The FREE Cybersecurity Glossary by Thor Pedersen!
Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.
- Hyperlink
Hyperlink: A reference or connection in a hypertext document to another document or another part of the same document. It is usually activated by clicking on a highlighted word or image within the document. Hyperlinks are the primary method of navigation between pages and resources on the web, and their correct and secure implementation is crucial to overall web security.
- Hypertext Markup Language (HTML)
Hypertext Markup Language (HTML): A markup language used to structure and format content on the web. It is commonly used to create web pages and specify the layout, text, images, and other elements on the page. Examples of HTML use include using tags to create headings, paragraphs, lists, and tables on a web page, as well as linking to other web pages and incorporating multimedia.
- Hypertext Transfer Protocol (HTTP)
Hypertext Transfer Protocol (HTTP): Hypertext Transfer Protocol (HTTP) is the protocol used for transmitting web pages and other content on the World Wide Web. As a client-server protocol, a web client, such as a browser, requests a page from a server, and the server responds with the content. However, HTTP does not inherently encrypt data, which can expose information to interception or eavesdropping.
- Hypertext Transfer Protocol Secured (HTTPS)
Hypertext Transfer Protocol Secured (HTTPS): A secure version of HTTP. It uses Transport Layer Security (TLS) or its predecessor, Secure Sockets Layer (SSL), to encrypt communications between the user's browser and the web server. This helps protect sensitive data in transit from being intercepted or manipulated and verifies the authenticity of websites, hence playing a crucial role in safeguarding online transactions and sensitive information.
- Hypervisor
Hypervisor: A piece of software, firmware, or hardware that creates and runs virtual machines (VMs). It separates the operating system and applications from the underlying physical hardware, which allows multiple computing environments to coexist on the same physical host. Hypervisors can be a target for attacks aimed at breaching VMs, so it's vital to ensure they are securely configured and maintained.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions
-
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
2,500 CISSP Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
A 200-page CISM study guide
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
A 120-page CC study guide
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access