The FREE Cybersecurity Glossary by Thor Pedersen!

Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.

- Piggyback attack
Piggyback attack: A type of cyber-attack where an unauthorized person gains access to a secure system by exploiting the credentials of an authorized user. This can bypass security measures and lead to unauthorized access to sensitive data or resources. Examples include using another user's login credentials to access a network or following someone through a secured entry point without proper authorization.
- Piggybacking
Piggybacking: The practice of gaining unauthorized access to a restricted area by following someone who has legitimate access. It is often used by individuals who do not have the proper credentials to enter a building or facility but can gain access by following someone who does. It is used in the field of information security to identify and prevent potential security breaches by unauthorized individuals. 3 examples of piggybacking are an individual following an employee into a secure office building, a visitor following a resident into a gated community, and a customer following an employee into a restricted area of a store.
- Ping
Ping: A network utility used to test the connectivity and responsiveness of a networked device or server. It works by sending a small packet of data to the target device and measuring the time it takes for the device to respond. It is used in the field of information technology to diagnose and troubleshoot network connectivity issues. 3 examples of using ping are checking the connectivity of a website, verifying the availability of a network server, and troubleshooting network latency issues.
- Ping Flood
Ping Flood: A type of cyber-attack that involves overwhelming a server or network with numerous ping requests, leading to a denial of service. It is used to exploit vulnerabilities and test the resilience of systems by potentially crashing a server or disrupting network communication.
- Ping Of Death
Ping Of Death: The Ping of Death (PoD) attack is an older network attack method that involves sending malformed or oversized ping packets that exceed the maximum packet size allowed by the IP protocol. By exploiting this vulnerability, an attacker could potentially cause the target system to freeze, crash, or reboot. However, modern systems and network equipment are largely immune to this type of attack due to improved standards and security measures.
- Plain Old Telephone Service (POTS)
Plain Old Telephone Service (POTS): A traditional analog telephone system that uses copper wire to transmit voice signals over long distances. It is used in telecommunications to provide basic voice services to customers. Examples include landline phone systems in homes and businesses, payphones, and emergency telephone systems.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions 625 Hard questions
750 Complex questions
3,250 Easy/Mid questions - Both as Exam emulation and Per-Domain
201 After Topic questions
240 After Domain questions -
2,800 CISSP Flashcards Access from anywhere, on any device, at any time (web, Android, iOS apps).
Automated reminders, progress tracking, optimized spaced repetitions, confidence-based algorithm. -
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
A 200-page CISM study guide
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
A 120-page CC study guide
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access