CMSC 125: Operating Systems LE04 pt 1
Across
- 4. A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless a ransom is paid
- 5. Occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers
- 9. Bypasses CPU to transfer data directly between I/O device and memory.
- 14. Storage structure consisting of information about a file.
- 15. The time to move disk arm to the desired cylinder and tiem for desired sector to rotate under the disk head.
- 16. A network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules
- 18. the art of decrypting or obtaining plain text from hidden messages over an insecure channel.
- 19. Holding/Queueing of output for a device if the device is capable of serving only one request at a time.
Down
- 1. Provides an object oriented way of implementing file systems.
- 2. Is a storage made available over a network rather than over a local connection.
- 3. Results from disk head making contact with the disk surface.
- 6. Same key used to encrypt and decrypt.
- 7. Uses the same page cache to cache both memory mapped pages and ordinary file system I/O to avoid double caching.
- 8. A destructive program that masquerades as a benign application.
- 10. Pretending to be an authorized user to escalate privileges.
- 11. The study of codes, or the art of writing and solving them.
- 12. Program that initates a security incident under certain circumstances.
- 13. Intercepting an already established session to bypass authentication.
- 17. The art of hiding messages by converting them into hidden texts.