The FREE Cybersecurity Glossary by Thor Pedersen!
Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.
- Preemptive multitasking
Preemptive multitasking: Preemptive multitasking is an operating system capability that allows the OS to control how long a program can run on the CPU before giving other programs a chance to execute. The OS forcibly interrupts the currently running program to allow others to run, improving system responsiveness and efficiency. It's critical for ensuring fair resource distribution and system stability.
- Prefix
Prefix: An IP addressing scheme that indicates the network portion of the address. It determines how many of the leading bits will represent the network address, and the remaining bits will represent the host. In an IPv6 address, for example, a /64 prefix indicates that the first 64 bits of the address are the network part, with the remaining bits identifying the specific host. This structure aids in routing data packets correctly across networks.
- Pre-production Model
Pre-production Model: A pre-production model refers to early versions of a product, which are created to test and validate design and functionality before full-scale production begins. In software development, it may include alpha or beta versions of a program. In manufacturing, it could be a prototype of a device. These models are essential for identifying potential issues and improving the final product.
- Presentation Layer
Presentation Layer: The sixth level in the seven-layer Open Systems Interconnection (OSI) model, which standardizes functionalities of networking or telecommunication systems. This layer ensures that the data transmitted between systems is in a usable format and is responsible for tasks such as data compression, encryption, and translation of network data into a format that can be understood by application layer protocols. This plays a significant role in maintaining data integrity and privacy.
- Preshared Key
Preshared Key: A cryptographic key that is shared between parties before it is used for encryption or authentication purposes. PSKs are commonly used in various forms of secure communication methods, such as wireless networks (like WPA-PSK in Wi-Fi networks) or in VPN connections, to establish a secure channel over an otherwise insecure medium. Despite its simplicity and efficiency, PSK should be used with caution due to potential security risks if the key is compromised.
- Pretexting
Pretexting: A social engineering technique in which an individual creates a false scenario or pretext to trick someone into disclosing sensitive information. The attacker usually pretends to be a legitimate entity, such as a bank, tech support, or another trusted person, to deceive the target into divulging confidential data, like passwords, social security numbers, or financial details. Pretexting underscores the importance of awareness and cautious behavior when handling personal or confidential data.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions 625 Hard questions
750 Complex questions
3,250 Easy/Mid questions - Both as Exam emulation and Per-Domain
201 After Topic questions
240 After Domain questions -
2,800 CISSP Flashcards Access from anywhere, on any device, at any time (web, Android, iOS apps).
Automated reminders, progress tracking, optimized spaced repetitions, confidence-based algorithm. -
34 CISSP Mind Maps
-
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
29 CISM Mind Maps
-
A 200-page CISM study guide
-
89 pages of CISM Quick Sheets
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
24 CC Mind Maps
-
A 120-page CC study guide
-
35 pages of CC Quick Sheets
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access