Upgrade to remove ads
Op System Security Ch. 1, 2, 3, 5
Terms in this set (40)
A management action, written policy, procedure, guideline, regulation, law, or rule of any kind.
A person who interacts with a computer in an unauthorized manner
A control that stops an action before it occurs. Includes locked doors, firewall rules, and user passwords
A control that detects when an action has occurred. Includes smoke detectors, log monitors, and system audits.
A control that repairs the effects of damage from attack. Includes virus removal procedures, firewall table updates, and user authorization database updates.
defense in depth
Using multiple layers of security controls to protect resources.
smoke detectors and logs
A device or process that limits access to a resource. Examples include user authentication, antivirus software, and firewalls
Need to know
prohibits unauthorized changes to information.
needs of authorized users. (DOS)
The process of providing and denying access to objects is called
Allows users & groups to be "shared" among machines.
The collection of all possible vulnerabilities that could provide unauthorized access to computer resources is called the
The process of proving that provided identity credentials are valid and correct is referred to as
A level of sensitivity assigned to an object by its owner.
Any mechanism or action that prevents, detects, or addresses an attack.
An access control method based on an object's owner and permissions granted by the owner is referred to as
hardware abstraction layer (HAL)
Software layer in the operating system kernel that provides the actual access to physical hardware
Which of the following terms is used to describe providing credentials that claim a specific identity (Such as a username)
The list of access permissions for an object
The process of collecting performance information on what actions were taken and storing that information for later analysis
class identifiers (CLSID)
GUIDs used in the Windows Registry to identify objects and record many of their attributes.
A server computer designated to handle Active Directory request.
dynamic access control
collection of features to describe user and data attributes. Identify and classify data, control file access, audit file access, apply encryption to sensitive data.
What name is given to the page within the advanced security settings dialog box of windows that displays calculated permissions for any user or group
a file classification infrastructure
provides the ability to define classification properties for files.
Which of the following refers to a set of named entities that define a group of users for the purpose of defining permissions that apply to multiple users.
key distribution center
stores all user and computer Kerberos master keys.
managed service accounts
Accounts that administrators can create as managed domain accounts to provide automatic password management are referred to as
Morris worm. A condition in which a running program stores data that is larger than the memory location set aside for the data.
anti spyware software
a type of program designed to prevent and detect unwanted spyware program installations and to remove those programs if installed. Detection may be either rules-based or based on downloaded definition files that identify currently active spyware programs.
Software designed to detect and mitigate some types of malware, including mainly viruses, worms, and Trojan horses.
5. Practice of identifying malware based on previous experience is referred to as
A common term used to describe malicious software, including viruses, worms, and Trojan horses, especially in combinations.
A type of malware that attempts to generate funds directly from a computer user by attacking the computer and limiting the user's ability to access it until some money is paid.
Software that modifies or replaces one or more existing programs, often part of the operating system, to hide the fact a computer has been compromised.
Unique set of instructions that make up an instance of malware and distinguish it from other malware is referred to as its
The organized collections of known malware signatures is stored in a
The list of access permissions for an object, based on access granted by the object's owner.
YOU MIGHT ALSO LIKE...
Windows Security Ch 1-3
Chapter 5 Access Controls
Network Security: Chp. 5 - Access Controls
Chapter 5 Vocab - ISEC
OTHER SETS BY THIS CREATOR
Forensics Chapter 4 & 5
OTHER QUIZLET SETS
Chem II Chapters 11 & 13
DO [to *do so* / I *did it*] DO SO (indécomposable…
Chapter 5: Stereotypes, Prejudice, and Discrminati…
mental health, substance abuse, and functional abi…