▶ 2.8 Resources
Important Terms Introduced
access matrix
access right
Apple’s iOS
attack scenario
authentication
biometrics
booting, bootstrapping
buffer
buffer overflow
bus
called procedure
calling procedure
Chain of Control
control section
cryptography
data section
device driver
dispatcher
DisplayPort
Ethernet
firewall
Firewire
firmware
flash memory
hard drive
island
Kerckhoffs’s principle
kernel mode
key
machine instructions
MacOS
Morris worm
motherboard
multitasking
nonrepudiation
Open Design
page table
parallel connection
pattern
persistent storage
process
process state
puzzle
return address
sandbox
security controls
serial connection
Shannon’s maxim
shell
stack
steganography
Thunderbolt
Unix-based
user identity
user mode
vault
Get Elementary Information Security, 3rd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.