Certified Information Systems Security Professional (CISSP) is an independent information security certification granted by the International Information System Security Certification Consortium. CISSP is a standardized, vendor-neutral certification program that provided structure and demonstrated competence relevant to information security professionals.
Firmware is a program or set of computer instructions stored in the physical circuitry of ROM memory. These types of programs are typically changed infrequently or not at all. In servers and user workstations, firmware usually stores the initial computer instructions that are executed when the server or workstation is powered on; the firmware starts the CPU and other onboard chips, and establishes communications by using the keyboard, monitor, network adaptor, and hard drive. The firmware retrieves blocks of data from the hard drive that are then used to load and start the operating system.
A computer's BIOS is a common example of firmware. BIOS, or Basic Input-Output System, contains instructions needed to start a computer when it's first powered on, initialize devices, and load the operating system from secondary storage (such as a hard drive).
Firmware is also found in devices such as smartphones, tablets, DSL/cable modems, and practically every other type of Internet-connected device, such as automobiles, thermostats, and even your refrigerator.
Firmware is typically stored on one or more ROM chips on a computer's motherboard (the main circuit board containing the CPU(s), memory, and other circuitry).
Software
Software includes the operating system and programs or applications that are installed on a computer system.
Operating Systems
A computer operating system (OS) is the software that controls the workings of a computer, enabling the computer to be used. The operating system can be thought of as a logical platform, through which other programs can be run to perform work.
The main components of an operating system are:
• Kernel: The core component of the operating system that allows processes, control of hardware devices, and communications to external devices and systems to run.
• Device drivers: Software modules used by the kernel to communicate with internal and external devices that may be connected to the computer.
• Tools: Independent programs that perform specific maintenance functions, such as filesystem repair or network testing. Tools can be run automatically or manually.
The operating system controls a computer's resources. The main functions of the operating system are:
• Process management: Sets up an environment in which multiple independent processes (programs) can run.
• Resource management: Controls access to all available resources, using schemes that may be based on priority or efficiency.
• I/O device management: Controls communication to all devices that are connected to the computer, including hard drives, printers, monitors, keyboard, mouse, and so on.
• Memory management: Controls the allocation and access to main memory (RAM), allocating it to processes, as well as general uses such as disk caching.
• File management: Controls the file systems that are present on hard drives and other types of devices and performs all file operations on behalf of individual processes.
• Communications management: Controls communications on all available communications media on behalf of processes.Process management: Sets up an environment in which multiple independent processes (programs) can run.
This is an excerpt from:
If you're a security professional seeking your CISSP certification, this book is a perfect way to prepare for the exam. Covering in detail all eight domains, the expert advice gives you the key information you'll need to pass the exam with flying colors. Plus, you'll receive guidance on setting up a study plan, tips for exam day, and access to an online test bank of questions. After you earn your CISSP certification, learn how to grow as a security professional and put your certification to good use. So, put the odds in your favor and get started today!
• How to prepare for the CISSP examination
• An in-depth chapter on all eight certification domains
• Advice on getting the most out of a CISSP certification
• Tips on studying for the exam and a stress-free test day
•
Click here for more information.
More Windows Administration Information:
• Ransomware and How To Protect Yourself
• DriveLock Hard Drive Protection
• Remove Stubborn Malware Infection With McAfee Labs Stinger
• Social Engineering Attack Counter Measures
• Turn On Your Browser's Phishing Filter
• Has Malware Turned Off Your PC's User Account Control?
• What is 2-Factor Authentication?
• The Seven Most Common Methods of Cyber Attacks
• What is Riskware or Grayware?
• What is Phishing and How to Safeguard Against It