Lecture 02 - Basic Concepts of OSS Flashcards

1
Q

Authorization

A

Process of verifying access permissions to resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Authentication

A

Verifying user identity to grant access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Masquerader

A

Unauthorized user gaining access using another’s account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Misfeasor

A

Legitimate user misusing unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Clandestine user

A

Rogue user taking supervisory authority to evade restrictions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Malwares

A

Includes viruses, worms, trojans, and harmful software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Program threats

A

User program causing OS processes to perform malicious tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

System threats

A

Misuse of system services and network connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

TLS/SSL certificates

A

Encrypt and secure data transfer, enhancing website trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

URL authorization

A

Control access to URLs by enabling authorization in Windows settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Access Controls

A

Regulate user-system interactions, limiting access to resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Discretionary Access Control (DAC)

A

Restricts information access based on user identity and group membership.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Mandatory Access Control (MAC)

A

Access based on security clearance levels, common in government sectors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Role-Based Access Control (RBAC)

A

Access based on defined business roles rather than individual identities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Attribute-Based Access Control (ABAC)

A

Access based on attributes and conditions assigned to users and resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly