The FREE Cybersecurity Glossary by Thor Pedersen!

Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.

- Object Reuse
Object Reuse: The practice of using existing objects in new applications or systems to save time and resources in software development. This often involves utilizing pre-existing libraries or components from previous projects.
- Online Certificate Status Protocol (OCSP)
Online Certificate Status Protocol (OCSP): A protocol used to check the revocation status of digital certificates. It allows a relying party, such as a web server, to verify the status of a certificate in real-time without relying on a local cache of revocation information. Examples of OCSP responders include certificate authorities and OCSP servers.
- Open Shortest Path First (OSPF)
Open Shortest Path First (OSPF): A routing protocol used in Internet Protocol (IP) networks to determine the most efficient path for data between devices. Commonly implemented in large enterprise environments, OSPF enhances routing efficiency and offers robust fault tolerance. Examples of its application include Cisco and Juniper routers as well as Microsoft Azure virtual networks.
- Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE)
Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE): A risk-based strategic assessment and planning technique for security. It helps organizations identify and manage risks related to information security by focusing on operational resilience and protection needs. It enables organizations to assess their security needs and formulate a risk-based strategy accordingly.
- Obfuscation
Obfuscation: The practice of making something difficult to understand or interpret intentionally designed to conceal or hide information. In the context of data security, obfuscation is often used to protect sensitive data, such as code, by transforming it into an equivalent form that is harder to understand, thereby limiting potential exposure to unauthorized parties.
- Object
Object: The fundamental building blocks of applications built using object-oriented programming (OOP) methodologies. They encapsulate data and the methods that operate on this data within a single unit. This approach enhances code reusability and modularity, making applications easier to develop, maintain, and secure.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions 625 Hard questions
750 Complex questions
3,250 Easy/Mid questions - Both as Exam emulation and Per-Domain
201 After Topic questions
240 After Domain questions -
2,800 CISSP Flashcards Access from anywhere, on any device, at any time (web, Android, iOS apps).
Automated reminders, progress tracking, optimized spaced repetitions, confidence-based algorithm. -
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
A 200-page CISM study guide
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
A 120-page CC study guide
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access