The FREE Cybersecurity Glossary by Thor Pedersen!
Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.
- Shared-secret encryption
Shared-secret encryption: A type of encryption where the same secret key is used by both the sender and the receiver to encrypt and decrypt messages. It is often used in symmetric-key cryptography, where the same secret key is used by both parties to encrypt and decrypt messages. For instance, in a shared-secret encryption system, the sender and receiver may agree on a secret key and use that key to encrypt and decrypt messages sent between them.
- Shell
Shell: A command-line interface for accessing an operating system's services. It is used to perform tasks and manage system resources through the use of commands and scripts. Examples include the Bash shell on Linux systems and the PowerShell on Windows systems.
- Shell programming
Shell programming: The use of a shell to automate tasks and perform complex operations on a computer. It is used in system administration and automation to efficiently manage and manipulate system resources. Examples include shell scripts to automate backups or to monitor system performance.
- Shielded enclosure
Shielded enclosure: A protective covering or enclosure that is designed to block electromagnetic interference (EMI). It is used in electrical and electronic systems to prevent EMI from affecting the operation of the system. Examples include shielded cables and enclosures for sensitive electronic equipment.
- Shielded Twisted Pair (STP)
Shielded Twisted Pair (STP): A type of electrical cable used in networking applications, featuring shielding around the twisted pairs of wires to reduce electromagnetic interference. Commonly used in Ethernet networks and for connections requiring enhanced protection from external noise, such as connecting computers, printers, and security cameras to a network.
- Shimmer
Shimmer: A type of skimming device that is inserted into a card slot, such as those on ATMs or point-of-sale terminals, to read data from chip-based credit and debit cards. Unlike traditional skimmers, shimmers are thinner and target the chip instead of the magnetic stripe, making them harder to detect.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions 625 Hard questions
750 Complex questions
3,250 Easy/Mid questions - Both as Exam emulation and Per-Domain
201 After Topic questions
240 After Domain questions -
2,800 CISSP Flashcards Access from anywhere, on any device, at any time (web, Android, iOS apps).
Automated reminders, progress tracking, optimized spaced repetitions, confidence-based algorithm. -
34 CISSP Mind Maps
-
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
29 CISM Mind Maps
-
A 200-page CISM study guide
-
89 pages of CISM Quick Sheets
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
24 CC Mind Maps
-
A 120-page CC study guide
-
35 pages of CC Quick Sheets
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access