expand for answer

Privileged instructions

A set of instructions generally executable only when the computer system is operating in the executive state (e. g. , while handling interrupts). These special instructions are typically designed to control such protection features as the storage protection features.


Similar items:
One of several states in which an information system may operate, and the only one in which certain privileged instructions may be executed. Such privileged instructions cannot be executed when the system is operating in other states. Synonymous with supervisor state.
[view]
The term “computer forensics” was coined in 1991 in the first training session held by the International Association of Computer Specialists (IACIS) in Portland, Oregon. Since then, computer forensics has become a popular topic in computer security circles and in the legal community. Like any other forensic science, computer forensics deals with the application of law to a science. In this case, the science involved is computer science and some refer to it as Forensic Computer Science. Computer forensics has also been described as the autopsy of a computer hard disk drive because specialized software tools and techniques are required to analyze the various levels at which computer data is stored after the fact. Computer forensics deals with the preservation, identification, extraction, and documentation of computer evidence. The field is relatively new to the private sector, but it has been the mainstay of technologyrelated investigations and intelligence gathering in law enforcement and military agencies since the mid1980s. Like any other forensic science, computer forensics involves the use of sophisticated technology tools and procedures that must be followed to guarantee the accuracy of the preservation of evidence and the accuracy of results concerning computer evidence processing. Typically, computer forensic tools exist in the form of computer software.
[view]
An alternate name for user mode. The less-powerful security domain of the Windows operating environment where user applications reside. User mode is distinct from kernel mode (aka privileged mode). User mode offers restricted resources, indirect and limited access to hardware, and isolation between processes. See also privileged mode.
[view]
Information that has been determined pursuant to Executive Order 12958 or any predecessor Order, or by the Atomic Energy Act of 1954, as amended, to require protection against unauthorized disclosure and is marked to indicate its classified status. Information that has been determined pursuant to Executive Order 12958 or any predecessor order, or by the Atomic Energy Act of 1954, as amended, to require protection against unauthorized disclosure and is marked to indicate its classified status.
[view]
A programming language that can be directly executed by a computer. Computer instructions or code representing computer operations and memory addresses in a numeric form that is executable by the computer without translation.
[view]


There are no comments yet.

Authentication required

You must log in to post a comment.

Log in