The FREE Cybersecurity Glossary by Thor Pedersen!
Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.
- Trusted system
Trusted system: A system that has been thoroughly reviewed, tested, and proven to reliably enforce security policies. The trust in these systems comes from their proven ability to protect the confidentiality, integrity, and availability of the data they handle, even in the presence of threats.
- Trust model
Trust model: This outlines the approach to trust relationships within a network or between systems. It defines how trust is established, who or what can be trusted, and the extent to which trust is granted. Models can vary from simple (one trusted entity) to complex (hierarchical or web-of-trust models).
- Trust services criteria
Trust services criteria: A set of professional attestation and advisory services based on a core set of principles and criteria that address the risks and opportunities of IT-enabled systems and privacy programs. They are used in the evaluation of the design and operational effectiveness of an entity's controls relevant to security, availability, processing integrity, confidentiality, and privacy.
- Tunnel
Tunnel: A secure communication channel that uses encryption and encapsulation to transmit data privately across public networks. Often used in the context of VPNs to ensure secure, remote access to a network, keeping the data confidential and intact from end to end.
- Tunneling
Tunneling: Tunneling is a protocol that allows for the secure movement of data from one network to another. It involves encapsulating a network protocol within packets carried by the second network. Tunneling is often used in virtual private networks (VPNs) to secure data over untrusted networks like the internet.
- Tunnel mode
Tunnel mode: A mode of operation in IPsec where both the header and the payload of the IP packet are protected during transmission. This mode is commonly used in VPNs (Virtual Private Networks) as it allows a network device to act as an intermediary, encapsulating and encrypting all traffic passing through it.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions 625 Hard questions
750 Complex questions
3,250 Easy/Mid questions - Both as Exam emulation and Per-Domain
201 After Topic questions
240 After Domain questions -
2,800 CISSP Flashcards Access from anywhere, on any device, at any time (web, Android, iOS apps).
Automated reminders, progress tracking, optimized spaced repetitions, confidence-based algorithm. -
34 CISSP Mind Maps
-
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
29 CISM Mind Maps
-
A 200-page CISM study guide
-
89 pages of CISM Quick Sheets
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
24 CC Mind Maps
-
A 120-page CC study guide
-
35 pages of CC Quick Sheets
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access