Read: The act of accessing and retrieving data from a storage location. It is used in computing to access information from a variety of sources, including memory, disk, or network. Examples of reading include accessing a file on a computer’s hard drive or reading data from a database.
Categories: CC D5: Security Operations | CCSP D5: Cloud Security Operations | CISM D3: Information Security Program | CISSP D2: Asset Security | Security+ D3: Security Architecture | SSCP D3: Risk Identification Monitoring and Analysis
Related Articles:
- Find your CISSP, CISM, and CC Study Materials | ThorTeaches.comFind your 2024 CISSP, CISM, CC Study Materials: Videos, Practice tests, Flashcards, Glossary, Chatbot, PDF Study Guides | Get Certified with ThorTeaches.com
- Frequently Asked Questions FAQ CISSP, CISM, CC | ThorTeaches.com FAQGet answers to Frequently Asked Questions for your CISSP, CISM, & CC study. Learn how to study right, materials to use, tips and tricks, sales, and much more | ThorTeaches.com
- Glossary: Write Once Read Many (WORM)
- Glossary: User-assigned privileges
- Glossary: Spartan Scytale Cipher
- Glossary: Shimmer
- Glossary: Read Access
- Glossary: Plain Text or Plaintext
- Glossary: High-level languages
- Glossary: File Layout