The FREE Cybersecurity Glossary by Thor Pedersen!
Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.
- Construct a Platform for Risk Analysis of Security Critical Systems (CORAS)
Construct a Platform for Risk Analysis of Security Critical Systems (CORAS): A model-driven method for conducting security risk analysis. CORAS offers a customized language for threat and risk modeling and comes with detailed guidelines explaining each step of the risk analysis process. It includes tools that support the execution of these steps, as well as libraries for documenting and reusing common types of threats, vulnerabilities, and treatments. The CORAS method is particularly designed for precise, unambiguous, and efficient risk modeling of security-critical systems and is often used in industries that demand a high level of security assurance.
- Consumerization
Consumerization: The influence that consumer-originated technologies and preferences are exerting on broader business and organizational contexts. In many cases, these consumer technologies are being adopted by businesses due to their ease of use, convenience, or innovative features. However, it poses certain challenges in terms of ensuring security and control over business data and processes, as the boundary between personal and professional technology use blurs.
- Contact alarms
Contact alarms: Alarms that are triggered by the activation of a contact device. They are commonly used in security systems to alert individuals or authorities of an unauthorized entry or attempted entry. Examples include alarm systems that are triggered by the opening of a door or window, pressure mats that trigger an alarm when stepped on, or touch-sensitive pads that trigger an alarm when touched.
- Containerization
Containerization: A lightweight form of virtualization that allows for the packaging and isolation of applications with their entire runtime environment—all of the necessary code, system tools, libraries, and settings included. This encapsulation ensures that the application works uniformly and consistently across different computing environments. Containers are more portable and use fewer resources than traditional hardware-based or full-machine virtualization approaches, such as virtual machines (VMs) because they share the host system's kernel rather than requiring their own operating system. This technology is widely used to streamline and simplify the deployment of applications, enhance scalability, and improve security by isolating applications from each other and the underlying infrastructure.
- Containment
Containment: In a security context, containment refers to the strategies and actions taken to prevent the spread of a threat, such as a malware infection or a security breach, within a system or network. It helps in minimizing damage by isolating affected areas, thus preventing further compromise of data or resources.
- Contamination
Contamination: In the context of security, contamination refers to the unintentional introduction or infiltration of unwanted elements, such as malware or erroneous data, into a system or network. This can lead to data corruption, system disruption, or other adverse effects that may compromise the integrity and reliability of the system.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions 625 Hard questions
750 Complex questions
3,250 Easy/Mid questions - Both as Exam emulation and Per-Domain
201 After Topic questions
240 After Domain questions -
2,800 CISSP Flashcards Access from anywhere, on any device, at any time (web, Android, iOS apps).
Automated reminders, progress tracking, optimized spaced repetitions, confidence-based algorithm. -
34 CISSP Mind Maps
-
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
29 CISM Mind Maps
-
A 200-page CISM study guide
-
89 pages of CISM Quick Sheets
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
24 CC Mind Maps
-
A 120-page CC study guide
-
35 pages of CC Quick Sheets
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access