The FREE Cybersecurity Glossary by Thor Pedersen!
Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.
- Trojan horse
Trojan horse: A type of malicious program that disguises itself as legitimate and often desirable software to deceive users into downloading and installing it. Once inside the system, it can execute harmful tasks such as stealing data, compromising system integrity, or creating backdoors for unauthorized access.
- True negative
True negative: A term used in statistics and diagnostic testing to represent cases where the system correctly identified the absence of a condition. In a security context, it refers to instances where a system correctly identifies an activity as non-threatening or non-malicious, thus avoiding false alarms.
- True positive
True positive: Instances where the system accurately identifies a condition's presence. In security terms, it refers to situations where a system correctly flags an activity as threatening or malicious, indicating that the security measures in place are working as intended to identify real threats.
- Trust anchor
Trust anchor: A source of verification for a chain of trust in digital systems. It is typically an authoritative entity, like a Certificate Authority, for which a degree of trust is assumed and not derived from a higher entity. Its role is to vouch for the identity of entities in the network and the credibility of their certificates and keys.
- Trust but verify
Trust but verify: A principle that emphasizes the importance of establishing confidence in entities while also validating their actions. It suggests that while one may trust an entity, their actions and activities should be independently checked for accuracy, reliability, and integrity, maintaining a balance between trust and security control.
- Trusted channel
Trusted channel: A trusted channel is a secure communication pathway that ensures data is transmitted confidentially and securely between parties, preventing unauthorized access and ensuring that the data has not been altered or intercepted during transit.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions 625 Hard questions
750 Complex questions
3,250 Easy/Mid questions - Both as Exam emulation and Per-Domain
201 After Topic questions
240 After Domain questions -
2,800 CISSP Flashcards Access from anywhere, on any device, at any time (web, Android, iOS apps).
Automated reminders, progress tracking, optimized spaced repetitions, confidence-based algorithm. -
34 CISSP Mind Maps
-
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
29 CISM Mind Maps
-
A 200-page CISM study guide
-
89 pages of CISM Quick Sheets
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
24 CC Mind Maps
-
A 120-page CC study guide
-
35 pages of CC Quick Sheets
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access