The FREE Cybersecurity Glossary by Thor Pedersen!
Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.
- Amortization
Amortization: A financial concept referring to the process of gradually paying off a debt over time through scheduled, typically fixed, payments. Each payment includes a portion that goes toward reducing the principal amount borrowed and a portion that covers the interest on the debt. Amortization can also refer to the spreading out of the cost of an intangible asset over its useful life for accounting and tax purposes. This allows businesses to write off the value of an asset incrementally, reflecting its consumption, depreciation, or obsolescence over time. In IT, for example, the cost of software or development of a technology project may be amortized over the period it is expected to provide value.
- Amplifiers
Amplifiers: Devices or systems that increase the strength or magnitude of a signal, such as an audio or radio signal. It is used in communication systems to boost the signal and improve its clarity and reach. Examples of amplifiers include audio amplifiers in speakers and microphones and radio frequency amplifiers in wireless transmitters and receivers.
- Analog
Analog: In telecommunications, analog refers to the transmission of voice, video, or data through continuous signals that vary in frequency or amplitude in response to changes in sound or light. Traditional landline telephones, for instance, convert voice sounds into electrical signals that mimic the sound waves. These analog signals can be transmitted over copper wires and are subject to degradation from noise and distance, contrasting with digital signals, which can be more easily cleaned and amplified. While much of modern telecommunications has shifted toward digital technologies for their efficiency and fidelity, analog technology is still in use in various capacities, such as radio broadcasting and certain audio systems.
- Analytical Technique
Analytical Technique: A method of solving problems or making decisions by collecting, organizing, and analyzing data. It is commonly used in security to identify trends and patterns in data, such as network traffic or user behavior, to detect potential threats and prevent attacks. Examples include statistical analysis, data mining, and computational modeling.
- Analytic Attack
Analytic Attack: A technique in cybersecurity where a threat actor attempts to decipher encrypted data by exploiting weaknesses in the cryptographic algorithm. Rather than using brute force to try every possible key, the attacker analyzes the encryption structure to find patterns or inherent flaws that can reveal the plaintext or key. This approach is more sophisticated and often faster than attempting exhaustive key searches.
- Android OS
Android OS: The Android operating system is an open-source platform developed by Google for mobile devices. While security is a component of the OS, Android is known for its wide app ecosystem, user customization, and integration with various Google services. Security features within Android include app sandboxing, Google Play Protect, and periodic security updates.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions 625 Hard questions
750 Complex questions
3,250 Easy/Mid questions - Both as Exam emulation and Per-Domain
201 After Topic questions
240 After Domain questions -
2,800 CISSP Flashcards Access from anywhere, on any device, at any time (web, Android, iOS apps).
Automated reminders, progress tracking, optimized spaced repetitions, confidence-based algorithm. -
34 CISSP Mind Maps
-
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
29 CISM Mind Maps
-
A 200-page CISM study guide
-
89 pages of CISM Quick Sheets
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
24 CC Mind Maps
-
A 120-page CC study guide
-
35 pages of CC Quick Sheets
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access