The FREE Cybersecurity Glossary by Thor Pedersen!

Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.

- Penetration testing - Reporting
Penetration testing - Reporting: The final phase of penetration testing. After the discovery and exploitation phases, all findings, including vulnerabilities, data breaches, and successful exploits, are compiled into a comprehensive report. This report provides an overview of the test's findings and offers suggestions for improving the system's security. It's a crucial document for understanding the current security posture and planning the necessary steps for enhancement.
- Penetration testing - Scanning
Penetration testing - Scanning: The process of analyzing the target system, network, or application for specific vulnerabilities that can be exploited. Tools such as vulnerability scanners and port scanners are used to identify open ports and detect live systems, services used by hosts, and other potential points of entry. This process provides valuable data, which is used to devise an effective approach for the exploitation phase of the test.
- People safety in BC/DR (Business Continuity/Disaster Recovery)
People safety in BC/DR (Business Continuity/Disaster Recovery): The measures and strategies put in place to ensure the safety and well-being of individuals during and after a disaster or disruption. This concept is used in various industries, including healthcare, government, and critical infrastructure, to prevent loss of life and minimize damage to property and the environment. Examples include emergency evacuation plans, emergency response protocols, and crisis management plans.
- Perimeter
Perimeter: The outer boundary of a network or system, defining the area of protection and control. It is used in cyber security to refer to the edge of a network, where security measures are in place to prevent unauthorized access. Examples include firewalls and intrusion detection systems.
- Perimeter security controls
Perimeter security controls: Measures that are implemented at the boundary of a network or system to prevent unauthorized access and protect internal resources. It is used in network security to create a barrier between trusted and untrusted networks and to monitor and control traffic. Examples include firewalls, intrusion detection systems, and network access control.
- Periods processing
Periods processing: The division of business operations into discrete time intervals for accounting purposes, such as days, months, or fiscal quarters. This allows for the systematic recording, analysis, and reporting of financial data and transactions.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions
-
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
2,500 CISSP Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
A 200-page CISM study guide
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
A 120-page CC study guide
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access