The FREE Cybersecurity Glossary by Thor Pedersen!

Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.

- Limit Registers
Limit Registers: Limit registers in computer architecture are used to define the boundaries of the memory space that a process or application is permitted to access. They help protect the system by preventing a program from reading from or writing to memory outside its allocated area, thereby avoiding potential security breaches like buffer overflows.
- Linear bus topology
Linear bus topology: A network configuration where all devices are connected to a single central cable or bus, forming a straight line. It is used in small networks where simplicity and low cost are the main priorities. Examples include home networks and small office networks.
- Linear cryptanalysis
Linear cryptanalysis: Linear cryptanalysis is a method for breaking symmetric cryptographic algorithms by creating linear approximations to describe the behavior of the block cipher. By analyzing input and output bits, cryptanalysts can find correlations that may lead to uncovering the secret key. It is a powerful tool for evaluating the strength of encryption algorithms.
- Line Driver
Line Driver: A line driver is an electronic device that amplifies a digital signal, extending its transmission distance along communication lines. It is commonly used in settings where signals must travel long distances, such as telecommunications and network links. From a security standpoint, line drivers must be secured to ensure the integrity and confidentiality of the transmitted signals.
- Link (or network access) layer (of TCP/IP model)
Link (or network access) layer (of TCP/IP model): The first layer of the TCP/IP model responsible for data transmission between devices on the same network. It encompasses protocols and standards for accessing the physical network, including technologies like Ethernet, Wi-Fi, and Bluetooth, facilitating device communication within the network.
- Link-state routing protocol
Link-state routing protocol: A type of networking protocol that uses a link-state database to maintain information about the network topology and routes between nodes. It is used in computer networks to enable efficient routing of data between nodes. Examples include OSPF and IS-IS.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions 625 Hard questions
750 Complex questions
3,250 Easy/Mid questions - Both as Exam emulation and Per-Domain
201 After Topic questions
240 After Domain questions -
2,800 CISSP Flashcards Access from anywhere, on any device, at any time (web, Android, iOS apps).
Automated reminders, progress tracking, optimized spaced repetitions, confidence-based algorithm. -
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
A 200-page CISM study guide
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
A 120-page CC study guide
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access