The FREE Cybersecurity Glossary by Thor Pedersen!

Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.

- Data Security Lifecycle (CSUSAD)
Data Security Lifecycle (CSUSAD): A framework used to ensure the protection of data throughout its entire lifecycle, from creation to destruction. The stages typically include Create, Store, Use, Share, Archive, and Destroy. Each stage is governed by security controls to ensure data confidentiality, integrity, and availability. Organizations apply these security measures to mitigate risks associated with data handling, storage, and disposal.
- Data Seizure in Virtualization
Data Seizure in Virtualization: The process of capturing or taking control of data within a virtualized environment, often for forensic analysis or legal purposes. Data seizure in virtualization can be complex due to the dynamic and distributed nature of virtual machines (VMs) and their storage. Authorities or forensic experts must ensure the integrity and admissibility of the data by following established protocols and using specialized tools. This includes dealing with challenges such as capturing data without disrupting services, ensuring the consistency of snapshots, and maintaining the chain of custody for the data. Proper techniques ensure that the data seized can provide reliable evidence or insight into the state of the virtualized systems at the time of the seizure.
- Data Structure
Data Structure: A specialized format for organizing and storing data in a computer so that it can be accessed and modified efficiently. Different kinds of data structures are suited to different kinds of applications, and some are highly specialized for specific tasks. Data structures can include arrays, linked lists, stacks, queues, trees, graphs, and various types of tables and databases, each with its own strengths and use cases in the realm of computer science and data processing.
- Data subjects
Data subjects: Individuals whose personal data is collected, processed, and stored by an organization. This term is significant in data privacy regulations, as it ensures the protection and confidentiality of personal information.
- Data Tampering
Data Tampering: The unauthorized, deliberate alteration of data within a database, system, or network. This can involve modifying, deleting, creating, or damaging data to corrupt information, mislead decisions, or gain unauthorized benefits. Data tampering is a security threat that undermines the integrity and trustworthiness of data, and it can have legal, financial, and reputational consequences. Safeguards against tampering include access controls, encryption, hashing, and audit logs.
- Data Terminal Equipment (DTE)
Data Terminal Equipment (DTE): A device at the user end of a communication link that serves as a data source, destination, or both. This can include devices like computers, printers, and terminals. DTEs communicate with data circuit-terminating equipment to establish, maintain, and terminate communication sessions and to manage the data exchange between them. DTE devices are typically the endpoints in a communication link, while Data Circuit-Terminating Equipment (DCE) serves as the intermediary.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions 625 Hard questions
750 Complex questions
3,250 Easy/Mid questions - Both as Exam emulation and Per-Domain
201 After Topic questions
240 After Domain questions -
2,800 CISSP Flashcards Access from anywhere, on any device, at any time (web, Android, iOS apps).
Automated reminders, progress tracking, optimized spaced repetitions, confidence-based algorithm. -
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
A 200-page CISM study guide
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
A 120-page CC study guide
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access