Shared Flashcard Set

Details

Operating Systems Chapter 15
Terms from Chapter Fifteen of Operating Systems Concepts by Galvin, Silberschatz, and Gagne
35
Computer Science
Undergraduate 3
04/29/2013

Additional Computer Science Flashcards

 


 

Cards

Term
Security
Definition
Preventing external threats from getting around our protection mechanisms.
Term
Breach of Confidentiality
Definition
Unauthorized reading of data or theft of information.
Term
Breach of Integrity
Definition
Unauthorized modification of data.
Term
Breach of Availablity
Definition
Unauthorized destruction of data.
Term
Theft of Service
Definition
Unauthorized use of resources.
Term
Denial of Service
Definition
Prevents legitimate use of the system.
Term
Masquerading
Definition
One participant in a communication pretends to be someone else.
Term
Authentication
Definition
The correctness of identification.
Term
Replay Attack
Definition
Malicious or fraudulent repeat of a valid data transmissions.
Term
Message Modification
Definition
Commonly used alongside a replay attack where the attacker changes the message in order to escalate privileges.
Term
Man-in-the-Middle Attack
Definition
An attacker gets between two communicating computers and pretends to be the server to the sender and the sender to the server in order to steal data or alter information.
Term
Session Hijacking
Definition
A breach where an active communication session is intercepted.
Term
Trojan Horse
Definition
A code segment that misuses its environment. Basically anything that pretends to be something it's not.
Term
Trap Door
Definition
Leaving a hole in security that only a user with knowledge of the hole would be able to use. An example would be the movie office space.
Term
Logic Bomb
Definition
Creating a hole in security when only certain conditions are met.
Term
Stack/Buffer Overflow
Definition
Exploitation of a bug in a program to allow the attackers code to be run.
Term
Virus
Definition
Self-Replicating and infect other programs.
Term
Worm
Definition
Process that uses the spawn mechanism to make copies of itself and use of system resources.
Term
Port Scanning
Definition
A means for a cracker to detect a system's vulnerabilities to attack. Port Scanning typically is automated, involving a tool that attempts to create a TCP/IP connection to a specified port of range of ports.
Term
Zombie System
Definition
A previously compromised, independent system that are used both by their owners and attackers.
Term
Distributed Denial of Service Attack
Definition
Having many compromised or willing systems all launch a DOS attack against a target with the hope of overwhelming it.
Term
Encyption
Definition
Ensures that only a computer possessing the correct key can read a message.
Term
Key
Definition
A way for a computer to decrypt an encrypted message.
Term
Symmetric Encryption
Definition
The same key is used to encrypt and decrypt. Systems must agree on a key ahead of time.
Term
Block Cipher
Definition
Encrypting a chunk of bits at a time.
Term
Cipher-Block Chaining
Definition
XORing the encrypted chunk with the previous chunk before encryption.
Term
Stream Cipher
Definition
Encrypts and decrypts a stream a bits or bytes rather than a block.
Term
Asymmetric Encryption
Definition
The key used to encrypt is different than the key used to decrypt. Often used with public keys and private keys.
Term
Private Key
Definition
A key that is never shared.
Term
Public Key
Definition
A key that everyone has access to.
Term
(Secure) Hash Function
Definition
A function that creates a small, fixed-sized block of data from a message.
Term
Message Digest
Definition
The small, fixed-sized block of data made by a hash function.
Term
Digital Signature
Definition
A way of ensuring a message is from a particular computer.
Term
Password
Definition
A string that supposedly identifies a particular user. Check authenticity by comparing the password the user gives to the one stored in the system.
Term
One-Time Password
Definition
The password changes in each session.
Supporting users have an ad free experience!