The FREE Cybersecurity Glossary by Thor Pedersen!
Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.
- Accreditation of IT Systems
Accreditation of IT Systems: The formal approval process that a system undergoes to verify that it adheres to a set of predefined standards or guidelines, often related to security, functionality, and reliability. During accreditation, various aspects, such as design, implementation, and operating procedures, are evaluated to ensure compliance. This process enhances confidence in the system's capabilities and its adherence to necessary norms while also identifying areas of potential improvement.
- Accrediting Authority
Accrediting Authority: An entity, often a recognized body or organization, which has the power to grant accreditation to systems, products, or individuals. The authority conducts or oversees assessments to verify compliance with specified requirements or standards. Their role is crucial in maintaining standards of quality, performance, and security, and their endorsement serves as a mark of trust and reliability.
- ACID Transaction
ACID Transaction: A concept used in database management to ensure that all database transactions are processed reliably. ACID stands for Atomicity (transactions are all-or-nothing), Consistency (transactions must leave the database in a consistent state), Isolation (transactions are processed independently), and Durability (once a transaction is committed, it is permanently recorded). This framework is crucial for maintaining data integrity across a variety of applications.
- Acknowledgment (ACK)
Acknowledgment (ACK): A signal sent between devices during a communication process to confirm that data has been successfully received. Typically, an ACK is sent from the receiver back to the sender after a packet of data has been received. The use of acknowledgments helps to ensure the reliability of communication systems, as it allows for error detection and prompts retransmission of data if an ACK is not received within a certain time frame.
- Acoustic Side-Channel Attack
Acoustic Side-Channel Attack: An attack method that exploits sound waves produced by a device during its operation to extract sensitive information. By analyzing noises such as keystrokes or fan vibrations, an attacker may be able to infer user inputs, system states, or other confidential data. These attacks highlight the need for comprehensive security measures that consider not just digital but also physical and environmental aspects of system operation.
- Acquisitions
Acquisitions: In the business context, acquisitions refer to the process of one company purchasing most or all of another company's shares or assets in order to take control of that company. In terms of IT and cybersecurity, acquisitions can have significant implications for technology integration, data management, and security considerations. It is critical to conduct thorough due diligence and plan for the secure integration of systems, networks, and data during the acquisition process to manage potential security risks and ensure regulatory compliance.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions 625 Hard questions
750 Complex questions
3,250 Easy/Mid questions - Both as Exam emulation and Per-Domain
201 After Topic questions
240 After Domain questions -
2,800 CISSP Flashcards Access from anywhere, on any device, at any time (web, Android, iOS apps).
Automated reminders, progress tracking, optimized spaced repetitions, confidence-based algorithm. -
34 CISSP Mind Maps
-
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
29 CISM Mind Maps
-
A 200-page CISM study guide
-
89 pages of CISM Quick Sheets
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
24 CC Mind Maps
-
A 120-page CC study guide
-
35 pages of CC Quick Sheets
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access