The FREE Cybersecurity Glossary by Thor Pedersen!
Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.
- Nonintrusive monitoring
Nonintrusive monitoring: The observation and measurement of system activity in a way that does not affect the operation or performance of the system. This could involve gathering and analyzing log files, traffic patterns, or user behavior while minimizing impact on the system and its users.
- No notice assessment
No notice assessment: No notice assessments are unannounced evaluations or tests performed to assess the effectiveness of an organization's security posture. By simulating a realistic scenario without forewarning, these assessments can provide a more accurate representation of how an organization would respond to an actual incident or threat.
- Non-repudiation
Non-repudiation: A property of systems that provides assurance that someone cannot deny the validity of something. Typically used in digital security, it provides proof of the origin or delivery of data to protect the sender against false denial by the recipient that the data has been received or to protect the recipient against false denial by the sender that the data has been sent.
- Non-statistical sampling
Non-statistical sampling: Non-statistical sampling refers to selecting a sample based on criteria other than statistical methods, often used when a high degree of confidence in the representativeness of the sample isn't required or when other practical considerations drive the selection. Examples include judgmental or purposive sampling.
- Normalization
Normalization: The process of organizing a database to minimize redundancy and dependency. It is used in database design to improve the efficiency and organization of data. Examples include breaking up a large table into smaller, related tables and removing repeating data.
- North-South APIs
North-South APIs: These APIs enable connectivity between an organization's internal network and external entities, such as third-party services, partners, and customers. North-South API traffic is often subject to intense scrutiny by CISOs, as these APIs expose core business applications to the internet, necessitating stringent security controls to protect against external threats and unauthorized access.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions 625 Hard questions
750 Complex questions
3,250 Easy/Mid questions - Both as Exam emulation and Per-Domain
201 After Topic questions
240 After Domain questions -
2,800 CISSP Flashcards Access from anywhere, on any device, at any time (web, Android, iOS apps).
Automated reminders, progress tracking, optimized spaced repetitions, confidence-based algorithm. -
34 CISSP Mind Maps
-
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
29 CISM Mind Maps
-
A 200-page CISM study guide
-
89 pages of CISM Quick Sheets
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
24 CC Mind Maps
-
A 120-page CC study guide
-
35 pages of CC Quick Sheets
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access