The FREE Cybersecurity Glossary by Thor Pedersen!
Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.
- Hacker
Hacker: An individual who uses technical knowledge and expertise to gain unauthorized access to systems, networks, or data. Hackers can be motivated by various reasons, such as curiosity, financial gain, or political activism. Examples of hackers include black hat hackers who engage in illegal activities, white hat hackers who use their skills for defensive purposes, and gray hat hackers who straddle the line between the two.
- Half-duplex mode
Half-duplex mode: A communication mode where data can be transmitted and received over a single channel, but not simultaneously. It is used in networking and telecommunications to conserve bandwidth and reduce interference but at the cost of slower data transfer speeds. Examples include using half-duplex mode for older modems or for low-bandwidth connections.
- Handling of Assets
Handling of Assets: The processes and practices associated with managing and protecting an organization's valuable resources, or 'assets.' These assets can include data, hardware, software, and intellectual property. From a security perspective, proper asset handling is vital to prevent unauthorized access, misuse, alteration, or destruction. It typically involves tasks such as asset identification, classification based on sensitivity and criticality, and implementation of appropriate controls (like encryption for data and physical security measures for hardware).
- Handprint scanner
Handprint Scanner: A biometric device that captures the unique patterns and characteristics of an individual's hand, including shape, size, and vein patterns, to authenticate identity. Handprint scanners differ from fingerprint or palm scanners by scanning the entire hand instead of focusing on individual features.
- Handshake
Handshake: In the context of networking, a handshake is a protocol or process used to establish a connection between two systems. A common example is the TCP three-way handshake, which involves a synchronization (SYN) message sent by the client to the server, an acknowledgment of the synchronization (SYN-ACK) sent by the server back to the client, and a final acknowledgment (ACK) sent by the client to the server. This sequence of messages confirms that both parties are ready to communicate and establishes a reliable connection.
- Hard copy key
Hard copy key: A physical key or token used to gain access to a location or system. Examples include metal keys, keycards, and smart keys, often kept on a keychain or similar device for use in unlocking doors, starting vehicles, or entering secure areas.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions
-
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
2,500 CISSP Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
A 200-page CISM study guide
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
A 120-page CC study guide
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access