The FREE Cybersecurity Glossary by Thor Pedersen!
Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.
- System high mode
System High Mode: A security state in which a computer system operates to protect sensitive information, ensuring it remains accessible only to authorized users with the necessary clearance. Commonly utilized in military and government organizations, it involves stringent measures to prevent unauthorized access or data breaches.
- System indicator
System indicator: A visual or auditory signal that indicates the status of a computer system. This can include LED lights, beep codes, or system messages. Examples of system indicators include a red light on a server indicating a failure, a beep code indicating a memory error, or a system message saying, "System Overheated."
- System integrity
System integrity: The state of a computer system being free from unauthorized access, tampering, or data corruption. This is a key aspect of computer security and is often ensured through the use of encryption, access controls, and backup systems. Examples of system integrity breaches include a hacker accessing sensitive data or a virus corrupting a database.
- System scanning
System scanning: The process of using specialized software to search a computer system for vulnerabilities, security threats, or other issues. This can involve scanning a network for open ports, running a virus scan, or checking for outdated software. Examples of system scanning tools include Nmap, McAfee VirusScan, and Qualys Vulnerability Management.
- System security plan
System security plan: A comprehensive document that outlines the policies, procedures, and controls established to safeguard a computer system from potential security threats. It encompasses details such as access controls, data backup strategies, and incident response plans, aligning with organizational IT policies and procedures.
- System testing
System testing: The process of verifying that a system meets its specified requirements. It is used in the development and implementation of software and hardware systems. Examples include testing the functionality of a new computer program, the compatibility of a hardware component with existing systems, and the security of a network system.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions 625 Hard questions
750 Complex questions
3,250 Easy/Mid questions - Both as Exam emulation and Per-Domain
201 After Topic questions
240 After Domain questions -
2,800 CISSP Flashcards Access from anywhere, on any device, at any time (web, Android, iOS apps).
Automated reminders, progress tracking, optimized spaced repetitions, confidence-based algorithm. -
34 CISSP Mind Maps
-
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
29 CISM Mind Maps
-
A 200-page CISM study guide
-
89 pages of CISM Quick Sheets
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
24 CC Mind Maps
-
A 120-page CC study guide
-
35 pages of CC Quick Sheets
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access