Day 1 Mod 5 Flashcards
Communication paths between the OS and devices are made possible through special programs called what?
Device drivers
Any hardware component or peripheral device that is attached to a computer is known as
A device
This is an executing instance of an application
A process
A singular named resource used for storing information or data
File
The OS interfaces with data on the hard drive through this, it defines the way data is named, stored, organized, and accessed on the hard drive. Like a file cabinet Drawer=disk volume Folder =directory Papers=files
File system
What does an operating system control and what four things does it provide a means of interacting with? U A S H
controls nearly all functions of a computer
Provides a means of interacting with users system software applications and Hardware
Every OS performs at least three core functions what are they
F
P
D
File system management
Process Management
Device management
This is the mechanical, magnetic, electronic, and electrical components of a computer
Hardware
This allows the user to interface with applications, system software, and Hardware
OS interface
The heart of the OS, manages interaction between layers.
OS kernel
System software, also known as the OS can be divided into two parts. What are they?
OS interface
OS kernel
Another name for executable code designed to carry out specific tasks on the computer, also known as programs or software.
Application
What are the OS interfaces a user interacts with?
GUI graphical user interface
CLI command line interface
Has only one user and can perform a task at any given time
Single user single-tasking
Only one user can perform multiple tasks at a time
Single user multitasking
One or more users can perform one or more tasks each at one time. Unix or Windows based
Multi user
Operates in a networked environment allowing a user to connect to another computer or server to retrieve information. Unix or Windows based
Client
provides various services including email file sharing and printer access as well as ensuring security to other computers or clients across a network. Email server web server print server
Server
One or more tasks are spread among two or more computers a cluster of machines like google. Com
Distributed
Every OS has inherent vulnerabilities posing risks that must be acknowledged and managed by what is known as?
Information assurance IA
Information assurance or IA incorporates five risk management measures or techniques what are they? C I A N A
Confidentiality Integrity Availability Non-repudiation Authentication
Assurance that information is not disclosed to unauthorized individuals, processes, or devices.
Need to know
Confidentiality
Assurance that no unauthorized modification or destruction of information occurred.
Trust
Integrity
Assurance of reliable access to data and services for authorized users.
Availability
Assurance that data delivery is proven to be from a reliable source.
Can’t deny
Non-repudiation
Assurance of properly verifying a user’s credentials.
Authentication
This ensures users are properly identified using account credentials such as.
Username and or password
Card or token
Biometrics
Authentication
Once a user is authenticated, os's provide mechanisms to ensure data may only be accessed by authorized users. There are four mechanisms to accomplish this what are they? P A L B
Privileged versus non-privileged
Access Control
Logging
Backups
The IA availability measure implements this principle, where non-privileged user accounts are only granted access to what is authorized.
Principle of least privilege
OSS provide this type of user account with full access and this other type of user account with limited access what are the accesses called?
Privileged and non-privileged