The FREE Cybersecurity Glossary by Thor Pedersen!

Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.

- ISO/IEC/IEEE 15288
ISO/IEC/IEEE 15288: This is an international standard for systems and software engineering, providing a process framework that facilitates the application of system life cycle processes. It covers a range of activities including acquisition, supply, development, operation, and maintenance of systems. By applying the guidelines in ISO/IEC/IEEE 15288, organizations can improve the quality of their systems and software while reducing errors, redundancies, and costs.
- Kerberos
Kerberos: A network authentication protocol that uses tickets and encryption to securely identify users and grant them access to network resources. It is used to prevent unauthorized access and protect against replay attacks. It is used in network security and authentication. Examples include logging into a computer or accessing a database.
- Key Distribution Center (KDC)
Key Distribution Center (KDC): A Key Distribution Center (KDC) is a network service that facilitates secure communication by issuing and managing cryptographic keys. It authenticates users and distributes session keys that enable users to encrypt and decrypt messages, ensuring secure communication across the network. It plays a critical role in protocols like Kerberos.
- Lightweight Directory Access Protocol (LDAP)
Lightweight Directory Access Protocol (LDAP): A networking protocol used to access and manage directory information services over a network. It is used in identity and access management systems to store and manage user and application credentials. Examples include Active Directory and OpenLDAP.
- Lightweight Directory Access Protocol (LDAP) Injection Attack
Lightweight Directory Access Protocol (LDAP) Injection Attack: An attack that exploits a vulnerability in LDAP-enabled applications by injecting malicious LDAP statements into user input. It is used to gain unauthorized access to sensitive data or perform malicious actions. Examples include modifying LDAP queries to bypass authentication or retrieve sensitive information.
- Lightweight Extensible Authentication Protocol (LEAP)
Lightweight Extensible Authentication Protocol (LEAP): A wireless network authentication protocol designed to provide secure client-to-access point communication. LEAP ensures only authorized users can access the network, commonly used in environments such as office Wi-Fi networks and public wireless spaces.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions
-
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
2,500 CISSP Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
A 200-page CISM study guide
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
A 120-page CC study guide
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access