The FREE Cybersecurity Glossary by Thor Pedersen!

Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.

- System high mode
System High Mode: A security state in which a computer system operates to protect sensitive information, ensuring it remains accessible only to authorized users with the necessary clearance. Commonly utilized in military and government organizations, it involves stringent measures to prevent unauthorized access or data breaches.
- System indicator
System indicator: A visual or auditory signal that indicates the status of a computer system. This can include LED lights, beep codes, or system messages. Examples of system indicators include a red light on a server indicating a failure, a beep code indicating a memory error, or a system message saying, "System Overheated."
- System integrity
System integrity: The state of a computer system being free from unauthorized access, tampering, or data corruption. This is a key aspect of computer security and is often ensured through the use of encryption, access controls, and backup systems. Examples of system integrity breaches include a hacker accessing sensitive data or a virus corrupting a database.
- System scanning
System scanning: The process of using specialized software to search a computer system for vulnerabilities, security threats, or other issues. This can involve scanning a network for open ports, running a virus scan, or checking for outdated software. Examples of system scanning tools include Nmap, McAfee VirusScan, and Qualys Vulnerability Management.
- System security plan
System security plan: A comprehensive document that outlines the policies, procedures, and controls established to safeguard a computer system from potential security threats. It encompasses details such as access controls, data backup strategies, and incident response plans, aligning with organizational IT policies and procedures.
- System testing
System testing: The process of verifying that a system meets its specified requirements. It is used in the development and implementation of software and hardware systems. Examples include testing the functionality of a new computer program, the compatibility of a hardware component with existing systems, and the security of a network system.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions
-
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
2,500 CISSP Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
A 200-page CISM study guide
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
A 120-page CC study guide
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access