Back to AI Flashcard MakerInformation Technology /Core Architecture & System Concepts

Core Architecture & System Concepts

Information Technology51 CardsCreated 13 days ago

This deck covers essential concepts in system architecture, Linux operations, and cybersecurity, including access control, command-line tools, networking, and security practices.

What is Access Control?

Mechanisms that determine who can access files, systems, or services.
Tap or swipe ↕ to flip
Swipe ←→Navigate
1/51

Key Terms

Term
Definition
What is Access Control?
Mechanisms that determine who can access files, systems, or services.
What does ACL stand for?
Access Control List
Define API.
A set of rules that allow software components to communicate.
What is Authentication?
Verifying the identity of a user or system.
What does Authorization involve?
Determining what an authenticated user is allowed to do.
What is an Attack Surface?
All possible points where an attacker can interact with a system.

Related Flashcard Decks

Study Tips

  • Press F to enter focus mode for distraction-free studying
  • Review cards regularly to improve retention
  • Try to recall the answer before flipping the card
  • Share this deck with friends to study together
TermDefinition
What is Access Control?
Mechanisms that determine who can access files, systems, or services.
What does ACL stand for?
Access Control List
Define API.
A set of rules that allow software components to communicate.
What is Authentication?
Verifying the identity of a user or system.
What does Authorization involve?
Determining what an authenticated user is allowed to do.
What is an Attack Surface?
All possible points where an attacker can interact with a system.
What is Bash?
The most common Linux shell used for command execution and scripting.
Define Binary.
A compiled executable program.
What is a Bootloader?
Software that loads the OS kernel (e.g., GRUB).
Explain a Brute Force Attack.
Trying many password combinations until one succeeds.
What does CLI stand for?
Command Line Interface
What is a Configuration File?
A file that stores settings for applications or services (often in /etc).
What is Cron used for?
A scheduler for automated tasks.
What is a CVE?
Common Vulnerabilities and Exposures, a public identifier for known security vulnerabilities.
What is CWE?
Common Weakness Enumeration, a classification of software weaknesses.
Define Cyber Hygiene.
Practices that maintain system security (updates, strong passwords, backups).
What is a Daemon?
A background service (e.g., SSH, cron).
What is a Directory?
A folder in the Linux file system.
What is a Distro?
A packaged version of Linux (Ubuntu, Kali, Debian).
What does DNS stand for?
Domain Name System
Explain DoS/DDoS.
Attacks that overwhelm a system with traffic.
What is Encryption?
Transforming data into unreadable form without a key.
Define Environment Variable.
A value that affects how processes run (e.g., $PATH).
What is an Exit Code?
A number returned by a command indicating success or failure.
What is an Exploit?
A technique that takes advantage of a vulnerability.
What is a File System?
The structure that organizes files and directories.
What is a Firewall?
A system that filters network traffic.
Define Forensics in computing.
The practice of analyzing systems for evidence of compromise.
What does FQDN stand for?
Fully Qualified Domain Name
What is a GID?
Group ID, a numeric identifier for a group.
Define Group in Linux.
A collection of users sharing permissions.
What is Grep used for?
A tool for searching text using patterns or regex.
What is a Hash?
A one-way transformation of data (used for passwords).
What does Hardening involve?
Securing a system by reducing vulnerabilities.
What is a Home Directory?
A user’s personal workspace (/home/username).
What is an Inode?
Metadata structure storing file information (permissions, timestamps, size).
Define Interface in networking.
A network connection point (e.g., eth0, wlan0).
What is Integrity in cybersecurity?
Ensuring data has not been altered.
What is Journalctl?
Tool for viewing systemd logs.
Define Job in computing.
A scheduled or background process.
What is a Kernel?
The core of the OS that manages hardware, memory, and processes.
What is a Key Pair?
A public/private key used for encryption or authentication (e.g., SSH keys).
What is Least Privilege?
Users should only have the access they need.
What is a Log File?
A file that records system or application events.
What is a Loopback Interface?
A virtual network interface for internal communication (127.0.0.1).
Define Malware.
Malicious software designed to harm systems.
What does Mount mean in Linux?
Attaching a file system to a directory.
What is Monitoring in IT?
Observing system activity for anomalies.
What does NAT stand for?
Network Address Translation
What is Nmap used for?
A network scanning tool used to discover hosts and services.
What is a NIC?
Network Interface Card, hardware that connects a device to a network.