The FREE Cybersecurity Glossary by Thor Pedersen!

Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.

- Metadata-based discovery
Metadata-based discovery: Metadata-based discovery involves analyzing data descriptors to gain insights about stored information without accessing the data itself. It is a method used in cybersecurity to quickly assess system configurations, data usage, and changes over time, aiding in vulnerability assessments and security monitoring. For instance, metadata could reveal the creation date of files, their last access times, and modifications, which is beneficial in incident investigations.
- Metric
Metric: A quantifiable measure used to track and assess the status of a specific process. In the context of secure operations, metrics can be used to determine the effectiveness of various security measures, track incident response times, measure compliance with security policies or evaluate the success of awareness programs, among others. They provide key insights for decision-makers and help inform strategic planning.
- Metropolitan Area Network (MAN)
Metropolitan Area Network (MAN): A computer network that covers a large geographic area, such as a city or town. It is used to connect multiple local area networks (LANs) within a metropolitan area. Examples include campus networks, city-wide networks, and regional networks.
- Microkernel architecture
Microkernel architecture: A computer architecture that uses a small, highly modular kernel to provide basic services, such as memory management and task scheduling. It is used in operating systems to improve performance and security by limiting the scope of the kernel. Examples include Mach and QNX.
- Microsegmentation
Microsegmentation: A security technique that enables fine-grained security policies to be assigned to data center applications down to the workload level. This approach enables security controls to be more precisely applied to protect against lateral threats inside a network, and it reduces the network attack surface. If a system component is compromised, the potential for lateral movement of threats is minimized, as each segment is isolated from the others.
- Micro training
Micro training: Micro training refers to short, focused educational or training sessions designed to quickly convey important information or skills. In cybersecurity, microtraining can be used to efficiently address specific threats, educate employees on security best practices, or update teams on new policies, all with the goal of promoting security awareness in a time-effective manner.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions
-
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
2,500 CISSP Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
A 200-page CISM study guide
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
A 120-page CC study guide
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access