The FREE Cybersecurity Glossary by Thor Pedersen!
Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.
- Validity check
Validity check: A process that verifies if data entered into a system adheres to specified rules and formats. These checks are typically performed to maintain data integrity and reduce the likelihood of errors or inconsistencies. For example, a validity check might ensure that an email address entered into a system is in the correct format.
- Variant
Variant: A version or form of something that is slightly different from the original. In the context of malware, for instance, a variant refers to a version of the malicious software that has been slightly altered from its original form, often to avoid detection by security measures or to adapt to different environments.
- Verification
Verification: The process of ensuring that a product, system, or component meets specified requirements. It involves a series of checks and balances to ensure that what was designed, created, or implemented aligns with the original intentions or goals. Verification is often used to ensure that security measures are properly in place and functioning as intended.
- Video and audio recording tools
Video and audio recording tools: The technology used to capture, store, and playback visual and auditory data. In the context of maintaining organizational security, such tools can be used for monitoring environments for any suspicious activities, recording incidents for investigation or evidence purposes, and training personnel on security protocols.
- Video monitoring or video surveillance
Video monitoring or video surveillance: The use of cameras and other visual recording devices to monitor and record activities within a specific area. It is used for security purposes, to identify potential threats or incidents, and to provide evidence of criminal activity. Examples include CCTV cameras in a shopping mall or security cameras in a parking lot.
- Virtual circuits
Virtual circuits: A connection-oriented communication model that allows data to be delivered between two network nodes. They create a logical path between source and destination, mimicking the behavior of a physical circuit but over a shared network infrastructure, providing a degree of isolation and security between communication sessions.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions 625 Hard questions
750 Complex questions
3,250 Easy/Mid questions - Both as Exam emulation and Per-Domain
201 After Topic questions
240 After Domain questions -
2,800 CISSP Flashcards Access from anywhere, on any device, at any time (web, Android, iOS apps).
Automated reminders, progress tracking, optimized spaced repetitions, confidence-based algorithm. -
34 CISSP Mind Maps
-
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
29 CISM Mind Maps
-
A 200-page CISM study guide
-
89 pages of CISM Quick Sheets
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
24 CC Mind Maps
-
A 120-page CC study guide
-
35 pages of CC Quick Sheets
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access