The FREE Cybersecurity Glossary by Thor Pedersen!

Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.

- Strongly typed programming languages
Strongly typed programming languages: Languages that enforce strict rules for data types, requiring variables to be declared with a specific type and restricting operations to valid ones for that type. Examples include C, C++, and Java.
- Structured programming
Structured programming: A paradigm of designing programs where the flow of control is governed by structured blocks, typically using sequences, selections, and loops. The main aim of structured programming is to enhance the clarity, quality, and development time of a computer program by making use of subroutines, loop control structures, and block structures. Its principles increase the maintainability and reliability of software, reducing the likelihood of bugs and vulnerabilities.
- Synthetic transactions
Synthetic transactions: Scripted actions that simulate user interactions with a system or application. These scripts mimic end-user behavior, such as logging in, navigating through an application, or completing a transaction, to proactively monitor and measure system performance and availability. Synthetic transactions are used in testing environments to identify potential issues before they impact end users, helping to maintain a high level of service availability and security.
- Safeguard
Safeguard: A measure or procedure designed to protect against loss, damage, or unauthorized access to information or assets. It is used in security to prevent or mitigate risks to an organization's assets or information. Examples of safeguards include implementing firewalls to protect against cyber-attacks or installing security cameras to deter theft.
- Safe harbor
Safe harbor: A legal provision that offers protection from liability or penalty if specific guidelines or standards are met. Often found in regulations, safe harbor provisions enable organizations to legally transfer data across jurisdictions by adhering to established principles, thereby ensuring compliance and responsible handling of sensitive information.
- Salami technique
Salami technique: A type of fraud that involves the slicing off of small amounts of money from multiple transactions to create a larger sum. It is often used in financial crimes to steal money from a large number of victims. Examples of salami techniques include a bank employee taking small amounts of money from multiple customer accounts or a retailer charging small amounts to customers' credit cards without their knowledge.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions
-
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
2,500 CISSP Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
A 200-page CISM study guide
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
A 120-page CC study guide
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access