The FREE Cybersecurity Glossary by Thor Pedersen!

Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.

- Project
Project: A temporary effort that is undertaken to create a unique product, service, or result. It is used in various fields, such as engineering and marketing, to achieve specific objectives within a specified timeframe and budget. Examples include building a bridge, launching a new product, and organizing a conference.
- Project portfolio
Project portfolio: A collection of projects that are aligned with an organization's strategic goals and objectives. It is used to prioritize, allocate resources, and monitor the progress of projects. Examples include a portfolio of IT projects, a portfolio of construction projects, and a portfolio of marketing projects.
- Project team
Project team: A group of individuals who are responsible for completing a specific project within an organization. It is used to bring together the necessary expertise and skills to achieve project goals. Examples include software development teams, construction teams, and marketing teams.
- Promiscuous mode
Promiscuous mode: A networking mode in which a device can receive all incoming traffic, regardless of whether it is addressed to it or not. It is used in security assessments to capture network traffic for analysis. Examples include promiscuous mode on network switches, promiscuous mode on network analyzers, and promiscuous mode on virtual machines.
- Proprietary
Proprietary: Referring to products, technology, or systems that are owned by a specific person or organization and are protected by patents, copyrights, or other legal rights, restricting their use or reproduction. Common in industries like pharmaceuticals and software, examples include proprietary software, proprietary formulas, and proprietary processes.
- Proprietary Information
Proprietary Information: Confidential or sensitive information that belongs to a specific person or organization and is not intended to be shared with others. It is used in various fields, such as finance and healthcare, to protect sensitive data and assets. Examples include financial records, customer lists, and trade secrets.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions 625 Hard questions
750 Complex questions
3,250 Easy/Mid questions - Both as Exam emulation and Per-Domain
201 After Topic questions
240 After Domain questions -
2,800 CISSP Flashcards Access from anywhere, on any device, at any time (web, Android, iOS apps).
Automated reminders, progress tracking, optimized spaced repetitions, confidence-based algorithm. -
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
A 200-page CISM study guide
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
A 120-page CC study guide
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access