2 cissp ® Official Study Guide Eighth Edition



Download 19,3 Mb.
Pdf ko'rish
bet316/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   312   313   314   315   316   317   318   319   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

Privileged Mode
CPUs also support 
privileged mode
, which is designed to give the operat-
ing system access to the full range of instructions supported by the CPU. This mode goes by 
a number of names, and the exact terminology varies according to the CPU manufacturer. 
Some of the more common monikers are included in the following list:

Privileged mode

Supervisory mode


Assess and Mitigate Security Vulnerabilities 
333

System mode 

Kernel mode
No matter which term you use, the basic concept remains the same—this mode grants 
a wide range of permissions to the process executing on the CPU. For this reason, well-
designed operating systems do not let any user applications execute in privileged mode. 
Only those processes that are components of the operating system itself are allowed to 
execute in this mode, for both security and system integrity purposes. 
Don’t confuse processor modes with any type of user access permis-
sions. The fact that the high-level processor mode is sometimes called 
privileged
or
supervisory mode
has no relationship to the role of a user. 
All user applications, including those of system administrators, run in user 
mode. When system administrators use system tools to make configura-
tion changes to the system, those tools also run in user mode. When a user 
application needs to perform a privileged action, it passes that request 
to the operating system using a system call, which evaluates it and either 
rejects the request or approves it and executes it using a privileged mode 
process outside the user’s control.
 Memory 
The second major hardware component of a system is
memory
, the storage bank for infor-
mation that the computer needs to keep readily available. There are many different kinds of 
memory, each suitable for different purposes, and we’ll take a look at each in the sections 
that follow.

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   312   313   314   315   316   317   318   319   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish