2.8 Resources

Important Terms Introduced

  • access matrix

  • access right

  • Apple’s iOS

  • attack scenario

  • authentication

  • biometrics

  • booting, bootstrapping

  • buffer

  • buffer overflow

  • bus

  • called procedure

  • calling procedure

  • Chain of Control

  • control section

  • cryptography

  • data section

  • device driver

  • dispatcher

  • DisplayPort

  • Ethernet

  • firewall

  • Firewire

  • firmware

  • flash memory

  • hard drive

  • island

  • Kerckhoffs’s principle

  • kernel mode

  • key

  • machine instructions

  • MacOS

  • Morris worm

  • motherboard

  • multitasking

  • nonrepudiation

  • Open Design

  • page table

  • parallel connection

  • pattern

  • persistent storage

  • process

  • process state

  • puzzle

  • return address

  • sandbox

  • security controls

  • serial connection

  • Shannon’s maxim

  • shell

  • stack

  • steganography

  • Thunderbolt

  • Unix-based

  • user identity

  • user mode

  • vault

Get Elementary Information Security, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.