The FREE Cybersecurity Glossary by Thor Pedersen!
Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.
- Mode transition
Mode transition: In cybersecurity, mode transition refers to the change from one operating state or security level to another within a system or application. It is a critical event that should be securely managed to prevent exploitation by attackers or the introduction of vulnerabilities. For example, a database system might transition from a normal operation mode to a maintenance mode, which may require different access controls or security protocols.
- Modulation
Modulation: The process of varying one or more properties of a periodic waveform, called the carrier signal, with a separate signal that contains the information to be transmitted. This technique is used in telecommunication, radio, and data communication systems to transfer information effectively. Types of modulation include amplitude modulation (AM), frequency modulation (FM), and phase modulation (PM), each having unique properties that make them suitable for different types of data transmission.
- Monitoring
Monitoring: The process of continuously collecting and analyzing data to identify potential security threats. It is used in IT security to identify and respond to potential security breaches in real-time. Examples include using network intrusion detection systems to monitor network traffic for anomalies and using security information and event management (SIEM) tools to collect and analyze logs from multiple sources.
- Monitoring activities
Monitoring activities: The process of monitoring user activity to identify potential security threats. It is used in IT security to detect and prevent unauthorized access to sensitive data and systems. Examples include using access logs to track user login and logout times, monitoring network traffic to identify potential malicious activity, and implementing user behavior analytics to identify anomalies in user behavior.
- Monitoring applied to APIs
Monitoring applied to APIs: Monitoring APIs involves tracking and analyzing the operation, performance, and usage of application programming interfaces to ensure they function as intended and to detect any abnormal activity that could indicate a security issue. It includes verifying that API calls meet security policies, checking for unauthorized use, and tracking changes in API behavior over time.
- Monolithic operating system architecture
Monolithic operating system architecture: A monolithic operating system architecture is one where the entire operating system, including the kernel, device drivers, and system services, operates in a single memory space. This traditional architecture can offer fast performance due to its direct access to system hardware, but it may be less flexible and more vulnerable to system-wide crashes or security breaches if a single component fails or is compromised.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions 625 Hard questions
750 Complex questions
3,250 Easy/Mid questions - Both as Exam emulation and Per-Domain
201 After Topic questions
240 After Domain questions -
2,800 CISSP Flashcards Access from anywhere, on any device, at any time (web, Android, iOS apps).
Automated reminders, progress tracking, optimized spaced repetitions, confidence-based algorithm. -
34 CISSP Mind Maps
-
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
29 CISM Mind Maps
-
A 200-page CISM study guide
-
89 pages of CISM Quick Sheets
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
24 CC Mind Maps
-
A 120-page CC study guide
-
35 pages of CC Quick Sheets
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access