The FREE Cybersecurity Glossary by Thor Pedersen!
Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.
- Embedded System
Embedded System: A dedicated computer system with a specific function within a larger mechanical or electrical system, often with real-time computing constraints. It is embedded as part of a complete device, often including hardware and mechanical parts. Embedded systems control many devices in common use today and are typically designed for specific control tasks with varying degrees of complexity. They range from simple microcontroller-based systems to complex systems-on-chips (SoCs) and are found in numerous applications, including consumer electronics, automobiles, medical devices, industrial controls, and aerospace.
- Emerging Cloud Technologies
Emerging Cloud Technologies: The new and advanced developments in cloud-based services and infrastructure. It covers technologies such as serverless computing, artificial intelligence (AI) and machine learning (ML) platforms, edge computing, and advanced security solutions in the cloud. As these technologies evolve and gain adoption, they bring along new potential vulnerabilities and attack vectors, making their secure implementation and management critical.
- EMI (Electromagnetic Interference)
EMI (Electromagnetic Interference): The disruption of an electrical circuit's performance due to external electromagnetic radiation or other electrical devices. EMI can interfere with the normal operation of electronic devices, including computers and networking equipment, which can lead to data loss, system errors, or even equipment failure, creating potential risks for data integrity and system availability.
- Encapsulating Security Payload (ESP)
Encapsulating Security Payload (ESP): A component of the Internet Protocol Security (IPSec) suite used for ensuring secure communication by providing confidentiality, data origin authentication, connectionless integrity, and anti-replay. ESP achieves this by encapsulating the data to be protected, thus hiding the original data and safeguarding the integrity of the transmitted data.
- Encapsulation
Encapsulation: In computer networking, encapsulation refers to the process of wrapping data with necessary protocol information before network transmission. Similar to an envelope for a letter, it involves adding headers (and sometimes trailers) around data for proper delivery and processing. In object-oriented programming, encapsulation is a fundamental concept that binds together the data and functions that manipulate the data and keeps both safe from outside interference and misuse. Data encapsulation led to the important OOP concept of data hiding.
- Encode
Encode: The process of converting information from one format or code to another for the purposes of standardization, speed, secrecy, or compressions. In computer systems, encoding can refer to transforming data into a form that can be easily used by different types of systems. For example, encoding is commonly used for transforming raw data into a binary format that is understandable by computers. It also refers to the conversion of data for transmission, storage, or encryption, often using schemes such as Base64 and UTF-8 for text or more complex schemes like encoding video for digital formats.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions 625 Hard questions
750 Complex questions
3,250 Easy/Mid questions - Both as Exam emulation and Per-Domain
201 After Topic questions
240 After Domain questions -
2,800 CISSP Flashcards Access from anywhere, on any device, at any time (web, Android, iOS apps).
Automated reminders, progress tracking, optimized spaced repetitions, confidence-based algorithm. -
34 CISSP Mind Maps
-
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
29 CISM Mind Maps
-
A 200-page CISM study guide
-
89 pages of CISM Quick Sheets
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
24 CC Mind Maps
-
A 120-page CC study guide
-
35 pages of CC Quick Sheets
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access