The FREE Cybersecurity Glossary by Thor Pedersen!
Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.
- Security inspection
Security inspection: The process of systematically evaluating an organization or system to identify security weaknesses and vulnerabilities. It is used to assess the current level of security and identify areas for improvement. Examples of a security inspection include regular security audits and assessments, as well as security testing and evaluations.
- Security Kernel
Security Kernel: The core component of a secure operating system that enforces the security policy for the entire system. It provides mechanisms such as authentication and access control and is designed to be tamper-proof and resilient to attacks, isolating critical security functions from the rest of the system.
- Security label
Security label: An information tag associated with a resource or data object that defines its security status, including the level of sensitivity and the access privileges required to interact with it. Security labels are crucial elements in Mandatory Access Control (MAC) systems, where access decisions are made based on these labels and the security clearances of users or processes. They help ensure that sensitive data can only be accessed by authorized and appropriately cleared entities.
- Security Management
Security Management: The process of identifying an organization's assets (including information assets), followed by the development, documentation, and implementation of policies and procedures for protecting these assets. Security management encompasses a range of practices and responsibilities aimed at ensuring the confidentiality, integrity, and availability of data and IT services. It can involve various activities such as risk assessment, security planning, access control, security training and awareness, incident response, and compliance with relevant laws and regulations. Effective security management requires ongoing evaluation and adaptation to address evolving threats and vulnerabilities within the context of an organization's changing needs and objectives.
- Security models
Security models: Conceptual frameworks that outline the structures and processes needed to enforce security policies within an organization's IT environment. Security models help guide the design and implementation of system security by establishing clear rules and protocols for data confidentiality, integrity, and availability.
- Security Operations Center (SOC)
Security Operations Center (SOC): A centralized unit where an organization's security activities are coordinated and managed. Staffed by security analysts and equipped with advanced tools and technologies, a SOC provides continuous surveillance and analysis of data from networks, servers, endpoints, applications, and databases to detect, analyze, and respond to cybersecurity incidents. The aim of a SOC is to identify and mitigate threats in real-time, ensuring the ongoing security of an organization's information assets.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions 625 Hard questions
750 Complex questions
3,250 Easy/Mid questions - Both as Exam emulation and Per-Domain
201 After Topic questions
240 After Domain questions -
2,800 CISSP Flashcards Access from anywhere, on any device, at any time (web, Android, iOS apps).
Automated reminders, progress tracking, optimized spaced repetitions, confidence-based algorithm. -
34 CISSP Mind Maps
-
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
29 CISM Mind Maps
-
A 200-page CISM study guide
-
89 pages of CISM Quick Sheets
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
24 CC Mind Maps
-
A 120-page CC study guide
-
35 pages of CC Quick Sheets
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access