CMSC 125: Operating Systems LE04 pt 1

12345678910111213141516171819
Across
  1. 2. Holding/Queueing of output for a device if the device is capable of serving only one request at a time.
  2. 3. Pretending to be an authorized user to escalate privileges.
  3. 8. Bypasses CPU to transfer data directly between I/O device and memory.
  4. 11. The time to move disk arm to the desired cylinder and tiem for desired sector to rotate under the disk head.
  5. 14. Same key used to encrypt and decrypt.
  6. 15. A destructive program that masquerades as a benign application.
  7. 17. Results from disk head making contact with the disk surface.
  8. 18. the art of decrypting or obtaining plain text from hidden messages over an insecure channel.
Down
  1. 1. Uses the same page cache to cache both memory mapped pages and ordinary file system I/O to avoid double caching.
  2. 4. Provides an object oriented way of implementing file systems.
  3. 5. Storage structure consisting of information about a file.
  4. 6. Program that initates a security incident under certain circumstances.
  5. 7. The art of hiding messages by converting them into hidden texts.
  6. 9. A network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules
  7. 10. A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless a ransom is paid
  8. 12. The study of codes, or the art of writing and solving them.
  9. 13. Intercepting an already established session to bypass authentication.
  10. 16. Occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers
  11. 19. Is a storage made available over a network rather than over a local connection.