The FREE Cybersecurity Glossary by Thor Pedersen!
Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.
- TCP SYN flood attack
TCP SYN flood attack: A type of denial-of-service (DoS) attack that aims to make a server unavailable by overwhelming it with connection requests. The attacker sends a series of TCP SYN (synchronization) packets to the target server, each appearing to come from a different source, which prompts the server to allocate resources to await the completion of each connection. However, the attacker never completes the connections, causing the server to become overwhelmed with incomplete connections and eventually making the server unavailable to legitimate users.
- Teardrop Attack
Teardrop Attack: A denial-of-service attack that targets the vulnerability in the IP packet reassembly process. The attacker sends fragmented IP packets with overlapping offset field values to the target system, which can cause the system to fail or crash when it tries to reassemble these malformed fragments. This attack exploits the fragmentation logic errors in older operating systems that do not handle such exceptions properly.
- Technical controls
Technical controls: Security measures that are based on the use of technology, such as hardware, software, and networking components. They are used to protect against threats and vulnerabilities in a system or network. Examples include firewalls, intrusion detection systems, and encryption algorithms.
- Technical infrastructure security
Technical infrastructure security: The protection of the underlying systems and services that support an organization's IT environment. This includes ensuring the security of servers, networks, databases, and other technical assets from threats such as malware, unauthorized access, and data breaches. Key elements of technical infrastructure security include patch management, secure configuration, access control, network security, and monitoring for signs of potential security incidents.
- Technical vulnerability information
Technical vulnerability information: Details about a weakness or flaw in a system or application that can be exploited by an attacker. It is used by security professionals to identify and mitigate risks and by software developers to fix vulnerabilities. Examples include information about a buffer overflow exploit in a web application or a SQL injection attack on a database.
- Technology infrastructure
Technology infrastructure: The composite hardware, software, network resources, and services required for the operation, management, and delivery of IT services and solutions. This infrastructure supports the delivery and processing of information across an organization.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions 625 Hard questions
750 Complex questions
3,250 Easy/Mid questions - Both as Exam emulation and Per-Domain
201 After Topic questions
240 After Domain questions -
2,800 CISSP Flashcards Access from anywhere, on any device, at any time (web, Android, iOS apps).
Automated reminders, progress tracking, optimized spaced repetitions, confidence-based algorithm. -
34 CISSP Mind Maps
-
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
29 CISM Mind Maps
-
A 200-page CISM study guide
-
89 pages of CISM Quick Sheets
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
24 CC Mind Maps
-
A 120-page CC study guide
-
35 pages of CC Quick Sheets
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access