The FREE Cybersecurity Glossary by Thor Pedersen!
Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.
- Browsing
Browsing: The act of navigating through information resources in a network such as the Internet. This involves accessing and reading websites, downloading files, or using online applications. Browsing can be a vulnerable point for data breaches or malware infections, as users might encounter malicious sites, phishing attempts, or unsafe downloads. Effective measures to ensure secure browsing include the use of up-to-date, secure browsers, enabling automatic updates, utilizing browser security settings, and practicing careful navigation habits such as avoiding unfamiliar websites.
- Brute Force
Brute Force: A trial-and-error method used to decode encrypted data by systematically trying every possible combination of passwords or keys until the correct one is found. It is time-consuming and computationally intensive. This is achieved by systematically checking all possible keys or passwords until the correct one is found. Although this method can be time-consuming and resource-intensive, it can also be effective if the password is weak or the system lacks sufficient security measures to detect and prevent such attempts.
- Budget
Budget: A detailed financial plan outlining an organization's expected revenues and expenses over a specific period, typically a fiscal year. Budgets serve as a blueprint for how a company intends to manage its financial resources, allocating funds to various departments, projects, and initiatives. They are essential tools for financial planning and control, helping businesses prioritize expenditures, forecast financial performance, identify potential shortfalls or surpluses, and make informed strategic decisions based on their financial goals and objectives. Budgets are often revised periodically to reflect actual performance and changing circumstances.
- Buffer
Buffer: A temporary storage area for data while it is being transferred from one place to another. Typically, this is used when there is a difference between the rate at which data is received and the rate at which it can be processed or forwarded. Buffers are crucial components in many aspects of computing and networking. However, when not properly managed, buffers can become a point of vulnerability, leading to potential exploits such as buffer overflow attacks.
- Buffer overflow attack
Buffer overflow attack: A form of security exploit that takes advantage of buffer overflow vulnerabilities in a system. By sending more data to a buffer than it can handle, an attacker can overwrite adjacent memory locations and potentially inject and execute malicious code. This can lead to a variety of harmful outcomes, from crashing the system to gaining unauthorized access or control. These attacks underscore the importance of proper memory management and secure coding practices in systems and applications.
- Bug Bounties
Bug Bounties: Incentive programs offered by organizations where individuals can receive recognition and compensation for reporting bugs, especially those pertaining to exploits and vulnerabilities within software systems. These programs encourage ethical hackers to contribute to the security of software by lawfully reporting potential issues.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions 625 Hard questions
750 Complex questions
3,250 Easy/Mid questions - Both as Exam emulation and Per-Domain
201 After Topic questions
240 After Domain questions -
2,800 CISSP Flashcards Access from anywhere, on any device, at any time (web, Android, iOS apps).
Automated reminders, progress tracking, optimized spaced repetitions, confidence-based algorithm. -
34 CISSP Mind Maps
-
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
29 CISM Mind Maps
-
A 200-page CISM study guide
-
89 pages of CISM Quick Sheets
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
24 CC Mind Maps
-
A 120-page CC study guide
-
35 pages of CC Quick Sheets
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access