The FREE Cybersecurity Glossary by Thor Pedersen!
Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.
- Rapid elasticity
Rapid elasticity: The ability of a cloud system to quickly scale up or down in response to changes in demand or usage. It is used in cloud computing to ensure that a system has the necessary resources to handle sudden increases in traffic or workload without affecting performance or availability. Examples include auto-scaling, load balancing, and resource allocation.
- Raw Disk Storage
Raw Disk Storage: Storage access mode where the operating system and applications interact directly with the disk sectors, bypassing typical file system structures. This provides finer control over the data storage and retrieval process, utilized in scenarios requiring tailored data management, such as certain database systems or specialized data processing applications.
- Read
Read: The act of accessing and retrieving data from a storage location. It is used in computing to access information from a variety of sources, including memory, disk, or network. Examples of reading include accessing a file on a computer's hard drive or reading data from a database.
- Read Access
Read Access: The permission to access and retrieve data from a storage location. It is used in security to control who can access sensitive information. Examples of read access include allowing only certain users to view sensitive financial data or restricting access to confidential documents.
- Real User Monitoring (RUM)
Real User Monitoring (RUM): A performance measurement technique that tracks the user experience of a website or application in real-time from the user's perspective. It is used in web development and user experience design to identify and diagnose performance issues, such as slow page loads, errors, or crashes. Examples include using RUM tools to monitor the end-to-end user journey, including the network, server, and browser components, and using RUM data to identify and optimize performance bottlenecks or user pain points.
- Reasonable actions
Reasonable actions: Actions that are considered appropriate given the specific circumstances and are based on common sense and sound judgment. It is used in information security to determine the necessary measures that need to be taken to protect data and systems from potential threats. Examples include implementing multi-factor authentication, conducting regular security assessments, and implementing robust access controls.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions 625 Hard questions
750 Complex questions
3,250 Easy/Mid questions - Both as Exam emulation and Per-Domain
201 After Topic questions
240 After Domain questions -
2,800 CISSP Flashcards Access from anywhere, on any device, at any time (web, Android, iOS apps).
Automated reminders, progress tracking, optimized spaced repetitions, confidence-based algorithm. -
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
A 200-page CISM study guide
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
A 120-page CC study guide
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access


