Mod 5 Flashcards
(47 cards)
This controls nearly all functions of a computer provides a means for interaction among users software and Hardware
Operating systems
Allows the user to interface with applications system software and Hardware
OS interface
The heart of the OS manages the interaction between each layer
OS kernel
What are the three core functions of the OS
File system management
Process Management
device management
This defines the way data is named stored organized and accessed on a hard drive it can be compared to a filing cabinet for each drawer correlates to a disk volume each folder correlates to a directory in the papers within the folders correlate to files or data on the system
A file system
A singular named resource that is used for storing information or data
A file
This is an executing instance of an application
A process
Any hardware component or peripheral attached to the computer
A device
The communications path between the OS and these devices is made possible through special programs called what
Device drivers
Only one user can perform a task at any given time
Single-tasking
Only one user can perform multiple tasks at a time
Multitasking
One or more tasks are spread among two or more computers
Distributed
Operates in a network environment allowing user to connect to another computer or server to retrieve information
Client
provides various services including email file sharing and printer access as well as ensuring security to other computers or clients across the network
Server
Every OS has inherent vulnerabilities posing risks that must be acknowledged and managed by what
Information assurance IA
What are the five information assurance risk management techniques
Confidentiality integrity availability non-repudiation Authentication
Assurance that information is not disclosed to unauthorized individuals processes or devices
Confidentiality
Assurance that no unauthorized modification or destruction of information occurred
Integrity
Assurance of reliable access to data in services for authorized users
Availability
Assurance that data delivery is proven to be from a reliable source
Non-repudiation
Assurance of properly verifying a user’s credentials
Authentication
The privilege account on Linux systems is
Root
Privileged account on Windows system is
Administrator
What are the three types of Access Control
Discretionary Access Control DAC
mandatory Access Control Mac
role-based Access Control rbac