Lecture 01 - Introduction to OSS Flashcards
Operating System Security
Measures to protect the integrity, availability, and confidentiality of an OS
Confidentiality
Ensuring that only authorized individuals have access to sensitive information
Integrity
Data should only be modified by authorized parties in authorized ways
Availability
Authorized users should have access to resources when needed
Protection
Safeguarding system resources from unauthorized access and threats
Internal Threats
Risks arising from within the system that can pose security challenges
Malicious Program
Software designed to cause harm to a computer system
File manager
Software managing files on a computer
Process manager
Software managing computer processes and tasks
Virus
Code snippet causing system harm and replication
Trojan Horse
Malicious code accessing system login details
Trap Door
Hidden system vulnerability exploited for harm
Worm
Malware overwhelming system resources
Denial of Service
Attack flooding system to deny legitimate access
Random Numbers
Numbers used for secure authentication