The FREE Cybersecurity Glossary by Thor Pedersen!

Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.

- Padded Cell
Padded Cell: A containment strategy in intrusion detection that redirects a suspected intruder into a decoy system called a "honeypot." This isolated environment appears realistic, engaging the intruder while protecting the actual system. It aids in studying the intruder's actions to improve security measures.
- Pan-tilt-zoom (PTZ)
Pan-tilt-zoom (PTZ): A type of camera distinguished by its capability to remotely directional and zoom control. In a security context, PTZ cameras are often used for surveillance, allowing operators to monitor large areas with a single camera. The pan feature allows the camera to move left or right, tilt moves up and down, and zoom focuses the lens closer or further from an area of interest.
- Paper test
Paper test: A paper test, often referred to as a tabletop exercise, involves evaluating the effectiveness of security controls and incident response procedures through discussion-based scenarios. Participants walk through various hypothetical situations to analyze the response strategies and decision-making processes without the need for active technical intervention. This approach is widely used for training purposes and to gauge the preparedness of an organization's security team.
- Parallel simulation
Parallel simulation: The process of simulating multiple processes or operations simultaneously to evaluate outcomes in a shared environment. This approach is commonly used in performance and security testing to determine how well systems manage concurrent transactions or tasks. It aids in identifying bottlenecks, points of failure, or potential security vulnerabilities that may not be apparent under typical conditions.
- Parallel Test
Parallel Test: A method of testing where multiple copies of a system are run simultaneously, and their outputs are compared to ensure that they produce the same results. It is used to validate the integrity and reliability of a system by comparing its performance in different environments. Examples include disaster recovery testing and redundant systems.
- Parameter validation
Parameter validation: A security technique that checks the input of a system to ensure that it meets the required format and specifications. It is used to prevent malicious attacks that exploit input vulnerabilities, such as SQL injection and buffer overflows. Examples include input filtering and type checking.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions
-
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
2,500 CISSP Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
A 200-page CISM study guide
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
A 120-page CC study guide
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access