The FREE Cybersecurity Glossary by Thor Pedersen!
Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.
- SYN Packet
SYN Packet: A key component of the TCP/IP protocol's three-way handshake, the SYN packet is sent by a client to initiate a network connection. It requests the establishment of a session by signaling the start of communication. The server responds with a SYN-ACK packet, acknowledging the request, and the handshake is completed when the client replies with an ACK packet.
- System Administrator (SA)
System Administrator (SA): A professional responsible for the upkeep, configuration, and reliable operation of computer systems, especially multi-user systems like servers. The SA ensures that system hardware, software, and related infrastructure are maintained effectively.
- System assets
System assets: The physical and logical components of a computer system that are valuable to an organization and require protection. System assets can include hardware, software, data, and networks. They are often identified and protected through the implementation of security policies and controls.
- System development
System development: The process of designing, creating, and implementing a new computer system or software application. This can involve requirements gathering, design, coding, testing, and deployment. Examples of system development projects include a new CRM system or a mobile app.
- System Development Life Cycle (SDLC)
System Development Life Cycle (SDLC): A structured framework that guides the creation and maintenance of systems through stages such as planning, analysis, design, development, testing, deployment, and maintenance to ensure efficiency and alignment with user requirements. It includes models like Waterfall, Agile, and DevOps.
- System hardening
System hardening: The process of strengthening a computer system's security by reducing its attack surface and vulnerabilities. This can involve disabling unnecessary services, applying security patches, and implementing security controls. Examples of system hardening measures include firewalls, intrusion detection systems, and access controls.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions 625 Hard questions
750 Complex questions
3,250 Easy/Mid questions - Both as Exam emulation and Per-Domain
201 After Topic questions
240 After Domain questions -
2,800 CISSP Flashcards Access from anywhere, on any device, at any time (web, Android, iOS apps).
Automated reminders, progress tracking, optimized spaced repetitions, confidence-based algorithm. -
34 CISSP Mind Maps
-
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
29 CISM Mind Maps
-
A 200-page CISM study guide
-
89 pages of CISM Quick Sheets
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
24 CC Mind Maps
-
A 120-page CC study guide
-
35 pages of CC Quick Sheets
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access