The FREE Cybersecurity Glossary by Thor Pedersen!
Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.
- Custodian
Custodian: In the context of information security, a custodian is an individual or organization responsible for safeguarding data or an asset, ensuring its confidentiality, integrity, and availability. They are typically tasked with implementing the policies and procedures established by the data owners and maintaining the technical environment to secure the information. They may handle tasks such as performing regular backups, applying necessary security patches, and managing access controls.
- Customer Relationship Management (CRM)
Customer Relationship Management (CRM): A strategic approach that focuses on managing an organization's interactions with its customers and potential customers. It uses data analysis about a customer's history with a company to improve business relationships, primarily focusing on retaining customers and driving sales growth. CRM systems also maintain a robust layer of security to protect sensitive customer data from potential threats or breaches.
- Cybercrimes
Cybercrimes: Illegal activities conducted through the Internet or other forms of digital communication. These crimes include hacking, identity theft, phishing scams, online fraud, the distribution of child exploitation material, cyberstalking, and the unauthorized access to or manipulation of systems, networks, and data. Cybercrimes are a growing concern for individuals, corporations, and governments, as they can lead to significant financial losses, privacy violations, and threats to digital infrastructure. Efforts to combat cybercrimes involve legal, technical, and educational measures.
- Cyberespionage
Cyberespionage: The practice of using covert techniques and technologies to illicitly access, steal, or destroy an adversary's sensitive information or intellectual property for strategic, military, or competitive advantage. This activity is typically carried out by highly skilled individuals or groups and can target a range of entities, including governments, corporations, or individuals.
- Cybersecurity
Cybersecurity: The practice of protecting computer systems, networks, devices, and data from unauthorized access, theft, damage, or other forms of cyber-attack. It encompasses a wide range of techniques, technologies, and processes designed to safeguard the integrity, confidentiality, and availability of information. Cybersecurity is critical in managing and mitigating risks related to the use and storage of digital information and is crucial for both individuals and organizations in our increasingly networked world.
- Cybersecurity Architecture
Cybersecurity Architecture: The design and framework that outlines the structure and behavior of an organization's security processes, information security systems, personnel, and technologies. It provides a roadmap and strategic context for deploying the right technologies and processes to protect the organization's digital assets and operations. Effective cybersecurity architecture ensures that security controls are integrated into every layer of the technology stack, from the network perimeter to end-user devices, helping to defend against threats and maintain regulatory compliance.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions 625 Hard questions
750 Complex questions
3,250 Easy/Mid questions - Both as Exam emulation and Per-Domain
201 After Topic questions
240 After Domain questions -
2,800 CISSP Flashcards Access from anywhere, on any device, at any time (web, Android, iOS apps).
Automated reminders, progress tracking, optimized spaced repetitions, confidence-based algorithm. -
34 CISSP Mind Maps
-
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
29 CISM Mind Maps
-
A 200-page CISM study guide
-
89 pages of CISM Quick Sheets
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
24 CC Mind Maps
-
A 120-page CC study guide
-
35 pages of CC Quick Sheets
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access