CMSC 125: Operating Systems LE04 pt 1

12345678910111213141516171819
Across
  1. 4. A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless a ransom is paid
  2. 5. Occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers
  3. 9. Bypasses CPU to transfer data directly between I/O device and memory.
  4. 14. Storage structure consisting of information about a file.
  5. 15. The time to move disk arm to the desired cylinder and tiem for desired sector to rotate under the disk head.
  6. 16. A network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules
  7. 18. the art of decrypting or obtaining plain text from hidden messages over an insecure channel.
  8. 19. Holding/Queueing of output for a device if the device is capable of serving only one request at a time.
Down
  1. 1. Provides an object oriented way of implementing file systems.
  2. 2. Is a storage made available over a network rather than over a local connection.
  3. 3. Results from disk head making contact with the disk surface.
  4. 6. Same key used to encrypt and decrypt.
  5. 7. Uses the same page cache to cache both memory mapped pages and ordinary file system I/O to avoid double caching.
  6. 8. A destructive program that masquerades as a benign application.
  7. 10. Pretending to be an authorized user to escalate privileges.
  8. 11. The study of codes, or the art of writing and solving them.
  9. 12. Program that initates a security incident under certain circumstances.
  10. 13. Intercepting an already established session to bypass authentication.
  11. 17. The art of hiding messages by converting them into hidden texts.