The FREE Cybersecurity Glossary by Thor Pedersen!
Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.
- Binary
Binary: This pertains to a base-2 number system, which uses only two digits, 0 and 1, to represent all its values. This system is used extensively in digital computers and digital logic because it's straightforward to implement with digital electronic circuitry. As every piece of data or instruction in a computer is represented in binary, understanding and protecting binary data is critical to overall system security.
- Binary code
Binary code: A system of representing numbers, letters, and other symbols using only two digits, 0 and 1. This concept is used in computer science to encode and transmit data, as well as to write instructions for computer programs. For example, a binary code for the letter "A" might be 01000001.
- Binding
Binding: In computing, this refers to the creation of a linkage between a software object and a data element, a variable and its value, or a user action and a program response. In the realm of cybersecurity, binding often relates to the secure association of credentials with users or devices to ensure secure authentication processes.
- Biometric Locks
Biometric Locks: Advanced security devices that use unique biological traits, such as fingerprints, eye patterns, or facial recognition, to authenticate and grant access to individuals. Biometric locks enhance security by providing a non-transferable and difficult-to-replicate method for verifying identity.
- Biometrics
Biometrics: The science and technology of using biological characteristics, such as fingerprints or facial features, to identify individuals and verify their identity. This concept is used in various fields, including security, healthcare, and finance, to improve accuracy and reduce the risk of identity fraud.
- BIOS (Basic Input/Output System)
BIOS (Basic Input/Output System): Firmware that initializes and manages the hardware components of a computer system, facilitating the booting process and providing runtime services for operating systems and programs. It enables users to configure hardware settings, such as altering the boot device order or enabling/disabling specific peripherals.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions 625 Hard questions
750 Complex questions
3,250 Easy/Mid questions - Both as Exam emulation and Per-Domain
201 After Topic questions
240 After Domain questions -
2,800 CISSP Flashcards Access from anywhere, on any device, at any time (web, Android, iOS apps).
Automated reminders, progress tracking, optimized spaced repetitions, confidence-based algorithm. -
34 CISSP Mind Maps
-
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
29 CISM Mind Maps
-
A 200-page CISM study guide
-
89 pages of CISM Quick Sheets
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
24 CC Mind Maps
-
A 120-page CC study guide
-
35 pages of CC Quick Sheets
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access