The FREE Cybersecurity Glossary by Thor Pedersen!

Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.

- Key length
Key length: The number of bits in a cryptographic key, which determines the strength and security of the key. It is commonly used in encryption algorithms to determine the level of security provided by the key. Examples include a key length of 128 bits, a key length of 192 bits, and a key length of 256 bits.
- Key List
Key List: A key list is an inventory of cryptographic keys that includes important information such as key owners, associated assets, and usage policies. It is essential for managing and tracking the lifecycle of keys within an organization's cryptographic infrastructure to ensure proper key usage and facilitate security operations.
- Keylogger
Keylogger: A type of software or hardware device used to track and record keystrokes on a computer or device. It is used to monitor user activity and capture sensitive information such as passwords and credit card numbers. Examples of keyloggers include malware-based keyloggers, hardware-based keyloggers, and keylogger software for parental control.
- Key Management
Key Management: The administrative process of handling and maintaining the lifecycle of cryptographic keys in a secure manner. This lifecycle includes key creation, distribution, storage, rotation, and disposal. Proper key management ensures that keys are only accessible to authorized entities, protecting encrypted data from unauthorized access and mitigating the potential impact of key compromise.
- Key Management Infrastructure (KMI)
Key Management Infrastructure (KMI): A system or set of tools and protocols used to manage cryptographic keys within an organization. It is used to ensure the secure and efficient generation, distribution, storage, and revocation of keys used for encryption and authentication. Examples of KMI components include a key server, a key management application, and a certificate authority.
- Key management practice
Key management practice: Key management practices are the specific guidelines and procedures followed by an organization to handle cryptographic keys securely. They include aspects like key generation, protection, storage, and destruction, and are crucial to prevent unauthorized access and to maintain the confidentiality and integrity of encrypted data.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions 625 Hard questions
750 Complex questions
3,250 Easy/Mid questions - Both as Exam emulation and Per-Domain
201 After Topic questions
240 After Domain questions -
2,800 CISSP Flashcards Access from anywhere, on any device, at any time (web, Android, iOS apps).
Automated reminders, progress tracking, optimized spaced repetitions, confidence-based algorithm. -
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
A 200-page CISM study guide
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
A 120-page CC study guide
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access