2024-05-14T05:05:34+03:00[Europe/Moscow] en true Source File, Ordinary Files, Block Special Files, File Access Mechanisms, Sequential Access, Direct/Random Access, Indexed Sequential Access, Space Allocation, Linked Allocation, Contiguous Allocation, Indexed Allocation, Security, Authentication, System Threats, <p>Program Threats</p>, Username / Password, User card/key, User attribute, One-time passwords, Random numbers, Secret key, Network password, Trojan Horse, File, File Structure, Text File, Object File, File Type, Directory Files, Special Files, Character Special Files, Trap Door, Logic Bomb, Virus, Worm, Port Scanning, Denial of Service, Type A, Type B1, Type B2, Type B3, Type C1, Type C2, Type D, <p>Type C</p>, <p>Type B</p> flashcards

File system and security

COE 241

  • Source File
    A sequence of procedures and functions.
  • Ordinary Files

    Contain user information like text, databases, or programs. The user can apply like add modify and delete

  • Block Special Files
    Handle data in blocks, e.g., disks and tapes.
  • File Access Mechanisms

    Refers to how the record of a file may be accessed

  • Sequential Access

    Records accessed in some sequence, the file is processed in order, one after the other, this methos is the most primitive e.g., compilers.

  • Direct/Random Access

    Access records directly. Each record has its own address on the file. The records need not be in any sequence

  • Indexed Sequential Access

    Built on the base of sequential access. An index is created for each file which contains pointers.

  • Space Allocation

    Files are allocated disk spaces by the operating system

  • Linked Allocation

    Files have links to disk blocks, directory contains pointers , no external fragmentation, effective for sequential ineffective for direct access file

  • Contiguous Allocation

    Files occupy contiguous disk space assigned in linear order, prone to external fragmentation easy to implement

  • Indexed Allocation

    Solution to contiguous and linked allocation, index block is created

  • Security
    Protection system for computer resources against unauthorized access and threats.
  • Authentication

    Identifying users and associating executing programs with those users

  • System Threats

    Refers to the misuse of the system services and network connection

  • Program Threats

    If a user program is made these process do a malicious task

  • Username / Password
    Registered credentials required for system login.
  • User card/key

    User need to punch card slot or enter key. Physical card or key used for system access.

  • User attribute

    User needs to pass their attribute. Biometric data used for user authentication.

  • One-time passwords

    Provide additional Security. Unique passwords for each login attempt.

  • Random numbers
    Users are provided cards with numbers and corresponding alphabets. System asks for numbers corresponding to randomly chosen alphabets.
  • Secret key
    Users are provided a hardware device generating a secret ID mapped with user ID. System asks for this secret ID prior to login.
  • Network password
    One-time passwords sent to users via mobile/email for login.
  • Trojan Horse

    Program capturing and sending user credentials and sends them to a malicious user

  • File
    A named collection of related information recorded on secondary storage.
  • File Structure
    Required format for the operating system to understand a file's defined structure.
  • Text File
    A sequence of characters organized into lines.
  • Object File
    A sequence of bytes organized into machine-understandable blocks.
  • File Type
    The operating system's ability to distinguish different file formats.
  • Directory Files
    Contain file names and access information, occupying less space.
  • Special Files

    Represent physical devices like disks, terminals, printers, etc. Also known as Device files

  • Character Special Files
    Handle data character by character, e.g., terminals or printers.
  • Trap Door
    Security hole in a program allowing unauthorized actions.
  • Logic Bomb
    Program behaving maliciously under specific conditions.
  • Virus
    Self-replicating program causing harm to user files.
  • Worm

    Process which can choked down a performance by using system resources to the extreme, slowing down or shutting down the network.

  • Port Scanning
    Detecting system vulnerabilities for potential attacks.
  • Denial of Service
    Attack preventing legitimate use of system resources.
  • Type A
    Highest security level using formal design and verification.
  • Type B1
    Maintains security labels for access control decisions.
  • Type B2
    Extends sensitivity labels to system resources, supports covert channels.
  • Type B3
    Allows creation of access control lists or user groups.
  • Type C1

    Incorporates controls so that users can protect their private information UNIX.

  • Type C2
    Adds individual-level access control to a C1 system.
  • Type D
    Lowest security level with minimum protection.
  • Type C

    Using Audit. Provides Protections and user accountability

  • Type B

    Provide mandatory Protection system. Having all Properties of C2