Across
- 4. bit On regular files, it is ignored; on a directory, prevents deletion or renaming unless the owner of directory, file, or superuser
- 5. Denial of service attack, a process continually replicates and overloads the entire system
- 10. Direct reference or copy of the original file, allows for easy accessibility, secure backup, and data persistence
- 13. See process running on the system, in realtime
- 14. Pseudo filesystem that contains information about the system state
- 17. Allows permitted users to execute a command with elevated privileges, for a temporary amount of time
- 19. Method of hiding data in another media type so that the existence of the data is concealed
- 20. Key Cryptography where sender and receiver shares a common key to encrypt and decrypt
- 22. Remote login protocol that secures network services on insecure network
- 23. Archives, compresses, deletes log files to manage disk space and improve performance
- 24. Mnemonic form to add, change, or remove directory permissions
Down
- 1. Essential commands used by the system, specifically root only, maintaining system integrity
- 2. Hardware or software that prevents unwanted packets from accessing network and systems
- 3. Prevents data inconsistencies, performs fast checks, prevent corrupting by writing data twice
- 6. Kernel error causing the computer to reboot
- 7. An acronym for a program that blocks spam software from posting comments on pages
- 8. A kernel background process that starts automatically after booting, has low PID numbers
- 9. Stores encrypted user password hashes and policies, protects against unauthorized access, readable to the superuser
- 11. Device manager that detects and configures devices automatically, created everytime at time of machine boot.
- 12. Kernel, not a complete operating system
- 15. Authentication framework, wrapper for different libraries
- 16. High level package management, is a wrapper, very powerful
- 18. We are different people, but still interconnected
- 21. Account with administrative, utmost control, and highest privileges
