The FREE Cybersecurity Glossary by Thor Pedersen!
Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.
- Twisted pair
Twisted pair: A type of cabling used for data and voice communications, characterized by pairs of wires twisted together. The twisting helps to reduce interference and noise. This cable type can be found in various versions, including unshielded twisted pair (UTP) and shielded twisted pair (STP), each offering different levels of protection against electromagnetic interference.
- Two-Factor Authentication
Two-Factor Authentication: A security measure that requires a user to provide two different types of credentials to verify their identity before they can access a system or data. This typically involves a combination of something the user knows (like a password), something the user has (like a physical token or a smartphone app), or something the user is (like a biometric characteristic).
- Twofish
Twofish: A symmetric key block cipher known for its simplicity and speed. It was one of the five finalists in the Advanced Encryption Standard (AES) contest, where it was praised for its high security, good performance, and ease of implementation.
- Two-person control
Two-person control: A security concept used to maintain high levels of safety and integrity by ensuring that two or more individuals are required to perform certain sensitive or high-risk tasks. This technique prevents a single individual from having sole authority or access and is often applied to prevent fraudulent activities or unauthorized actions.
- Two-phase commit
Two-phase commit: A protocol used in distributed computing to achieve consensus across multiple systems or components during a transaction. The protocol involves two phases - the prepare phase, where all systems are asked if they are ready to commit to a transaction, and the commit phase, where the transaction is either committed on all systems or rolled back on all systems to maintain consistency.
- Type 1 authentication factor
Type 1 authentication factor: A type of authentication factor that is based on something a user knows, such as a password or PIN. It is used in information security to verify the identity of a user. Examples include a password and a security question. This is also known as knowledge-based authentication.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions 625 Hard questions
750 Complex questions
3,250 Easy/Mid questions - Both as Exam emulation and Per-Domain
201 After Topic questions
240 After Domain questions -
2,800 CISSP Flashcards Access from anywhere, on any device, at any time (web, Android, iOS apps).
Automated reminders, progress tracking, optimized spaced repetitions, confidence-based algorithm. -
34 CISSP Mind Maps
-
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
29 CISM Mind Maps
-
A 200-page CISM study guide
-
89 pages of CISM Quick Sheets
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
24 CC Mind Maps
-
A 120-page CC study guide
-
35 pages of CC Quick Sheets
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access