The FREE Cybersecurity Glossary by Thor Pedersen!
Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.
- Spear phishing
Spear phishing: A targeted form of phishing where attackers use specific information about the victim to make their emails more convincing. It is used in cyber-attacks to gain sensitive information from individuals or organizations. Examples include using an individual's name and job title in the email or tailoring the email to match the victim's company's branding.
- Spike
Spike: A sudden increase in traffic on a network or system, potentially causing it to crash or slow down. It is used in network analysis and monitoring to detect potential security threats or performance issues. Examples include a spike in web traffic during a cyber-attack or a spike in database queries during peak usage hours.
- Spim (Spam over Instant Messaging)
Spim (Spam over Instant Messaging): Unsolicited messages sent over instant messaging platforms, similar to email spam. These messages may contain advertisements, phishing attempts, or links to malware. The term "spim" is less commonly used today as generalized terms like spam or phishing often encompass this activity.
- Spoofing
Spoofing: The act of impersonating another entity to gain unauthorized access to systems or trick users into revealing sensitive information. Common examples include email spoofing for phishing attacks and IP address spoofing to bypass network security measures.
- Spread spectrum
Spread spectrum: A method of transmitting radio signals by spreading the signal across a wide frequency band. It is used in wireless communication to improve security and reduce interference. Examples include Bluetooth and Wi-Fi technology, which use a spread spectrum to transmit data between devices.
- Spyware
Spyware: A type of malicious software that covertly collects information about a user or organization without consent, often for personal or financial gain. Spyware can monitor and capture keystrokes, web browsing history, passwords, and other sensitive data. Anti-spyware tools and best practices in cybersecurity hygiene are essential to protect against such invasive software.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions 625 Hard questions
750 Complex questions
3,250 Easy/Mid questions - Both as Exam emulation and Per-Domain
201 After Topic questions
240 After Domain questions -
2,800 CISSP Flashcards Access from anywhere, on any device, at any time (web, Android, iOS apps).
Automated reminders, progress tracking, optimized spaced repetitions, confidence-based algorithm. -
34 CISSP Mind Maps
-
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
29 CISM Mind Maps
-
A 200-page CISM study guide
-
89 pages of CISM Quick Sheets
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
24 CC Mind Maps
-
A 120-page CC study guide
-
35 pages of CC Quick Sheets
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access