The FREE Cybersecurity Glossary by Thor Pedersen!
Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.
- Biba Model
Biba Model: A formal security model focused on maintaining data integrity within computer security systems. It employs a lattice-based access control to enforce integrity levels, ensuring that information from lower integrity levels does not contaminate higher ones. The model's rules include "No Read Up" (preventing reading data at higher integrity levels) and "No Write Down" (preventing writing data to lower integrity levels).
- Big Data
Big Data: Large and complex data sets that traditional data processing applications cannot handle effectively. Big Data often involves the three Vs. Volume (large amounts of data), Velocity (quickly generated or processed), and Variety (different types of data). It's used for advanced analytics and other data-driven applications.
- Binary
Binary: This pertains to a base-2 number system, which uses only two digits, 0 and 1, to represent all its values. This system is used extensively in digital computers and digital logic because it's straightforward to implement with digital electronic circuitry. As every piece of data or instruction in a computer is represented in binary, understanding and protecting binary data is critical to overall system security.
- Binary code
Binary code: A system of representing numbers, letters, and other symbols using only two digits, 0 and 1. This concept is used in computer science to encode and transmit data, as well as to write instructions for computer programs. For example, a binary code for the letter "A" might be 01000001.
- Binding
Binding: In computing, this refers to the creation of a linkage between a software object and a data element, a variable and its value, or a user action and a program response. In the realm of cybersecurity, binding often relates to the secure association of credentials with users or devices to ensure secure authentication processes.
- Biometric Locks
Biometric Locks: Advanced security devices that use unique biological traits, such as fingerprints, eye patterns, or facial recognition, to authenticate and grant access to individuals. Biometric locks enhance security by providing a non-transferable and difficult-to-replicate method for verifying identity.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions 625 Hard questions
750 Complex questions
3,250 Easy/Mid questions - Both as Exam emulation and Per-Domain
201 After Topic questions
240 After Domain questions -
2,800 CISSP Flashcards Access from anywhere, on any device, at any time (web, Android, iOS apps).
Automated reminders, progress tracking, optimized spaced repetitions, confidence-based algorithm. -
34 CISSP Mind Maps
-
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
29 CISM Mind Maps
-
A 200-page CISM study guide
-
89 pages of CISM Quick Sheets
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
24 CC Mind Maps
-
A 120-page CC study guide
-
35 pages of CC Quick Sheets
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access