The FREE Cybersecurity Glossary by Thor Pedersen!

Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.

- Parity
Parity: The technique used in error detection when data is transmitted over computer networks or stored within it. Parity involves adding an extra bit (parity bit) to each byte of data, which is set to either 0 or 1 depending on the type of parity used (even or odd). This allows the detection of single-bit errors, contributing to the integrity of data.
- Parity Check
Parity Check: The process of verifying the accuracy of data based on the parity bit. When data is received or retrieved, the number of set bits is counted and compared with the expected value based on the parity bit. If the counts match, it's assumed that the data is error-free; if not, it indicates that a data error has occurred during transmission or storage.
- Parkerian Hexad
Parkerian Hexad: A model of information security that identifies six key components - confidentiality, integrity, availability, authenticity, accountability, and non-repudiation. It is used in security frameworks and policies to ensure that sensitive information is protected in all aspects. Examples include access control, encryption, and auditing.
- Partitioned file
Partitioned file: A large data file, typically in a database system, that is divided into smaller, more manageable pieces based on defined criteria (date ranges, categories, etc.). This approach can improve query performance, simplify data management, and allow for more efficient data archiving or deletion. It's commonly used in data warehousing and large-scale data processing systems.
- Partitioned Security Mode
Partitioned Security Mode: A security technique that divides a system into isolated compartments or domains to enhance security and control access, preventing unauthorized access to sensitive data and resources. Examples include role-based access control and security domains.
- Partitioning
Partitioning: The division of a computer's hard drive or storage space into separate, discrete sections, each functioning as an independent disk, to optimize system performance and data management. Partitioning can also refer to dividing databases, memory, and other resources for better organization and security.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions
-
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
2,500 CISSP Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
A 200-page CISM study guide
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
A 120-page CC study guide
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access