Chapter 9: Security Vulnerabilities, Threats, and Countermeasures Flashcards
the security design principle that indicates that organizations do not operate in isolation
Shared responsibility
an initiative by the Department of Homeland Security (DHS) to facilitate the open and free exchange of indicators of compromise (IoCs) and other cyberthreat information between the U.S. federal government and the private sector in an automated and timely manner (described as “machine speed”)
Automated indicator sharing (AIS)
any tangible part of a computer that you can actually reach out and touch, from the keyboard and monitor to its CPU(s), storage media, and memory chips.
hardware
means handling two or more tasks simultaneously.
multitasking
Today, most CPUs are ____. This means that the CPU is now a chip containing two, four, eight, dozens, or more independent execution cores that can operate simultaneously and/or independently.
multicore
a _______ harnesses the power of more than one processor to complete the execution of a multithreaded application.
multiprocessor system
It involves the pseudo-simultaneous execution of two tasks on a single processor coordinated by the OS as a way to increase operational efficiency.
Multiprogramming
_______ permits multiple concurrent tasks to be performed within a single process.
Multithreading
From a security standpoint, _____ organize code and components in an OS (as well as applications, utilities, or other code that runs under the OS’s control) into concentric rings
protection rings
In the _____, a process is ready to resume or begin processing as soon as it is scheduled for execution.
ready state
The _______ is when a process executes on the CPU and keeps going until it finishes, its time slice expires, or it is blocked for some reason (usually because it has generated an interrupt for I/O).
running state or problem state
The_______ is when a process is ready for continued execution but is waiting for I/O to be serviced before it can continue processing
waiting state
The _______ is used when the process must perform an action that requires privileges that are greater than the problem state’s set of privileges, including modifying system configuration, installing device drivers, or modifying security settings.
supervisory state
When a process finishes or must be terminated (because an error occurs, a required resource is not available, or a resource request can’t be met), it goes into a _____ state.
supervisory state
the storage bank for information that the computer needs to keep readily available.
memory
memory the system can read but can’t change (no writing allowed).
Read-only memory (ROM)
a ____ chip’s contents aren’t “burned in” at the factory as with standard ROM chips. Instead, a _____ incorporates special functionality that allows an end user to burn in the chip’s contents later.
PROM
a nonvolatile form of storage media that can be electronically erased and rewritten.
Flash memory
readable and writable memory that contains information a computer uses during processing.
Random access memory (RAM)
There are two main types of RAM: _____ RAM and ____ RAM
dynamic and static
The CPU also includes a limited amount of onboard memory, known as _______
registers
When using memory resources, the processor must have some means of referring to various locations in memory. The solution to this problem is known as ______
memory addressing
a term commonly used to refer to magnetic, optical, or flash-based media or other storage devices that contain data not immediately available to the CPU.
Secondary memory
______ is a special type of secondary memory that is used to expand the addressable space of real memory.
Virtual memory
______ are used to store information that may be used by a computer any time after it’s written.
Data storage devices