Page 315 - DCAP103_Principle of operating system
P. 315

Principles of Operating Systems



                   Notes            7.  .................... encryption technique works on the network layer.
                                    8.  A stored procedure is a precompiled sequence of .................... command in the database.

                                    9.  .................... mode adds a feedback mechanism to the encryption scheme.
                                   10.  A .................... is a part of computer system that is designated to block unauthorized access
                                      while permitting authorized communications.

                                 9.7 Summary

                                    •  CERT/CCC Current Activity KNOPPIX can also be used as a creative Linux system as
                                      the educational CD, desktop, rescue system.

                                    •  Security  systems  generally  implement  a  useful  subset  of  a  3-dimentional  matrix  with
                                      dimensions of actor, object, and action. Implementing the full matrix is never done for
                                      both performance and usability reasons.
                                    •  Mainstream operating system security is primarily based on access control lists.
                                    •  Traditional UNIX access control is a type of discretionary ACL.
                                    •  The many possible actions are grouped into four categories—read, write, execute, and
                                      special operations normally reserved for an object owner.
                                    •  Capabilities are unforgivable references to objects that let their holder access a well-defined
                                      subset of operations defined on that object.
                                    •  Threats  originated  from  viruses,  which  are  strictly  speaking  programs  that  replicate
                                      themselves without your knowledge.
                                    •  Secret key cryptography schemes are generally categorized as being either stream ciphers
                                      or block ciphers.

                                    •  Database  vendors  release  periodic  security  patches  to  fix  several  software  bugs  in  the
                                      database left open during development of the particular version.
                                    •  A firewall is a part of a computer system or network that is designed to block unauthorized
                                      access while permitting authorized communications.
                                    •  It is a device or set of devices that is configured to permit or deny network transmissions
                                      based upon a set of rules and other criteria.

                                 9.8 Keywords


                                    1.  Domain Name System (DNS): The Domain Name System (DNS) is a hierarchical naming
                                      system built on a distributed database for computers, services, or any resource connected
                                      to the Internet or a private network.
                                    2.  Dynamic Host Configuration Protocol (DHCP): Dynamic host configuration protocol is
                                      used to automatically assign TCP/IP addresses to clients along with the correct subnet
                                      mask, default gateway, and DNS server.
                                       Two ways for a computer to get its IP address:
                                        •  Using DHCP from a DHCP server.
                                        •  Manual configuration.

                                    3.  Encryption: The Encrypting File System (EFS) on Microsoft Windows is a file system filter
                                      that provides filesystem-level encryption and was introduced in version 3.0 of NTFS. The




        308                               LOVELY PROFESSIONAL UNIVERSITY
   310   311   312   313   314   315   316   317   318   319   320