CISSP (Certified Information Systems Security Professional)

The CISSP is the most in-demand IT/Cybersecurity certification, the CISSP is golden standard. It is offered by ISC2 and is designed for experienced security practitioners, managers, and executives who want to demonstrate their knowledge across a wide array of security practices and principles. There are currently over 74,228 open CISSP jobs in the US. (More […]

Zero fill

Zero fill: A process of overwriting all data on a storage device with zeroes in order to permanently erase the data. It is used to securely delete sensitive data and prevent it from being recovered. Examples of zero fill include wiping a hard drive, formatting a USB drive, and using a secure erase utility.

Volatile data

Volatile data: Information stored in memory that is lost when the computer is turned off or loses power. Volatile data includes information in a system’s RAM and cache, which is crucial for forensic investigations as it contains temporary files and may hold evidence about running processes and system state.

Transborder data flow

Transborder data flow: The movement or transfer of digital information across national or jurisdictional boundaries. It often involves different legal and regulatory environments, including diverse data protection laws. This cross-border data flow can present challenges to ensuring consistent data protection and privacy standards, making the understanding and application of proper safeguards and compliance measures crucial.

System Administrator (SA)

System Administrator (SA): A professional responsible for the upkeep, configuration, and reliable operation of computer systems, especially multi-user systems like servers. The SA ensures that system hardware, software, and related infrastructure are maintained effectively.

System assets

System assets: The physical and logical components of a computer system that are valuable to an organization and require protection. System assets can include hardware, software, data, and networks. They are often identified and protected through the implementation of security policies and controls.