exam review

Cards (17)

  • BCD
    Binary representation of decimal numbers
  • Authentication
    The process of confirming the identity of an individual or entity, typically before granting access to a system, service, or resource
  • One-time passwords
    • Provide additional security along with normal authentication
  • Trap Door
    Also known as Backdoors, hidden entry points within software programs that allow attackers to bypass normal authentication and gain unauthorized access to the system
  • Logic bomb
    A situation when a program misbehaves only when certain conditions are met, otherwise it works as a genuine program
  • System threats
    Misuse of system services and network connections to put user in trouble
  • Worm
    A process which can choke down a system performance by using system resources to extreme levels
  • Port scanning
    A mechanism or means by which a hacker can detect system vulnerabilities to make an attack on the system
  • Type A
    The apex of the security classification hierarchy
  • Type C
    Concerned with providing discretionary access control and auditing capabilities to track the use of information
  • Type D
    The lowest level of security classification and provides the minimum amount of protection
  • File
    A named collection of related information that is recorded on secondary storage
  • File Structure
    • Should be according to a required format that the operating system can understand
  • File Type
    The ability of the operating system to distinguish different types of file such as text files
  • File access mechanism
    The manner in which the records of a file may be accessed
  • Sequential access
    The records are accessed in some sequence
  • Computer
    A combination of hardware and software resources which integrate together and provides various functionalities to the user