The FREE Cybersecurity Glossary by Thor Pedersen!
Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.
- Cybersecurity Maturity Model Certification (CMMC)
Cybersecurity Maturity Model Certification (CMMC): A framework developed by the U.S. Department of Defense to assess the cybersecurity capabilities and maturity of defense contractors and other organizations. CMMC ensures that organizations handling sensitive government data meet specific cybersecurity standards, with certification levels ranging from basic hygiene to advanced capabilities, depending on the risk level and sensitivity of the data.
- Cyberwarfare
Cyberwarfare: The use or targeting of computers and networks in warfare or conflict, where state actors and associated groups engage in cyber activities to attack, infiltrate, and sabotage the digital infrastructure of other nations, organizations, or individuals. It includes operations that can disrupt critical systems, steal classified information, interfere with decision-making processes, and affect the physical infrastructure through cyber means. Cyberwarfare presents a complex threat landscape, often blurring the lines between civilian and military targets and posing significant challenges to international law and security. It's an integral part of modern military strategy, with nations actively developing defensive and offensive cyber capabilities.
- Cyclic Redundancy Check (CRC)
Cyclic Redundancy Check (CRC): A method for detecting errors in digital data using a mathematical algorithm to generate a checksum known as a CRC value. This value is compared with a newly calculated CRC upon data retrieval or transmission to verify data integrity. If the values differ, it signals data corruption. CRC is widely used for error detection in computer networks, storage media, and various communication protocols, sometimes facilitating error correction.
- Damage Evaluation
Damage Evaluation: A process used to assess the extent and impact of harm caused by an event, such as a cyber-attack, natural disaster, or accident. In a cybersecurity context, this involves analyzing the consequences of a breach or attack, determining which assets were compromised, and estimating the associated costs and operational impacts. It includes identifying data loss, service disruptions, financial implications, and reputational damage. A thorough damage evaluation is crucial for developing an effective recovery plan and mitigating future risks.
- Dashboard
Dashboard: In a broad operational sense, a dashboard is a visual display that aggregates and simplifies key information and metrics about the system's operation. In a security context, dashboards are often employed to provide a consolidated view of the organization's security posture, presenting important metrics such as ongoing threats, vulnerabilities, incidents, and overall system health.
- Data Aggregation
Data Aggregation: The process of collecting and summarizing information from multiple sources to achieve a consolidated view. Often used in data analytics, business intelligence, and reporting, it allows for more informed decision-making by presenting a comprehensive picture of collected data for analysis. Aggregation can involve compiling detailed data into summary form, computing sums, averages, counts, or other metrics that provide insight into trends, patterns, or performance across datasets.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions 625 Hard questions
750 Complex questions
3,250 Easy/Mid questions - Both as Exam emulation and Per-Domain
201 After Topic questions
240 After Domain questions -
2,800 CISSP Flashcards Access from anywhere, on any device, at any time (web, Android, iOS apps).
Automated reminders, progress tracking, optimized spaced repetitions, confidence-based algorithm. -
34 CISSP Mind Maps
-
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
29 CISM Mind Maps
-
A 200-page CISM study guide
-
89 pages of CISM Quick Sheets
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
24 CC Mind Maps
-
A 120-page CC study guide
-
35 pages of CC Quick Sheets
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access