The FREE Cybersecurity Glossary by Thor Pedersen!

Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.

- Lightweight Directory Access Protocol (LDAP)
Lightweight Directory Access Protocol (LDAP): A networking protocol used to access and manage directory information services over a network. It is used in identity and access management systems to store and manage user and application credentials. Examples include Active Directory and OpenLDAP.
- Lightweight Directory Access Protocol (LDAP) Injection Attack
Lightweight Directory Access Protocol (LDAP) Injection Attack: An attack that exploits a vulnerability in LDAP-enabled applications by injecting malicious LDAP statements into user input. It is used to gain unauthorized access to sensitive data or perform malicious actions. Examples include modifying LDAP queries to bypass authentication or retrieve sensitive information.
- Lightweight Extensible Authentication Protocol (LEAP)
Lightweight Extensible Authentication Protocol (LEAP): A wireless network authentication protocol designed to provide secure client-to-access point communication. LEAP ensures only authorized users can access the network, commonly used in environments such as office Wi-Fi networks and public wireless spaces.
- Lower Order Languages
Lower Order Languages: Programming languages that are closer to machine code or assembly language than high-level languages. They offer limited abstraction from hardware, providing greater control over memory and processors, making them suitable for tasks requiring direct hardware manipulation or high performance. Examples include assembly language and machine language, which involve instructions directly executed by the CPU. These languages can be more challenging to write and maintain but offer efficiency crucial for specific low-level programming tasks.
- Land Attack
Land Attack: A type of denial of service (DoS) attack that involves sending a forged packet to a device with the same source and destination IP address and port number. As the device tries to respond to this unusual packet, it enters a loop of repeated actions that can cause the system to slow down or crash. These attacks exploit vulnerabilities in certain types of network configurations or operating systems and can disrupt the availability of services.
- Latency
Latency: The delay between the transmission and receipt of data measured in milliseconds (MS). It is used in networking to measure the speed and efficiency of data transfer. Examples -a high latency internet connection may cause slow loading times on websites, latency in a gaming server can cause lag or delay in gameplay, and latency in a financial trading system can cause delays in trade executions.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions
-
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
2,500 CISSP Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
A 200-page CISM study guide
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
A 120-page CC study guide
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access