The FREE Cybersecurity Glossary by Thor Pedersen!
Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.
- Enumeration
Enumeration: A process used in the reconnaissance or pre-attack phase where a potential attacker interacts with a system to gather information that could be useful for exploiting it. This may involve determining a user's valid email address, network resources, shared directories, IP addresses in use, or even detailed user account information in certain circumstances.
- Environment
Environment: In general terms, an environment refers to the surrounding conditions or context in which an organism, system, or object operates. In computing, an environment is the setting in which a computer program or software application runs – it's about the hardware, operating system, software libraries, and data that exist outside the program itself. The term is also used to describe the configuration of software or hardware tools to create a specific type of runtime environment, such as a development, test, or production environment. Each environment serves a particular purpose in the software development lifecycle and operates under different parameters.
- Environmental Monitoring
Environmental Monitoring: The process of continuously observing and analyzing the conditions of a specific setting to ensure optimal performance and detect any potential issues that could affect system operations or data integrity. This includes tracking parameters like temperature, humidity, power supply, water leaks, or even unauthorized access, which can be crucial for maintaining the proper functioning of sensitive equipment like servers in a data center.
- Ephemeral Key
Ephemeral Key: A cryptographic key that is used only once or for a brief period of time before being discarded. It is typically employed in secure communications to ensure the confidentiality and integrity of each individual session. The use of ephemeral keys enhances security by ensuring that even if a key is compromised, it can't be used to decrypt other sessions or gain long-term access to sensitive information.
- Ephemeral Storage
Ephemeral Storage: Temporary data storage that is not persistent across reboots or termination of the instance. It is often used in cloud computing environments for temporary storage of information such as swap files, buffers, or session data. Data stored in ephemeral storage is typically lost once the instance is stopped, terminated, or crashes, making it unsuitable for long-term data retention but useful for transient data and applications that do not require durable storage.
- ePHI (Electronic Protected Health Information)
ePHI (Electronic Protected Health Information): Any Protected Health Information (PHI) that is created, stored, transmitted, or received in an electronic form. Under laws such as the Health Insurance Portability and Accountability Act (HIPAA), ePHI must be kept confidential and secure to protect patients' privacy. This often involves the use of encryption, secure networks, and robust access controls.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions 625 Hard questions
750 Complex questions
3,250 Easy/Mid questions - Both as Exam emulation and Per-Domain
201 After Topic questions
240 After Domain questions -
2,800 CISSP Flashcards Access from anywhere, on any device, at any time (web, Android, iOS apps).
Automated reminders, progress tracking, optimized spaced repetitions, confidence-based algorithm. -
34 CISSP Mind Maps
-
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
29 CISM Mind Maps
-
A 200-page CISM study guide
-
89 pages of CISM Quick Sheets
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
24 CC Mind Maps
-
A 120-page CC study guide
-
35 pages of CC Quick Sheets
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access