The FREE Cybersecurity Glossary by Thor Pedersen!

Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.

- Peripherals
Peripherals: These are external devices connected to a computer system, expanding its capabilities. Peripherals include items like keyboards, mice, printers, scanners, and external drives. They enable input, output, and storage functions that are not inherently part of the core computer architecture.
- Permission Aggregation
Permission Aggregation: Permission aggregation is a concept in access control where the system calculates the effective permissions of a user by combining all the rights granted directly to the user and those obtained through group memberships or role assignments. It's crucial in complex systems with layered security structures to understand a user's combined permissions, which helps in enforcing the principle of least privilege and preventing excessive access rights.
- Permissions
Permissions: The level of access that a user, group, or process has to a system or its resources. They are an essential component of access control, helping to ensure that only authorized individuals or processes can view, modify, or execute specific files or operations. The administration of permissions is a critical task in maintaining system security and data integrity, requiring ongoing oversight to account for changes in roles, responsibilities, or threat environments.
- Personal Area Network (PAN)
Personal Area Network (PAN): A network arrangement that interconnects devices within the reach of an individual person, typically within a range of 10 meters. This could include devices such as smartphones, laptops, wearable devices, or smart home devices. The security considerations for a PAN involve ensuring secure communications between devices, controlling access to devices, and protecting the data stored or transmitted within the network.
- Personal Identification Number (PIN)
Personal Identification Number (PIN): A secret numeric password used to verify a user's identity and access specific services or systems, providing an additional layer of security against unauthorized access. Examples include ATM PINs and phone unlock codes.
- Personal Identification Verification Card
Personal Identification Verification Card: The Personal Identification Verification (PIV) Card is a United States federal government standard for secure and reliable forms of identification for federal employees and contractors. The PIV card serves as a government-issued identification card for access to federal buildings and information systems, and includes integrated security features such as cryptographic keys, personal identification numbers (PINs), and biometric data to ensure the cardholder's identity.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions
-
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
2,500 CISSP Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
A 200-page CISM study guide
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
A 120-page CC study guide
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access