Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
60 views6 pages

Course 3 Glossary

The document provides a glossary of terms and definitions related to cybersecurity and cloud computing from Course 3. It includes key concepts such as access controls, data encryption, and various security models. The glossary serves as a reference for understanding essential terminology in the field.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
60 views6 pages

Course 3 Glossary

The document provides a glossary of terms and definitions related to cybersecurity and cloud computing from Course 3. It includes key concepts such as access controls, data encryption, and various security models. The glossary serves as a reference for understanding essential terminology in the field.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Course 3 glossary

Terms and definitions from Course 3

A
Access controls: Security controls that manage access, authorization, and accountability of
information

Advanced Encryption Standard (AES): A tool that converts data to unintelligible cybertext,
and back into its original form with the proper key

Application programming interface (API): A library function or system access point with
well-defined syntax and code that communicates with other applications and third-parties

Artificial intelligence (AI)

A broader concept encompassing ML and other technologies that creates systems capable of
learning, reasoning, and problem-solving

Asset management: The process of tracking assets and the risks that affect them

Attack vectors: Pathways attackers use to penetrate security defenses

Attribute-based access control (ABAC): A security model where access is granted based on
attributes, like user, resource, and environment

Auditing: The process of recording and reviewing system activity to ensure compliance with
security policies, and identifying potential security breaches

Authentication: The process of verifying who someone is

Authentication, authorization, and auditing (AAA): A security framework that is used to


verify the identity of users or groups in computer systems, and grant them access based on
their privileges

Authorization: The concept of granting access to specific resources in a system

Automation: The use of technology to reduce human and manual effort to perform common
and repetitive tasks

1
B
Bucket: A virtual container that holds objects

Business continuity plan (BCP): A document that outlines the procedures to sustain business
operations during and after a significant disruption

C
Cloud-native design: The method of creating and deploying applications and services that
are optimized for cloud environments

Confidential computing: The protection of data in use with hardware-based Trusted


Execution Environment (TEE)

Container: A software package that holds only the components necessary to execute a
particular application

Container clusters: Dynamic systems that manage and place containers, grouped in pods

Container layer: Writable space in a container

Container runtimes Software that is responsible for running and managing containers

Context-aware access controls: Decisions about granting or denying access to resources


are based on the user's identity and contextual information

D
Data at rest: Data that is not being accessed or actively moving from device to device, or
network to network

Data classification: The process of analyzing data to determine its sensitivity and value

Data discovery: The process of searching, identifying, and analyzing large amounts of data
within an organization to uncover hidden patterns, relationships, and insights

Data encryption: The process of converting data from a readable format to an encoded
format

Data governance: A set of processes that ensures that data assets are managed throughout
an organization

Data localization: The requirement that all data generated within a country's borders remain
within those borders

2
Data retention: The process of storing data, including how long it needs to be stored

Data retention period: The length of time an organization keeps information

Data sovereignty: Data stored in a physical location has to follow the regulations of that
geographic location

Data stewards: Subject matter experts who are responsible for collecting and managing data,
and preserving the quality of the data

Disaster recovery plan (DRP): A plan that allows an organization’s security team to outline the
steps needed to minimize the impact of a security incident

Discretionary access control (DAC): A security model where the owner of the data or
resource has the discretion to grant or revoke access to other users

E
Ephemerality: The concept that things only exist for a short amount of time

H
Hypervisor: The abstraction layer that sits between the physical computer and the virtual
machine

I
Identity and access management services (IAM): A collection of processes and
technologies that helps organizations manage digital identities in their environment

Infrastructure as code (IaC): The practice of automating and managing infrastructure using
reusable scripts

Immutability: The concept of being unable to change an object after it is created and
assigned a value

Internet of Things (IoT): The interconnection of everyday objects and devices that enables
them to collect, exchange, and analyze data through the internet

K
Kernel: Component of an operating system that manages processes and memory

3
M
Machine learning (ML): A subset of AI that uses algorithms to learn from data, allowing
computers to make decisions and predictions without explicit programming

Managed service: A service, application, or ecosystem managed by a third party

Mandatory access control (MAC): A strict security model where access is granted based on
predefined security policies

Micro-segmentation: A security technique that divides a network into smaller, isolated


segments

Multi-factor authentication (MFA): A security measure that requires a user to verify their
identity in two or more ways to access a system or network

Mutual Transport Layer Security (mTLS): A protocol that provides mutual authentication and
encryption between servers

N
Network access control (NAC): A security solution that enforces policy-based access control
to network resources, ensuring that only authorized devices and users can access the network

O
Open Authorization (OAuth): A method that allows users to grant applications access to their
information on other sites or systems, without the need to share their passwords

OpenID: A protocol that is used for single sign-on functionality, allowing users to authenticate
once and access multiple services

P
Patching: The process of installing updates to software to address vulnerabilities, improve
stability, or add new features

Perimeter protection: The security measures implemented at the edge of a network or


system to defend against unauthorized access and cyber threats

Policy as code (PaC): The use of code to define, manage, and automate policies, rules, and
conditions using a high-level programming language

Posture management: The continuous process of monitoring, assessing, and maintaining the
security stance of an organization's cloud resources

4
R
Rate limiting: A method that prevents an operation’s frequency from exceeding a set limit or
value

Rehydration: A cloud-native process where new servers are created with the latest updates
and patches, allowing for the workload to be transferred from old servers, and for the
outdated servers to be decommissioned or destroyed

Recovery point objective (RPO): The maximum acceptable length of time during which data
might be lost from an application due to a major incident

Recovery time objective (RTO): The target time allowed for the recovery of a service in the
event of a disaster

Risk tiering: A process that enables organizations to identify and categorize their assets
based on their importance and potential impact

Role-based access control (RBAC): A method of controlling access to resources based on


the roles assigned to users

S
Secrets: Sensitive information, like Application Programming Interface (API) keys, passwords,
and certificates that are used to authenticate and authorize access to systems

Secure configuration: The practice of setting up your cloud resources with the proper
security settings and configurations to minimize potential risks

Shared responsibility model: The implicit and explicit agreement between the customer and
the cloud service provider (CSP) regarding the shared accountability for security controls

Software bill of materials (SBOM): A machine-readable list of each piece of software, and its
components involved in the supply chain

Single sign-on (SSO): A technology that combines several different logins into one

T
Tags: Custom metadata fields you can attach to a data entry to provide context

Tag templates: Reusable structures that you can use to rapidly create new tags

Threat management strategy: A comprehensive plan that addresses the various types of
cyber threats an organization may face

5
Transport Layer Security (TLS): A security protocol that encrypts data transmitted between
two communicating applications

V
Vulnerability remediation: The process of identifying, assessing, and resolving security
vulnerabilities in your cloud environment

You might also like