The FREE Cybersecurity Glossary by Thor Pedersen!
Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.
- Data in Use
Data in Use: Refers to data that is currently being processed or manipulated by a computer application or user. Unlike data at rest or data in transit, it's in an active state, making it potentially more vulnerable to unauthorized access or attacks, like memory scraping. Security measures for data in use include encryption and access controls. Encrypting data in active use, also known as runtime encryption, involves protecting data being processed in a computer's memory. Techniques include Trusted Execution Environments (TEEs) that create secure areas in a processor, Homomorphic Encryption that allows computations on encrypted data, and Secure Enclaves like Intel SGX, which safeguard data even if the system is compromised.
- Data Labeling
Data Labeling: The process of categorizing or tagging data with labels that provide informative context or meaning, facilitating proper handling and protection according to the specified labels.
- Data Lake
Data Lake: A centralized repository that allows you to store all your structured and unstructured data at any scale. You can store your data as-is without having to first structure the data and run different types of analytics—from dashboards and visualizations to big data processing, real-time analytics, and machine learning to guide better decisions. Data lakes are typically implemented using a flat architecture where data is tagged with metadata and unique identifiers and can be efficiently queried and analyzed.
- Data Leak
Data Leak: An incident where sensitive, protected, or confidential data is unintentionally exposed, transmitted, or made accessible to unauthorized individuals. This could be the result of various actions, such as poor security configurations, vulnerabilities in software, or human error, and can lead to significant reputational and financial damage.
- Data Leakage
Data Leakage: An event where information, either intentionally or accidentally, is moved outside of an organization's security boundaries, possibly falling into the wrong hands. Data leakage could occur through various channels, such as email attachments, cloud storage, physical devices, or even through employee misconduct.
- Data Lifecycle
Data Lifecycle: The sequence of stages that a particular unit of data goes through from its initial generation or capture to its eventual archival and retirement or deletion. This lifecycle typically includes stages such as creation, processing, storage, usage, sharing, archiving, and disposal, with each stage necessitating specific handling and security measures.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions 625 Hard questions
750 Complex questions
3,250 Easy/Mid questions - Both as Exam emulation and Per-Domain
201 After Topic questions
240 After Domain questions -
2,800 CISSP Flashcards Access from anywhere, on any device, at any time (web, Android, iOS apps).
Automated reminders, progress tracking, optimized spaced repetitions, confidence-based algorithm. -
34 CISSP Mind Maps
-
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
29 CISM Mind Maps
-
A 200-page CISM study guide
-
89 pages of CISM Quick Sheets
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
24 CC Mind Maps
-
A 120-page CC study guide
-
35 pages of CC Quick Sheets
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access