The process of confirming the identity of an individual or entity, typically before granting access to a system, service, or resource
One-time passwords
Provide additional security along with normal authentication
Trap Door
Also known as Backdoors, hidden entry points within software programs that allow attackers to bypass normal authentication and gain unauthorized access to the system
Logic bomb
A situation when a program misbehaves only when certain conditions are met, otherwise it works as a genuine program
System threats
Misuse of system services and network connections to put user in trouble
Worm
A process which can choke down a system performance by using system resources to extreme levels
Port scanning
A mechanism or means by which a hacker can detect system vulnerabilities to make an attack on the system
Type A
The apex of the security classification hierarchy
Type C
Concerned with providing discretionary access control and auditing capabilities to track the use of information
Type D
The lowest level of security classification and provides the minimum amount of protection
File
A named collection of related information that is recorded on secondary storage
File Structure
Should be according to a required format that the operating system can understand
File Type
The ability of the operating system to distinguish different types of file such as text files
Fileaccess mechanism
The manner in which the records of a file may be accessed
Sequential access
The records are accessed in some sequence
Computer
A combination of hardware and software resources which integrate together and provides various functionalities to the user