2 cissp ® Official Study Guide Eighth Edition



Download 19,3 Mb.
Pdf ko'rish
bet317/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   313   314   315   316   317   318   319   320   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

 Read-Only Memory
Read-only memory (ROM)
works like the name implies—it’s memory the PC can read but 
can’t change (no writing allowed). The contents of a standard ROM chip are burned in at 
the factory, and the end user simply cannot alter it. ROM chips often contain “bootstrap” 
information that computers use to start up prior to loading an operating system from disk. 
This includes the familiar
power-on self-test (POST)
series of diagnostics that run each 
time you boot a PC. 
ROM’s primary advantage is that it can’t be modifi ed. There is no chance that user or 
administrator error will accidentally wipe out or modify the contents of such a chip. This 
attribute makes ROM extremely desirable for orchestrating a computer’s innermost workings. 
There is a type of ROM that may be altered by administrators to some extent. It is known 
as programmable read-only memory (PROM), and its several subtypes are described next: 
Programmable Read-Only Memory (PROM)
A basic
programmable read-only memory 
(PROM)
chip is similar to a ROM chip in functionality, but with one exception. During 
the manufacturing process, a PROM chip’s contents aren’t “burned in” at the factory as 
with standard ROM chips. Instead, a PROM incorporates special functionality that allows 
an end user to burn in the chip’s contents later. However, the burning process has a similar 


334
Chapter 9 

Security Vulnerabilities, Threats, and Countermeasures
outcome—once data is written to a PROM chip, no further changes are possible. After it’s 
burned in, a PROM chip essentially functions like a ROM chip.
PROM chips provide software developers with an opportunity to store information per-
manently on a high-speed, customized memory chip. PROMs are commonly used for hard-
ware applications where some custom functionality is necessary but seldom changes once 
programmed.

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   313   314   315   316   317   318   319   320   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish