The FREE Cybersecurity Glossary by Thor Pedersen!

Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.

- Java applets
Java applets: Java applets were small Java programs that could run in a web browser to provide interactive features on web pages. However, due to security concerns and the rise of alternative technologies, applets have become largely obsolete and are no longer supported by most web browsers. Modern web development practices utilize alternative technologies like HTML5, JavaScript, and WebAssembly for embedding interactive content.
- JavaScript
JavaScript: A programming language used to create interactive and dynamic content on websites. It is executed by the web browser and allows for user input and real-time updates on a web page. It is used in web development and front-end web programming. Examples include a search bar or a form on a website.
- Job Rotation
Job Rotation: A security practice where employees are moved from one job to another within an organization. It is intended to prevent employees from gaining excessive knowledge or control over a particular system or process, reducing the risk of fraud or insider threats. It is used in personnel security and access control. Examples include rotating IT staff between different departments or rotating security guards on different shifts.
- Journal entry
Journal entry: A written record of a financial transaction or other business event. It includes the date, description, and amount of the transaction and is used to track and document business activities. It is used in accounting and auditing. Examples include recording a sale or recording a payment.
- Jump hosts
Jump hosts: A computer or server that acts as an intermediary between a user's device and the target system they are trying to access. It is used to securely connect to remote networks and improve the security of remote access. Examples of jump hosts include VPN servers and bastion hosts.
- Just-in-time (JIT) access
Just-in-time (JIT) access: Just-in-time (JIT) access is a privilege management approach where users are granted necessary permissions only when required and for the shortest duration necessary to complete tasks. This minimizes the risk of unauthorized access or security breaches by limiting the window of opportunity for attackers. JIT access is often implemented in privileged access management solutions.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions
-
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
2,500 CISSP Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
A 200-page CISM study guide
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
A 120-page CC study guide
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access