The FREE Cybersecurity Glossary by Thor Pedersen!
Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.
- Cross-Site Request Forgery (XSRF)
Cross-Site Request Forgery (XSRF): A cyber-attack that tricks a web browser into executing an unwanted action in a web application to which a user is logged in. It exploits the trust that a site has for the user's browser, potentially leading to actions like changing user settings, posting content without consent, or initiating transactions. Security measures against XSRF include anti-forgery tokens and same-origin policies.
- Cross-Site Scripting (XSS)
Cross-Site Scripting (XSS): A type of security vulnerability that targets web applications, XSS enables attackers to inject malicious scripts into webpages viewed by other users. By exploiting the trust a user has for a particular site, these scripts can access any cookies, session tokens, or other sensitive information retained by the user's browser related to that site, potentially leading to unauthorized actions. XSS can be classified into different types (e.g., stored, reflected, and DOM-based) for a more comprehensive understanding.
- Crosstalk
Crosstalk: An electromagnetic interference phenomenon where a signal transmitted on one circuit or channel creates an unwanted effect on another circuit or channel. In telecommunications and networking, crosstalk can lead to degradation of signal quality, resulting in communication errors or loss of data. It is more prevalent in older or improperly shielded cables and is a significant consideration in the design of high-speed data communication systems. Measures such as using twisted pair cables or proper cable management practices are employed to minimize crosstalk.
- Cryptanalysis
Cryptanalysis: The study and practice of examining and breaking cryptographic systems, understanding how they work, and finding methods to defeat or weaken them. It involves analyzing the encrypted data (ciphertext) to discover the hidden structures and derive the original information (plaintext) without necessarily having access to the secret key used. Cryptanalysis is used both for academic research to test the strength of encryption algorithms and by adversaries to compromise security systems. It encompasses a variety of techniques, such as frequency analysis, pattern detection, brute force attacks, and more sophisticated mathematical approaches.
- Crypto-equipment
Crypto-equipment: Hardware or software designed specifically to perform cryptographic operations, such as encryption, decryption, digital signing, or key generation. Crypto-equipment safeguards sensitive information by transforming it into a secure form for transmission or storage, and it's commonly used in secure communication systems, data protection solutions, and other security applications. Examples include hardware security modules (HSMs), encrypted hard drives, and secure mobile phones.
- Cryptographic Algorithm
Cryptographic Algorithm: A set of mathematical procedures or rules that are used in the processes of encryption and decryption. Algorithms like RSA, AES, and DES work by transforming data into an unreadable format, making it secure from unauthorized access and preserving data integrity and confidentiality during transmission or storage.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions 625 Hard questions
750 Complex questions
3,250 Easy/Mid questions - Both as Exam emulation and Per-Domain
201 After Topic questions
240 After Domain questions -
2,800 CISSP Flashcards Access from anywhere, on any device, at any time (web, Android, iOS apps).
Automated reminders, progress tracking, optimized spaced repetitions, confidence-based algorithm. -
34 CISSP Mind Maps
-
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
29 CISM Mind Maps
-
A 200-page CISM study guide
-
89 pages of CISM Quick Sheets
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
24 CC Mind Maps
-
A 120-page CC study guide
-
35 pages of CC Quick Sheets
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access