The FREE Cybersecurity Glossary by Thor Pedersen!
Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.
- Electronic vaulting (e-vaulting)
Electronic vaulting (e-vaulting): The transfer of backup data to an off-site storage system using network connections. This method is usually automated and occurs at pre-scheduled times to ensure data availability in case of unexpected events. Its purpose is to protect critical data from site-specific disasters and improve recovery time while maintaining the confidentiality, integrity, and availability of the data through encryption and other means, for example.
- Elevation of privilege
Elevation of privilege: A scenario where a user or process gains higher access rights or permissions than they're intended to have, typically resulting in unauthorized control over system resources. It often constitutes a serious security flaw, as it allows the individual or process to bypass restrictions, potentially leading to information theft, data corruption, or additional harmful activities.
- Elliptic Curve Cryptography (ECC)
Elliptic Curve Cryptography (ECC): A public key encryption technique based on elliptic curve theory that can be used to create faster, smaller, and more efficient cryptographic keys. ECC generates keys through the properties of the elliptic curve equation instead of the traditional method of generation as the product of very large prime numbers, offering equivalent security with lower computing power and battery resource usage.
- ELSEC (Electronic Security)
ELSEC (Electronic Security): The range of methods and practices designed to protect electronic systems from unauthorized access, use, disclosure, disruption, modification, or destruction. ELSEC involves safeguarding computing, telecommunications, and any electronic data storage and transmission, ensuring the confidentiality, integrity, and availability of information and preserving the functionality of electronic services and infrastructure. It is a vital component of cybersecurity strategies in both private and public sectors.
- Email spoofing
Email spoofing: A malicious practice where the headers of an email are manipulated to make it appear as though the message originated from a different sender. This is often used in phishing and spam campaigns, where the attacker aims to trick the recipient into trusting the false sender, potentially leading to data breaches, financial loss, or other forms of harm.
- Embedded System
Embedded System: A dedicated computer system with a specific function within a larger mechanical or electrical system, often with real-time computing constraints. It is embedded as part of a complete device, often including hardware and mechanical parts. Embedded systems control many devices in common use today and are typically designed for specific control tasks with varying degrees of complexity. They range from simple microcontroller-based systems to complex systems-on-chips (SoCs) and are found in numerous applications, including consumer electronics, automobiles, medical devices, industrial controls, and aerospace.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions 625 Hard questions
750 Complex questions
3,250 Easy/Mid questions - Both as Exam emulation and Per-Domain
201 After Topic questions
240 After Domain questions -
2,800 CISSP Flashcards Access from anywhere, on any device, at any time (web, Android, iOS apps).
Automated reminders, progress tracking, optimized spaced repetitions, confidence-based algorithm. -
34 CISSP Mind Maps
-
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
29 CISM Mind Maps
-
A 200-page CISM study guide
-
89 pages of CISM Quick Sheets
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
24 CC Mind Maps
-
A 120-page CC study guide
-
35 pages of CC Quick Sheets
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access