The FREE Cybersecurity Glossary by Thor Pedersen!
Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.
- Emerging Cloud Technologies
Emerging Cloud Technologies: The new and advanced developments in cloud-based services and infrastructure. It covers technologies such as serverless computing, artificial intelligence (AI) and machine learning (ML) platforms, edge computing, and advanced security solutions in the cloud. As these technologies evolve and gain adoption, they bring along new potential vulnerabilities and attack vectors, making their secure implementation and management critical.
- EMI (Electromagnetic Interference)
EMI (Electromagnetic Interference): The disruption of an electrical circuit's performance due to external electromagnetic radiation or other electrical devices. EMI can interfere with the normal operation of electronic devices, including computers and networking equipment, which can lead to data loss, system errors, or even equipment failure, creating potential risks for data integrity and system availability.
- Encapsulating Security Payload (ESP)
Encapsulating Security Payload (ESP): A component of the Internet Protocol Security (IPSec) suite used for ensuring secure communication by providing confidentiality, data origin authentication, connectionless integrity, and anti-replay. ESP achieves this by encapsulating the data to be protected, thus hiding the original data and safeguarding the integrity of the transmitted data.
- Encapsulation
Encapsulation: In computer networking, encapsulation refers to the process of wrapping data with necessary protocol information before network transmission. Similar to an envelope for a letter, it involves adding headers (and sometimes trailers) around data for proper delivery and processing. In object-oriented programming, encapsulation is a fundamental concept that binds together the data and functions that manipulate the data and keeps both safe from outside interference and misuse. Data encapsulation led to the important OOP concept of data hiding.
- Encode
Encode: The process of converting information from one format or code to another for the purposes of standardization, speed, secrecy, or compressions. In computer systems, encoding can refer to transforming data into a form that can be easily used by different types of systems. For example, encoding is commonly used for transforming raw data into a binary format that is understandable by computers. It also refers to the conversion of data for transmission, storage, or encryption, often using schemes such as Base64 and UTF-8 for text or more complex schemes like encoding video for digital formats.
- Encryption
Encryption: The process of converting information or data into a secure format that cannot be read without proper authorization, typically using a key. It protects data privacy by ensuring that only those who have the encryption key can access the original data, making it essential for secure communication over potentially vulnerable networks like the Internet. Encryption is used in various applications, including online transactions, confidential communications, and safeguarding sensitive information.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions 625 Hard questions
750 Complex questions
3,250 Easy/Mid questions - Both as Exam emulation and Per-Domain
201 After Topic questions
240 After Domain questions -
2,800 CISSP Flashcards Access from anywhere, on any device, at any time (web, Android, iOS apps).
Automated reminders, progress tracking, optimized spaced repetitions, confidence-based algorithm. -
34 CISSP Mind Maps
-
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
29 CISM Mind Maps
-
A 200-page CISM study guide
-
89 pages of CISM Quick Sheets
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
24 CC Mind Maps
-
A 120-page CC study guide
-
35 pages of CC Quick Sheets
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access