The FREE Cybersecurity Glossary by Thor Pedersen!
Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.
- Extreme Programming (XP)
Extreme Programming (XP): A software development methodology that is intended to improve software quality and responsiveness to changing customer requirements. As a type of agile software development, XP advocates frequent "releases" in short development cycles, which are intended to improve productivity and introduce checkpoints where new customer requirements can be adopted. Key practices include pair programming, extensive code review, unit testing of all code, and a flat management structure. The aim of XP is to enhance software project adaptability and reduce risks associated with client requirements changing during the software development process.
- Eastbound Interface API
Eastbound Interface API: In networking, an Eastbound Interface API refers to the application programming interface that enables communication and data exchange from a network controller to higher-level management systems or applications. It supports the upward flow of network information, such as topology details or traffic statistics, which can be used for analytics, policy decision-making, network optimization, or orchestrating services across the network. In Software-Defined Networking (SDN) environments, the Eastbound API allows the SDN controller to interact with more abstract layers, like service management platforms or business logic applications.
- East-West APIs
East-West APIs: These APIs facilitate internal communications and data exchange between services and applications within an organization's IT infrastructure. Focused on optimizing the flow of information within the data center, East-West APIs are crucial for microservices architectures and containerized applications, where a high volume of internal traffic is common.
- Eavesdropping
Eavesdropping: A method where unauthorized individuals listen to, monitor, or intercept others' private conversations, data transmissions, or communications without consent. Eavesdropping can happen in various forms, such as wiretapping telephone lines, accessing email communications, or sniffing network packets. It's a primary concern in the world of communication and data transmission as it could lead to the leakage of confidential or sensitive information.
- Echo checks
Echo checks: A simple error detection technique used in data communication to verify the integrity of transmitted data. In echo checks, a copy of the transmitted data is sent back to the sender for comparison with the original data. This method helps ensure that the data received is identical to what was sent, thereby maintaining the reliability and integrity of data transmissions.
- E-commerce
E-commerce: The buying and selling of goods or services using the Internet and the transfer of money and data to execute these transactions. E-commerce can be conducted over computers, tablets, smartphones, and other smart devices. It encompasses a wide range of data, systems, and tools for online buyers and sellers, including mobile shopping and online payment encryption. E-commerce platforms can be focused on business-to-business (B2B), business-to-consumer (B2C), consumer-to-consumer (C2C), or consumer-to-business (C2B) transactions. It has transformed retail through online marketplaces, electronic payment systems, online shopping, and digital marketing. E-commerce also includes customer data protection and compliance with regulations such as PCI DSS.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions 625 Hard questions
750 Complex questions
3,250 Easy/Mid questions - Both as Exam emulation and Per-Domain
201 After Topic questions
240 After Domain questions -
2,800 CISSP Flashcards Access from anywhere, on any device, at any time (web, Android, iOS apps).
Automated reminders, progress tracking, optimized spaced repetitions, confidence-based algorithm. -
34 CISSP Mind Maps
-
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
29 CISM Mind Maps
-
A 200-page CISM study guide
-
89 pages of CISM Quick Sheets
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
24 CC Mind Maps
-
A 120-page CC study guide
-
35 pages of CC Quick Sheets
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access