The FREE Cybersecurity Glossary by Thor Pedersen!
Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.
- IP Authentication Header (AH)
IP Authentication Header (AH): A component of the IPsec suite that provides connectionless data integrity and data origin authentication for IP packets. AH ensures that the contents of the communications have not been altered in transit.
- IP Broadcast Methods
IP Broadcast Methods: IP broadcast methods are used to send a message to all potential recipients on a network segment. Types of IP broadcast methods include network broadcast, sending to a subnet's broadcast address, and limited broadcast, sending to the special address 255.255.255.255, which targets all devices on the local network.
- IPPD
IPPD: Integrated Product and Process Development (IPPD) is a systematic approach that synchronizes the development of products and their related processes to ensure optimal performance, cost-efficiency, and customer satisfaction. By fostering collaboration across diverse functional teams and integrating security considerations early on, IPPD aims to deliver high-quality products that meet stakeholder needs within the IT and cybersecurity domains.
- IP Probes
IP Probes: The process of sending small packets of data to a specific IP address to determine if a device is active on a network and to gather information about the device. It is used in network security to identify potential vulnerabilities. Examples include ping and traceroute.
- IP Security (IPSec)
IP Security (IPSec): A suite of protocols designed to secure Internet Protocol (IP) communications by authenticating and encrypting each IP packet in a stream of data. IPSec provides a secure channel between two devices and is widely used in VPNs.
- IP Spoofing
IP Spoofing: The practice of disguising a device's IP address to gain unauthorized access to a network or to hide the device's identity. It is used in cyber-attacks to bypass security measures. Examples include using a fake IP address or using a legitimate IP address without permission.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions 625 Hard questions
750 Complex questions
3,250 Easy/Mid questions - Both as Exam emulation and Per-Domain
201 After Topic questions
240 After Domain questions -
2,800 CISSP Flashcards Access from anywhere, on any device, at any time (web, Android, iOS apps).
Automated reminders, progress tracking, optimized spaced repetitions, confidence-based algorithm. -
34 CISSP Mind Maps
-
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
29 CISM Mind Maps
-
A 200-page CISM study guide
-
89 pages of CISM Quick Sheets
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
24 CC Mind Maps
-
A 120-page CC study guide
-
35 pages of CC Quick Sheets
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access