The FREE Cybersecurity Glossary by Thor Pedersen!

Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.

- Qualitative risk analysis
Qualitative risk analysis: A method of risk assessment that uses subjective judgment and expert opinions to evaluate the likelihood and impact of risks. It is used in risk management to prioritize risks and develop mitigation strategies. Examples include interviews, workshops, and scenario analysis.
- Quality Assurance (QA)
Quality Assurance (QA): A systematic process of ensuring that products and services meet specified requirements and are reliable, defect-free, and fit for purpose. QA practices involve the implementation of standards, testing, and review to uphold product quality and customer satisfaction.
- Quality (in IT)
Quality (in IT): Refers to the degree to which an IT system, application, or process meets specified criteria, user requirements, and performs reliably and efficiently. Quality in IT is maintained through best practices, testing, and continuous improvement.
- Quality management system (QMS)
Quality management system (QMS): A framework of policies, procedures, and processes that are used to plan, implement, and monitor the quality of a product or service. It is used in organizations to ensure customer satisfaction and compliance with standards. Examples include ISO 9001, CMMI, and Six Sigma.
- Quality of Service (QoS)
Quality of Service (QoS): The performance level of a network or internet connection that determines the speed and reliability of data transmission. It is used in networking and telecommunications to ensure that data is transmitted smoothly and efficiently. Examples include prioritizing certain types of data traffic, such as video streaming or voice calls, and implementing bandwidth allocation mechanisms to prevent network congestion.
- Quantitative Risk Analysis
Quantitative Risk Analysis: A systematic process used in risk management that quantifies the probabilities and potential consequences of risks. It typically involves the calculation of risk through the formula - Risk = Probability of Occurrence × Impact of Event. This technique allows organizations to assign monetary values to risks and to prioritize them based on their potential to affect business outcomes.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions
-
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
2,500 CISSP Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
A 200-page CISM study guide
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
A 120-page CC study guide
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access