The FREE Cybersecurity Glossary by Thor Pedersen!
Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.
- Encryption Algorithm
Encryption Algorithm: A mathematical process used to convert plaintext into ciphertext. Encryption algorithms are designed to encode data in such a way that it can only be decrypted by authorized parties. Common encryption algorithms include AES (Advanced Encryption Standard), DES (Data Encryption Standard), and RSA (Rivest-Shamir-Adleman). They use a variety of techniques, such as substitution, transposition, and mathematical transformations, to ensure data security.
- Encryption Key
Encryption Key: A string of characters used in conjunction with an encryption algorithm to encode or decode data. In symmetric encryption, the same key is used for both encryption and decryption, while in asymmetric encryption, two related keys are used - a public key for encryption and a private key for decryption. The security of encrypted data is highly dependent on the strength and secrecy of the encryption key.
- End-to-End Encryption
End-to-End Encryption: A method of secure communication that prevents third-parties from accessing data while it's transferred from one end system to another. In this system, data is encrypted on the sender's system or device, and only the recipient is able to decrypt it. No intermediary, including internet service providers, application service providers, and hackers, can read it or tamper with it. End-to-end encryption is widely used in messaging services, email communication, and secure file sharing to ensure that only the communicating users can read the messages.
- End user
End user: The individual who directly interacts with a product, application, or system. This person does not participate in the development of the system but uses it for its intended purpose. In the data protection context, the end user is often the target of security protocols and training to minimize risks, such as phishing attacks or malware intrusion, which arise from human error or negligence.
- End-user computing
End-user computing: End-user computing (EUC) refers to systems and platforms that allow users who are not programming experts to create and use software applications. It includes tools like spreadsheet programs, databases, and graphical interfaces that simplify the development and execution of business programs and processing. EUC empowers users to manage and control their own computing needs but also requires governance to ensure that data integrity and security are maintained, as the widespread creation of disparate applications can lead to data silos and security gaps.
- ENISA (European Union Agency for Network and Information Security)
ENISA (European Union Agency for Network and Information Security): A European center of expertise for cybersecurity, established in 2004, that supports the EU and its Member States in improving their ability to prevent, detect, and respond to information security threats and cyber-attacks.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions 625 Hard questions
750 Complex questions
3,250 Easy/Mid questions - Both as Exam emulation and Per-Domain
201 After Topic questions
240 After Domain questions -
2,800 CISSP Flashcards Access from anywhere, on any device, at any time (web, Android, iOS apps).
Automated reminders, progress tracking, optimized spaced repetitions, confidence-based algorithm. -
34 CISSP Mind Maps
-
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
29 CISM Mind Maps
-
A 200-page CISM study guide
-
89 pages of CISM Quick Sheets
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
24 CC Mind Maps
-
A 120-page CC study guide
-
35 pages of CC Quick Sheets
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access