|
Definition
Creation of a simulated environment (hardware platform, operating system, storage, etc.) that allows for central control and scalability. |
|
|
Term
|
Definition
Central program used to manage virtual machines (guests) within a simulated environment (host). |
|
|
Term
|
Definition
Strategic tool used to dictate how sensitive information and resources are to be managed and protected. |
|
|
Term
|
Definition
A collection of all the hardware, software, and firmware components within a system that provide security and enforce the system’s security policy. |
|
|
Term
|
Definition
Trustworthy software channel that is used for communication between two processes that cannot be circumvented. |
|
|
Term
|
Definition
Mechanism used to delineate between the components within and outside of the trusted computing base. |
|
|
Term
|
Definition
Concept that defines a set of design requirements of a reference validation mechanism (security kernel), which enforces an access control policy over subjects’ (processes, users) ability to perform operations (read, write, execute) on objects (files, resources) on a system. |
|
|
Term
|
Definition
Hardware, software, and firmware components that fall within the TCB and implement and enforce the reference monitor concept. |
|
|
Term
Multilevel security policies |
|
Definition
Outlines how a system can simultaneously process information at different classifications for users with different clearance levels. |
|
|
Term
|
Definition
This is the first mathematical model of a multilevel security policy that defines the concept of a secure state and necessary modes of access. It ensures that information only flows in a manner that does not violate the system policy and is confidentiality focused. |
|
|
Term
Bell-LaPadula model - simple security rule |
|
Definition
A subject cannot read data at a higher security level (no read up). |
|
|
Term
Bell-LaPadula model - *-property rule |
|
Definition
A subject cannot write to an object at a lower security level (no write down). |
|
|
Term
Bell-LaPadula model - strong star property rule |
|
Definition
A subject can perform read and write functions only to the objects at its same security level. |
|
|
Term
|
Definition
A formal state transition model that describes a set of access control rules designed to ensure data integrity. |
|
|
Term
Biba model - simple integrity axiom |
|
Definition
A subject cannot read data at a lower integrity level (no read down). |
|
|
Term
Biba model - *-integrity axiom |
|
Definition
A subject cannot modify an object in a higher integrity level (no write up). |
|
|
Term
|
Definition
This integrity model is implemented to protect the integrity of data and to ensure that properly formatted transactions take place. It addresses all three goals of integrity: |
|
|
Term
|
Definition
This is a model in which information is restricted in its flow to only go to and from entities in a way that does not negate or violate the security policy. |
|
|
Term
|
Definition
This formal multilevel security model states that commands and activities performed at one security level should not be seen by, or affect, subjects or objects at a different security level. |
|
|
Term
|
Definition
This model allows for dynamically changing access controls that protect against conflicts of interest. Also known as the Chinese Wall model. |
|
|
Term
|
Definition
This model shows how subjects and objects should be created and deleted. It also addresses how to assign specific access rights. |
|
|
Term
Harrison-Ruzzo-Ullman model |
|
Definition
This model shows how a finite set of procedures can be available to edit the access rights of a subject. |
|
|
Term
Assurance evaluation criteria |
|
Definition
“Checklist” and process of examining the security-relevant parts of a system (TCB, reference monitor, security kernel) and assigning the system an assurance rating. |
|
|
Term
Trusted Computer System Evaluation Criteria (TCSEC) |
|
Definition
(aka Orange Book) U.S. DoD standard used to assess the effectiveness of the security controls built into a system. Replaced by the Common Criteria. |
|
|
Term
Information Technology Security Evaluation Criteria (ITSEC) |
|
Definition
European standard used to assess the effectiveness of the security controls built into a system. |
|
|
Term
|
Definition
International standard used to assess the effectiveness of the security controls built into a system from functional and assurance perspectives. |
|
|
Term
|
Definition
Technical evaluation of the security components and their compliance to a predefined security policy for the purpose of accreditation. |
|
|
Term
|
Definition
Formal acceptance of the adequacy of a system’s overall security by management. |
|
|
Term
|
Definition
Designs are built upon accepted standards to allow for interoperability. |
|
|
Term
|
Definition
Designs are built upon proprietary procedures, which inhibit interoperability capabilities. |
|
|
Term
|
Definition
Code within software that provides a back door entry capability. |
|
|
Term
Time-of-check/time-of-use (TOC/TOU) attack |
|
Definition
Attacker manipulates the “condition check” step and the “use” step within software to allow for unauthorized activity. |
|
|
Term
|
Definition
Two or more processes attempt to carry out their activity on one resource at the same time. Unexpected behavior can result if the sequence of execution does not take place in the proper order. |
|
|