The FREE Cybersecurity Glossary by Thor Pedersen!
Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.
- Timing attack
Timing attack: A form of attack where the attacker learns information about the target system by observing the time it takes for the system to respond to inputs. The analysis of the time required to perform cryptographic operations can potentially reveal sensitive data, such as secret keys, especially in poorly implemented cryptographic systems.
- TOGAF (The Open Group Architecture Framework)
TOGAF (The Open Group Architecture Framework): A framework offering a detailed methodology for the design, planning, implementation, and management of enterprise information architecture. It ensures the resulting system aligns with business objectives while being cost-efficient, dependable, and scalable, guided by principles, methods, and tools.
- Token
Token: A digital identity representation that serves as evidence of a transaction, authentication, or permission within a system. Tokens usually contain protected, cryptographically secured data, such as user authentication credentials, which can be used to gain access to network services or carry out certain transactions.
- Token device
Token device: A physical device used to facilitate user authentication by generating or storing a unique authentication factor, such as a secure digital signature or biometric data like a fingerprint template, providing additional proof of identity.
- Tokenization
Tokenization: The process of converting sensitive data into a series of random, meaningless characters or tokens. It is used to protect data during transmission and storage. Examples -using tokenization to protect credit card information during online transactions and using tokenization to protect sensitive medical records in a healthcare database.
- Top-down approach to security management
Top-down approach to security management: A method of security management that involves setting high-level goals and policies and then working down to the implementation of specific security controls. It is commonly used in organizations with hierarchical structures. Examples -a top-down approach to security management in a government agency and a top-down approach to security management in a multinational corporation.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions 625 Hard questions
750 Complex questions
3,250 Easy/Mid questions - Both as Exam emulation and Per-Domain
201 After Topic questions
240 After Domain questions -
2,800 CISSP Flashcards Access from anywhere, on any device, at any time (web, Android, iOS apps).
Automated reminders, progress tracking, optimized spaced repetitions, confidence-based algorithm. -
34 CISSP Mind Maps
-
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
29 CISM Mind Maps
-
A 200-page CISM study guide
-
89 pages of CISM Quick Sheets
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
24 CC Mind Maps
-
A 120-page CC study guide
-
35 pages of CC Quick Sheets
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access