CHAPTER 2 PPT Flashcards

(15 cards)

1
Q

Explain the difference between a program and a process. What information makes up the process state?

A

Program is a group of instructions; process is a running program

The process state will include the program’s RAM contents, program counter, and other related data being used inside the CPU.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Explain what happens
when the CPU switches from
one process to another. SWITCHING PROCESS

A
  • Save the program counter for the stopped process
  • Save other CPU data from stopped process
  • Locate the “saved state”
  • Load the saved CPU data
  • Load the program counter with the starting process’ program counter
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Three major components of the
I/O management

A
  • file management: hard drives & mass storage
  • user interface management: keyboards & GUIs
  • network protocols - connect to other computers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a worm? What was the intended goal of the Morris worm? What was its
actual effect?

A

A worm is a form of malware.

The worm was designed to infect each computer once, the restricting code didn’t work.

Each computer was infected hundreds of times and became unusable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

attack case study contents

A
  • overview: summarizes the attack
  • perpetrator: brief description of threat agent
  • attack scenario: as described previously
  • risk management: how preattack risk management steps affected the attack’s outcome
  • references: consolidated list including those from the attack scenario
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is open design principle

A

we open our systems for third-party analysis to help ensure their effectiveness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is kerckhoff’s principle

A

rely on changeable secret, but make the rest of the design public and open to review

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does a computer maintain its Chain of Control

A
  1. start the computer using BIOS that maintains our security policy
  2. if the software we start can start otehr software, then the other software either:
    - complies with the security policy, or
    - is constrained from violating the policy via access restrictions or other mechanisms
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Identify the basic hardware features a CPU must have in order to reliably protect processes from one another.

A

program modes
ram protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Identify the basic hardware features an OS must have in order to reliably protect processes from one another.

A

program dispatcher
memory manager
user identities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

two program modes

A

kernel or supervisor mode
- for highly privileged OS programs with full CPU access; allows full access to RAM
- dangerous!

user mode
- for most programs and all applications
- CPU blocks any attempt to use kernel mode instructions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

OS Security features:

A
  • processes must take turns
  • processes are assigned different parts of RAM
  • processes can’t damage other areas of RAM
  • user-oriented interface and access controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

difference of requirements and control

A

requirements say what we want for protection
controls say what we get

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Describe the format and contents of an access matrix

A

a way to specify access permissions
- rows for resources or ram
- columns for active entities or processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Security plan contains the details

A
  • list of assets
  • full risk assessment
  • prioritized list of risks
  • security requirements
  • implementation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly