The FREE Cybersecurity Glossary by Thor Pedersen!
Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.
- Session fixation
Session fixation: A type of attack where an attacker manipulates the session identifier, or "session ID," of a user's session to gain unauthorized access to their account. It is often used in web-based attacks, where the attacker may trick a user into using a compromised session ID. For instance, an attacker may send a user a malicious link with a pre-set session ID, allowing the attacker to hijack the user's session.
- Session hijacking
Session hijacking: An attack where an intruder takes over a valid session between a user and a system. The attacker exploits vulnerabilities in the session management, such as weak session IDs or unprotected network traffic, to impersonate the user. Once control is gained, the attacker can perform actions as the authenticated user, potentially leading to unauthorized access to sensitive information or functionality.
- Session key
Session key: A temporary encryption key used for secure communication between two parties during a single session. It is used in cryptography to provide secure communication without the need for long-term keys. Examples include the use of session keys in SSL/TLS communications and in SSH connections.
- Session Layer
Session Layer: The 5th layer of the OSI model is responsible for establishing, managing, and terminating connections between applications. Functions such as authentication, authorization, session restoration, and synchronization of data exchange are handled at this layer. By managing these session-based communications, the session layer enables coordinated data exchange between systems or applications.
- Session sidejacking
Session sidejacking: A type of attack where an attacker intercepts and hijacks a user's session by stealing their session cookie. It is commonly used in wireless networks, where the attacker may use tools like a packet sniffer to capture unencrypted session cookies. For example, an attacker may use session sidejacking to gain access to a user's online bank account or social media account.
- Shared Key Authentication (SKA)
Shared Key Authentication (SKA): An outdated wireless authentication method where both the client and the access point must possess a pre-shared secret key. The protocol is vulnerable to several security issues and is no longer recommended for use in secure wireless environments, with modern protocols like WPA2 and WPA3 providing stronger security measures.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions 625 Hard questions
750 Complex questions
3,250 Easy/Mid questions - Both as Exam emulation and Per-Domain
201 After Topic questions
240 After Domain questions -
2,800 CISSP Flashcards Access from anywhere, on any device, at any time (web, Android, iOS apps).
Automated reminders, progress tracking, optimized spaced repetitions, confidence-based algorithm. -
34 CISSP Mind Maps
-
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
29 CISM Mind Maps
-
A 200-page CISM study guide
-
89 pages of CISM Quick Sheets
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
24 CC Mind Maps
-
A 120-page CC study guide
-
35 pages of CC Quick Sheets
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access