The FREE Cybersecurity Glossary by Thor Pedersen!
Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.
- Broadcast
Broadcast: In networking, a broadcast refers to the transmission of data packets that are sent to all devices on a network segment. The broadcast is intended for all recipients within the broadcast domain and does not differentiate between individual devices. In a typical IP network, a broadcast address enables information to be simultaneously sent to every device on the same subnet. Broadcasts are essential for network operations like address resolution but must be controlled to prevent unnecessary traffic and potential network congestion.
- Broadcast domain
Broadcast domain: A logical segment of a computer network in which any device can send a packet that is delivered to all other devices without needing a router. Broadcast domains are typically defined by network devices like switches and are essential in network design to control data flow and reduce congestion.
- Broadcast storm
Broadcast storm: A network issue that occurs when there are too many simultaneous broadcast messages in a network, causing the network to become overwhelmed and slow or even halting network functions. This could occur as a result of a configuration error, a malicious attack, or a feedback loop where broadcast messages are continually bounced back and forth between network devices. It's an example of a potential vulnerability that needs to be managed within broadcast domains.
- Broken authentication
Broken authentication: This refers to flaws or vulnerabilities in a system's authentication processes that could allow an unauthorized individual to assume the identity of a legitimate user. This could occur due to issues such as weak password policies, insecure account recovery methods, or improperly managed session identifiers. Once an attacker exploits these flaws, they can perform actions with the same privileges as the compromised user, potentially leading to unauthorized data access, data manipulation, or other damaging actions.
- Browsing
Browsing: The act of navigating through information resources in a network such as the Internet. This involves accessing and reading websites, downloading files, or using online applications. Browsing can be a vulnerable point for data breaches or malware infections, as users might encounter malicious sites, phishing attempts, or unsafe downloads. Effective measures to ensure secure browsing include the use of up-to-date, secure browsers, enabling automatic updates, utilizing browser security settings, and practicing careful navigation habits such as avoiding unfamiliar websites.
- Brute Force
Brute Force: A trial-and-error method used to decode encrypted data by systematically trying every possible combination of passwords or keys until the correct one is found. It is time-consuming and computationally intensive. This is achieved by systematically checking all possible keys or passwords until the correct one is found. Although this method can be time-consuming and resource-intensive, it can also be effective if the password is weak or the system lacks sufficient security measures to detect and prevent such attempts.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions 625 Hard questions
750 Complex questions
3,250 Easy/Mid questions - Both as Exam emulation and Per-Domain
201 After Topic questions
240 After Domain questions -
2,800 CISSP Flashcards Access from anywhere, on any device, at any time (web, Android, iOS apps).
Automated reminders, progress tracking, optimized spaced repetitions, confidence-based algorithm. -
34 CISSP Mind Maps
-
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
29 CISM Mind Maps
-
A 200-page CISM study guide
-
89 pages of CISM Quick Sheets
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
24 CC Mind Maps
-
A 120-page CC study guide
-
35 pages of CC Quick Sheets
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access