The FREE Cybersecurity Glossary by Thor Pedersen!
Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.
- Application Containerization
Application Containerization: A lightweight alternative to full machine virtualization that involves encapsulating an application in a container with its own operating environment. This provides a high level of isolation between individual applications, ensuring that each can run without interfering with others, thereby improving security, portability, and efficiency.
- Application Development Review
Application Development Review: The process of assessing an application during its development stage to ensure it meets specified requirements and standards. The review can cover various aspects, including design, coding, testing, and security practices. The aim is to detect and rectify any issues or vulnerabilities early in the development lifecycle, enhancing the quality and security of the final product.
- Application Hardening
Application Hardening: This is the process of securing an application by reducing its attack surface and minimizing potential vulnerabilities. Techniques include removing unused features, disabling unnecessary services, configuring robust security settings, and regularly updating the software to patch any known security issues. By hardening an application, organizations can better protect their systems and data from unauthorized access or exploitation.
- Application Implementation Review
Application Implementation Review: An assessment conducted to ensure that a newly deployed application meets its intended objectives and adheres to organizational policies and security standards. The review may involve examining the application's configuration, integration with other systems, and overall performance. This evaluation helps identify any issues or vulnerabilities that may have been introduced during deployment so they can be addressed promptly.
- Application Layer
Application Layer: In the Open Systems Interconnection (OSI) model, the application layer is the 7th layer, which interfaces directly with end-user software applications to manage network communications. It is responsible for high-level protocols such as HTTP for web browsing, FTP for file transfers, and SMTP for email. In the simpler TCP/IP model, the application layer is often conceptualized as layer 4, which encompasses the functionalities of the OSI's application, presentation, and session layers. This topmost layer in the TCP/IP model enables user applications to interact with the network stack, ensuring that data is properly packaged for communication and interpreted upon receipt.
- Application-level encryption
Application-Level Encryption: The process of encrypting sensitive data within the application layer to protect its confidentiality and integrity. This type of encryption ensures that only authorized users or systems can access the data by securing it at the point of creation and continuing through storage or transmission. Examples include encrypting passwords before storing them in a database, securing credit card information during transaction processing, or encrypting files before sending them over the Internet. While this process strengthens data protection, it primarily addresses confidentiality and integrity, not availability, which relates more to system reliability and access control mechanisms.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions 625 Hard questions
750 Complex questions
3,250 Easy/Mid questions - Both as Exam emulation and Per-Domain
201 After Topic questions
240 After Domain questions -
2,800 CISSP Flashcards Access from anywhere, on any device, at any time (web, Android, iOS apps).
Automated reminders, progress tracking, optimized spaced repetitions, confidence-based algorithm. -
34 CISSP Mind Maps
-
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
29 CISM Mind Maps
-
A 200-page CISM study guide
-
89 pages of CISM Quick Sheets
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
24 CC Mind Maps
-
A 120-page CC study guide
-
35 pages of CC Quick Sheets
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access