The FREE Cybersecurity Glossary by Thor Pedersen!

Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.

- Privilege
Privilege: A special right, immunity, or exemption granted to an individual or group. It is used in the context of access control to grant certain users or processes additional rights and permissions beyond the default access level. Examples include administrative privileges, root privileges, and privileged accounts.
- Privileged applets
Privileged applets: Privileged applets refer to Java applets that are granted additional permissions beyond the strict limitations of the Java security sandbox model. They can interact with the system in ways typical applets cannot, such as reading and writing local files or accessing system resources, provided the user grants the necessary permissions.
- Privileged Users/Accounts
Privileged Users/Accounts: A user or account with additional rights and permissions beyond the default access level. It is used in access control systems to grant certain individuals or processes access to sensitive data and systems. Examples include administrator accounts, root accounts, and service accounts.
- Privilege escalation
Privilege escalation: The act of exploiting a vulnerability or misconfiguration to gain access to privileges and permissions beyond the intended level of access. It is used in the context of security vulnerabilities and threats to gain unauthorized access to sensitive data and systems. Examples include exploiting weak passwords, privilege mismanagement, and insecure default configurations.
- Probabilistic method
Probabilistic method: A mathematical approach to solving problems by calculating the likelihood of different outcomes based on probability. It is used in data analysis, machine learning, and other fields to predict and analyze trends and patterns. Examples include Bayesian analysis, Markov chain models, and Monte Carlo simulations.
- Probe
Probe: In cybersecurity, probing refers to the methodical examination of a network or system for vulnerabilities that could be exploited. It's often a preliminary step in an attack, allowing threat actors to gather information and strategize their infiltration or used by security professionals for defensive vulnerability assessments.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions 625 Hard questions
750 Complex questions
3,250 Easy/Mid questions - Both as Exam emulation and Per-Domain
201 After Topic questions
240 After Domain questions -
2,800 CISSP Flashcards Access from anywhere, on any device, at any time (web, Android, iOS apps).
Automated reminders, progress tracking, optimized spaced repetitions, confidence-based algorithm. -
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
A 200-page CISM study guide
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
A 120-page CC study guide
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access