The FREE Cybersecurity Glossary by Thor Pedersen!
Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.
- Handling of Assets
Handling of Assets: The processes and practices associated with managing and protecting an organization's valuable resources, or 'assets.' These assets can include data, hardware, software, and intellectual property. From a security perspective, proper asset handling is vital to prevent unauthorized access, misuse, alteration, or destruction. It typically involves tasks such as asset identification, classification based on sensitivity and criticality, and implementation of appropriate controls (like encryption for data and physical security measures for hardware).
- Handprint scanner
Handprint Scanner: A biometric device that captures the unique patterns and characteristics of an individual's hand, including shape, size, and vein patterns, to authenticate identity. Handprint scanners differ from fingerprint or palm scanners by scanning the entire hand instead of focusing on individual features.
- Handshake
Handshake: In the context of networking, a handshake is a protocol or process used to establish a connection between two systems. A common example is the TCP three-way handshake, which involves a synchronization (SYN) message sent by the client to the server, an acknowledgment of the synchronization (SYN-ACK) sent by the server back to the client, and a final acknowledgment (ACK) sent by the client to the server. This sequence of messages confirms that both parties are ready to communicate and establishes a reliable connection.
- Hard copy key
Hard copy key: A physical key or token used to gain access to a location or system. Examples include metal keys, keycards, and smart keys, often kept on a keychain or similar device for use in unlocking doors, starting vehicles, or entering secure areas.
- Harden
Harden: The process of strengthening or securing a system, network, or application to protect against potential vulnerabilities or threats. Hardening can involve a range of measures, such as implementing security controls, disabling unnecessary services, or applying patches and updates. Examples of hardening activities include configuring firewalls, disabling unused ports, and applying security patches to operating systems.
- Hardening
Hardening: The process of securing a system by reducing its vulnerability to attack. This is often done by disabling unnecessary services, applying security patches, and using firewalls and intrusion detection systems. It is used in cybersecurity to protect systems from unauthorized access. Examples include disabling unneeded network ports, implementing access controls, and regularly updating software.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions 625 Hard questions
750 Complex questions
3,250 Easy/Mid questions - Both as Exam emulation and Per-Domain
201 After Topic questions
240 After Domain questions -
2,800 CISSP Flashcards Access from anywhere, on any device, at any time (web, Android, iOS apps).
Automated reminders, progress tracking, optimized spaced repetitions, confidence-based algorithm. -
34 CISSP Mind Maps
-
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
29 CISM Mind Maps
-
A 200-page CISM study guide
-
89 pages of CISM Quick Sheets
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
24 CC Mind Maps
-
A 120-page CC study guide
-
35 pages of CC Quick Sheets
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access