The FREE Cybersecurity Glossary by Thor Pedersen!
Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.
- Mainframe
Mainframe: A large, powerful computer designed for high-volume data processing and transaction processing. It is used in industries such as finance, telecommunications, and government to handle large amounts of data and support multiple users simultaneously. Examples include IBM's z/OS operating system and the CICS transaction processing system.
- Maintenance Hook
Maintenance Hook: A maintenance hook, traditionally known as a backdoor, is a method intentionally built into software by its creators that allows for direct access to perform administrative or maintenance tasks. While often used legitimately by developers or support teams, these can be considered security risks if discovered by attackers, as they may be exploited to gain unauthorized access to software or systems.
- Maintenance Key
Maintenance Key: A maintenance key is a specialized type of cryptographic key that is designated specifically for performing maintenance or administrative functions on a system. This key facilitates secure access for tasks like updating software or managing hardware settings, but due to its elevated access privileges, it must be protected to avoid misuse or exploitation.
- Malware
Malware: A term used to describe any software that is designed to cause harm to a computer or network. It is used to refer to a variety of malicious software, such as viruses, worms, ransomware, and spyware. Examples include the WannaCry ransomware, the Mirai botnet, and the Stuxnet worm.
- Malware Inspection
Malware Inspection: The process of examining files or systems for the presence of malicious software. It can involve a range of techniques, from simple signature-based detection (matching files against a database of known malware) to more sophisticated behavioral or heuristic analysis (looking for abnormal behavior or characteristics that suggest malware). Regular and thorough malware inspections are key for maintaining system health and integrity. Malware inspection can also use real-time monitoring and automated response tools.
- Managed Detection and Response (MDR)
Managed Detection and Response (MDR): A security service where a third-party provider continuously monitors a network for security threats and responds to them in real-time. It is used in organizations that do not have the resources or expertise to handle security threats on their own. Examples include monitoring network activity for malware and responding to cyberattacks.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions
-
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
2,500 CISSP Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
A 200-page CISM study guide
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
A 120-page CC study guide
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access