The FREE Cybersecurity Glossary by Thor Pedersen!
Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.
- Network security
Network security: The set of measures and practices designed to protect a network and the data it carries from unauthorized access, misuse, and destruction. Network security is used to prevent network attacks and protect sensitive information from being stolen or compromised. Examples include firewalls, antivirus software, and encryption.
- Network Segmentation
Network Segmentation: Network segmentation involves dividing a larger network into smaller, isolated subnetworks to enhance security, performance, and manageability. By controlling the flow of traffic between segments, organizations can better contain security breaches and reduce the scope of potential attacks. Techniques for network segmentation include the use of VLANs, firewalls, and network access control lists.
- Network Sniffer
Network Sniffer: A diagnostic tool that captures, analyzes, and records network traffic, network sniffers can be legitimate tools for network management or malicious means for eavesdropping. By examining data packets, network administrators can identify issues and optimize performance, while malicious actors can potentially capture sensitive information.
- Network Sniffing
Network Sniffing: The act of using software to capture network traffic. While often associated with malicious activities such as eavesdropping, sniffing is also a legitimate practice for network monitoring and analysis by administrators to diagnose issues and maintain network health.
- Network Taps
Network Taps: Specialized hardware or software tools used in IT to create a mirror image of network traffic for monitoring and analysis purposes. By capturing this data, network administrators and security professionals can observe network performance and investigate potential security incidents without disrupting the flow of traffic.
- Network topologies
Network topologies: The arrangement and layout of the various devices on a network, including the way in which they are connected and the logical relationship between them. Network topologies are used to determine the most efficient and effective way to connect devices on a network. Examples include star, bus, and ring topologies.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions 625 Hard questions
750 Complex questions
3,250 Easy/Mid questions - Both as Exam emulation and Per-Domain
201 After Topic questions
240 After Domain questions -
2,800 CISSP Flashcards Access from anywhere, on any device, at any time (web, Android, iOS apps).
Automated reminders, progress tracking, optimized spaced repetitions, confidence-based algorithm. -
34 CISSP Mind Maps
-
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
29 CISM Mind Maps
-
A 200-page CISM study guide
-
89 pages of CISM Quick Sheets
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
24 CC Mind Maps
-
A 120-page CC study guide
-
35 pages of CC Quick Sheets
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access