The FREE Cybersecurity Glossary by Thor Pedersen!
Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.
- Security Design
Security Design: The process and practice of planning and creating systems, applications, and infrastructure with security as a central concern. Security design encompasses a range of activities, from the initial conceptualization of a system to detailed architecture and implementation. It involves identifying potential threats, defining security requirements, and selecting appropriate security controls to mitigate risks to an acceptable level. Good security design aims to achieve a balance between security measures and usability, ensuring robust defense against attacks while maintaining functionality and performance. It incorporates principles such as least privilege, defense in depth, and redundancy and is an essential aspect of developing secure IT systems and applications.
- Security domains
Security domains: A sphere within which security policies and rules govern access to information or resources. In a network or system, different security domains might exist, each with its own levels of trust and access controls, allowing users or processes to access specific data or resources based on their privileges. For example, a network might have separate security domains for its administrative, production, and guest users, each with distinct rules for accessing data and resources.
- Security fault analysis
Security fault analysis: The process of identifying and analyzing potential security weaknesses or vulnerabilities in an organization or system. It is used to assess the current level of security and identify areas for improvement. Examples of security fault analysis include penetration testing, vulnerability assessments, and risk assessments.
- Security frameworks
Security frameworks: Structured sets of guidelines and best practices designed to assist organizations in defining, implementing, and managing their security processes. They provide comprehensive methodologies for risk assessment, implementation of security controls, monitoring and improving security posture, and ensuring compliance with regulatory requirements. Well-known examples include the ISO 27001, NIST Cybersecurity Framework, and CIS Controls. Utilizing these frameworks provides a systematic and consistent approach to managing security risks.
- Security governance
Security governance: The overarching structure, principles, and procedures that define and guide an organization's approach to managing security risks. Security governance encompasses the roles and responsibilities of various stakeholders, policy creation and enforcement, compliance management, and alignment of security objectives with business goals. Effective security governance ensures that all aspects of security are addressed in a coordinated manner, supporting business objectives while protecting against threats.
- Security incident
Security incident: An event or occurrence that poses a potential security threat or compromise to an organization or system. It is used to identify and respond to security breaches and prevent further damage. Examples of security incidents include a data breach, unauthorized access to a system, or a malware attack.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions 625 Hard questions
750 Complex questions
3,250 Easy/Mid questions - Both as Exam emulation and Per-Domain
201 After Topic questions
240 After Domain questions -
2,800 CISSP Flashcards Access from anywhere, on any device, at any time (web, Android, iOS apps).
Automated reminders, progress tracking, optimized spaced repetitions, confidence-based algorithm. -
34 CISSP Mind Maps
-
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
29 CISM Mind Maps
-
A 200-page CISM study guide
-
89 pages of CISM Quick Sheets
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
24 CC Mind Maps
-
A 120-page CC study guide
-
35 pages of CC Quick Sheets
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access