Back to AI Flashcard MakerInformation Technology /Core Architecture & System Concepts

Core Architecture & System Concepts

Information Technology51 CardsCreated 2 months ago

This deck covers essential concepts in system architecture, Linux operations, and cybersecurity, including access control, command-line tools, networking, and security practices.

What is Access Control?

Mechanisms that determine who can access files, systems, or services.

Rate to track your progress ✦

Tap or swipe ↕ to flip
Swipe ←→Navigate
1/51

Key Terms

Term
Definition
What is Access Control?
Mechanisms that determine who can access files, systems, or services.
What does ACL stand for?
Access Control List
Define API.
A set of rules that allow software components to communicate.
What is Authentication?
Verifying the identity of a user or system.
What does Authorization involve?
Determining what an authenticated user is allowed to do.
What is an Attack Surface?
All possible points where an attacker can interact with a system.

Related Flashcard Decks

TermDefinition
What is Access Control?
Mechanisms that determine who can access files, systems, or services.
What does ACL stand for?
Access Control List
Define API.
A set of rules that allow software components to communicate.
What is Authentication?
Verifying the identity of a user or system.
What does Authorization involve?
Determining what an authenticated user is allowed to do.
What is an Attack Surface?
All possible points where an attacker can interact with a system.
What is Bash?
The most common Linux shell used for command execution and scripting.
Define Binary.
A compiled executable program.
What is a Bootloader?
Software that loads the OS kernel (e.g., GRUB).
Explain a Brute Force Attack.
Trying many password combinations until one succeeds.
What does CLI stand for?
Command Line Interface
What is a Configuration File?
A file that stores settings for applications or services (often in /etc).
What is Cron used for?
A scheduler for automated tasks.
What is a CVE?
Common Vulnerabilities and Exposures, a public identifier for known security vulnerabilities.
What is CWE?
Common Weakness Enumeration, a classification of software weaknesses.
Define Cyber Hygiene.
Practices that maintain system security (updates, strong passwords, backups).
What is a Daemon?
A background service (e.g., SSH, cron).
What is a Directory?
A folder in the Linux file system.
What is a Distro?
A packaged version of Linux (Ubuntu, Kali, Debian).
What does DNS stand for?
Domain Name System
Explain DoS/DDoS.
Attacks that overwhelm a system with traffic.
What is Encryption?
Transforming data into unreadable form without a key.
Define Environment Variable.
A value that affects how processes run (e.g., $PATH).
What is an Exit Code?
A number returned by a command indicating success or failure.
What is an Exploit?
A technique that takes advantage of a vulnerability.
What is a File System?
The structure that organizes files and directories.
What is a Firewall?
A system that filters network traffic.
Define Forensics in computing.
The practice of analyzing systems for evidence of compromise.
What does FQDN stand for?
Fully Qualified Domain Name
What is a GID?
Group ID, a numeric identifier for a group.
Define Group in Linux.
A collection of users sharing permissions.
What is Grep used for?
A tool for searching text using patterns or regex.
What is a Hash?
A one-way transformation of data (used for passwords).
What does Hardening involve?
Securing a system by reducing vulnerabilities.
What is a Home Directory?
A user’s personal workspace (/home/username).
What is an Inode?
Metadata structure storing file information (permissions, timestamps, size).
Define Interface in networking.
A network connection point (e.g., eth0, wlan0).
What is Integrity in cybersecurity?
Ensuring data has not been altered.
What is Journalctl?
Tool for viewing systemd logs.
Define Job in computing.
A scheduled or background process.
What is a Kernel?
The core of the OS that manages hardware, memory, and processes.
What is a Key Pair?
A public/private key used for encryption or authentication (e.g., SSH keys).
What is Least Privilege?
Users should only have the access they need.
What is a Log File?
A file that records system or application events.
What is a Loopback Interface?
A virtual network interface for internal communication (127.0.0.1).
Define Malware.
Malicious software designed to harm systems.
What does Mount mean in Linux?
Attaching a file system to a directory.
What is Monitoring in IT?
Observing system activity for anomalies.
What does NAT stand for?
Network Address Translation
What is Nmap used for?
A network scanning tool used to discover hosts and services.
What is a NIC?
Network Interface Card, hardware that connects a device to a network.