The FREE Cybersecurity Glossary by Thor Pedersen!
Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.
- Type 1 Error (False Positive)
Type 1 Error (False Positive): In cybersecurity, a Type 1 error occurs when benign activity is incorrectly identified as malicious, such as mistakenly flagging legitimate network traffic as a threat. This can result in unnecessary actions and reduce trust in security systems due to excessive alerts.
- Type 1 hypervisor
Type 1 hypervisor: A type of hypervisor that runs directly on a physical host machine's hardware, allowing multiple operating systems to be run on the same physical server. It is used in server virtualization and cloud computing environments. Examples include VMware ESXi and Microsoft Hyper-V.
- Type 2 authentication factor
Type 2 authentication factor: A type of authentication factor that is based on something a user has, such as a security token or a smart card. It is used in information security to verify the identity of a user. Examples include a security token, a smart card, or a USB key.
- Type 2 Error
Type 2 Error: A statistical error that occurs when a null hypothesis is not rejected, even though it is false. This is also known as a false negative. It is used in the same contexts as Type 1 errors. Examples include failing to reject a faulty medical device or assuming there is no relationship between two variables when there actually is.
- Type 2 hypervisor
Type 2 hypervisor: A type of hypervisor that runs within a host operating system, allowing multiple virtual machines to be run on the same physical host. It is used in desktop virtualization and personal cloud computing environments. Examples include VMware Workstation and Oracle VirtualBox.
- Type 3 authentication factor
Type 3 authentication factor: A type of authentication factor that is based on something a user is, such as a fingerprint or a facial recognition scan. It is used in information security to verify the identity of a user. Examples include a fingerprint scan, a facial recognition scan, or a voice recognition scan. This is also known as biometric or something you are authentication.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions 625 Hard questions
750 Complex questions
3,250 Easy/Mid questions - Both as Exam emulation and Per-Domain
201 After Topic questions
240 After Domain questions -
2,800 CISSP Flashcards Access from anywhere, on any device, at any time (web, Android, iOS apps).
Automated reminders, progress tracking, optimized spaced repetitions, confidence-based algorithm. -
34 CISSP Mind Maps
-
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
29 CISM Mind Maps
-
A 200-page CISM study guide
-
89 pages of CISM Quick Sheets
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
24 CC Mind Maps
-
A 120-page CC study guide
-
35 pages of CC Quick Sheets
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access