CMSC 125: Operating Systems LE04 pt 1
Across
- 2. Holding/Queueing of output for a device if the device is capable of serving only one request at a time.
- 3. Pretending to be an authorized user to escalate privileges.
- 8. Bypasses CPU to transfer data directly between I/O device and memory.
- 11. The time to move disk arm to the desired cylinder and tiem for desired sector to rotate under the disk head.
- 14. Same key used to encrypt and decrypt.
- 15. A destructive program that masquerades as a benign application.
- 17. Results from disk head making contact with the disk surface.
- 18. the art of decrypting or obtaining plain text from hidden messages over an insecure channel.
Down
- 1. Uses the same page cache to cache both memory mapped pages and ordinary file system I/O to avoid double caching.
- 4. Provides an object oriented way of implementing file systems.
- 5. Storage structure consisting of information about a file.
- 6. Program that initates a security incident under certain circumstances.
- 7. The art of hiding messages by converting them into hidden texts.
- 9. A network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules
- 10. A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless a ransom is paid
- 12. The study of codes, or the art of writing and solving them.
- 13. Intercepting an already established session to bypass authentication.
- 16. Occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers
- 19. Is a storage made available over a network rather than over a local connection.