Windows mod 5 Flashcards
Controls nearly all functions of computer. Computers rely on this to provide a means for interaction among users, software, and hardware.
Operating system (OS)
The person using a computer/device. User interaction with software and hardware is provided through OS interfaces.
User
Executable code deigned to carry out specific tasks on the computer, also referred to as programs or software.
Application
As OS consists of two parts:
OS Interface
OS Kernel
System Software
Allows a user to interface with applications, system, and hardware.
OS Interface
The heart of an OS. Manages the interaction between a user, applications, and hardware.
OS Kernel
The mechanical, magnetic, electronic, and electrical components of a computer.
Hardware
An OS Interface with data on a hard drive through a file system.
- file system
- directory
- file
File System Management
Defines the way data is named, stored, organized, and accessed.
File system
Is a container used to organize files and data for use by an OS.
Directory
Is a singular named resource used to store information/data.
File
It is the OSs responsibility to allocate and protect resources for all processes on the system.
Process Management
Is an executing instance of an application.
Process
The communications path between an OS and attached devices is made possible through special programs called device drivers.
Device Management
Is any hardware component or peripheral attached to a computer.
Device
Is a computer program that operates or controls a device attached to a computer.
Device driver
Is used as an interpreter
Driver
Only one user can perform a task at any given time.
Single user, single tasking
Only one user can perform multiple tasks (programs) at a time. (Not all mobile devices allow this.)
Single user, multi-tasking
One or more users can perform one or more tasks at one time.
Multiuser
Operates in a networked environment allowing a user to connect to another computer (server) to retrieve information.
Client
Provides various services, including email, file sharing, and printer access, as well as ensuring security, to other computers (clients) across a network.
Server
Two or more servers are grouped together, appearing as one system, providing a failover system with load balancing.
Cluster
One or more tasks are spread among two or more computers.
Distributed
If a node in the cluster fails, the services on that node are picked up by other service nodes.
Failover
Every OS has inherent vulnerabilities posing risks that must be acknowledged and managed
Information Assurance
Assurance that information is not disclosed to unauthorized individuals, processes, or devices. This is more comparable to “need to know” than a security level.
Confidentiality
Assurance that no unauthorized modification or destruction of information occurred in transit.
Integrity
Assurance of reliable access to data and services for authorized users.
Availability
Assurance that data delivery is proven to is proven to be from a reliable source.
Non-repudiation
Assurance of properly verifying a user’s credentials
Authentication
non-privileged user accounts are only granted access to what is authorized.
principle of least privilege
the privileged account in Windows
Administrator
Permissions are implemented by an Access Control List (ACL).
Discretionary Access Control (DAC)
details account permissions to a specific resource as determined by permissions set by the owner of that resource.
Access Control List (ACL)
policies are set by an administrator using a policy tool. OSs enforce system security policy using security labels (e.g., need-to-know).
Mandatory Access Control (MAC)
Access decisions are based on each account’s role or functional position.
Role-Based Access Control (RBAC)
is a record of system or user activities.
log file
occurs when computer data is copied or archived, usually to a separate location, and for the purpose of data recovery should data loss occur.
backup