The FREE Cybersecurity Glossary by Thor Pedersen!
Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.
- Flooding
Flooding: A type of security attack where the network or system is overwhelmed with traffic or data, resulting in overconsumption of available resources. It could lead to system slowdowns or, in extreme cases, cause the system to crash entirely. Common types of flooding include Distributed Denial of Service (DDoS) attacks, where an attacker inundates a network with unwanted traffic, often from a botnet.
- Footprinting
Footprinting: The initial step where information gatherers collect as much data as possible about a target, such as an individual, a group, or an organization. This can be performed through various methods, including search engines, social media platforms, WHOIS databases, network tools, and more. This is a commonly used technique in ethical hacking to understand the security posture of a target system and find potential vulnerabilities that can be exploited.
- Forced Encryption
Forced Encryption: A policy where data is automatically encrypted before it is stored or transmitted, ensuring that the information remains secure and inaccessible to unauthorized users. This process can be performed at different levels, such as at the file, disk, or network level, and is key in protecting sensitive data from unauthorized access or potential data breaches.
- Foreign Key
Foreign Key: In databases, a foreign key is a column or set of columns in a relational database table that provides a link between data in two tables. It refers to the primary key of another table, establishing a relationship between the two tables and enforcing referential integrity. The foreign key identifies a column or a set of columns in one (referencing) table that matches the primary key or a unique key in another (referenced) table. The relationship between the two keys ensures that the data in the two tables remains consistent.
- Forensic audit
Forensic audit: An investigation into financial information or activities to determine if there has been any wrongdoing or fraud. It is used to uncover evidence of illegal or unethical behavior, such as embezzlement or money laundering. Examples of forensic audits include investigations into financial fraud or the mismanagement of company funds.
- Forensic examination
Forensic examination: The methodical collection and analysis of digital evidence to reconstruct past events. This can include activities like recovering deleted files, analyzing system logs, extracting data from databases, or examining network traffic. The goal is to understand what actions were performed, by whom, and when to establish the facts of a case or incident.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions 625 Hard questions
750 Complex questions
3,250 Easy/Mid questions - Both as Exam emulation and Per-Domain
201 After Topic questions
240 After Domain questions -
2,800 CISSP Flashcards Access from anywhere, on any device, at any time (web, Android, iOS apps).
Automated reminders, progress tracking, optimized spaced repetitions, confidence-based algorithm. -
34 CISSP Mind Maps
-
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
29 CISM Mind Maps
-
A 200-page CISM study guide
-
89 pages of CISM Quick Sheets
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
24 CC Mind Maps
-
A 120-page CC study guide
-
35 pages of CC Quick Sheets
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access