The FREE Cybersecurity Glossary by Thor Pedersen!

Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.

- Load Balancer
Load Balancer: A network device that distributes incoming network traffic across multiple servers or network resources to improve performance and availability. It is used in large-scale networks to distribute workloads evenly and to prevent a single server from becoming overwhelmed. Examples include load balancers in cloud computing environments and web applications.
- Local Area Network (LAN)
Local Area Network (LAN): A computer network that connects devices in a small geographic area, such as a home, office, or building. It is used to provide communication and sharing of resources among devices within the network. Examples include home networks and office networks.
- Lockout
Lockout: A security measure that prevents a user from accessing a system or network after a certain number of failed login attempts. It is used to prevent unauthorized access and to protect against brute-force attacks. Examples include lockout policies on password-protected accounts and network access points.
- Log
Log: A log is a record of events that occur within a computer system or network, documenting actions such as user logins, system errors, and configuration changes. Logs are critical for monitoring, troubleshooting, and conducting security audits within an IT environment.
- Log Analysis
Log Analysis: The process of examining log files to identify patterns, detect anomalies, and discover useful information about activities within a system, network, or application. It's often used for troubleshooting, performance monitoring, and security incident detection. With the help of log analysis tools, organizations can detect unusual behavior, identify security incidents, and respond to threats more effectively.
- Logging
Logging: The process of recording events or messages in a log. It is used to monitor system activities, track user actions, and identify security threats. Examples include enabling logging for system events, recording user login attempts, and monitoring network traffic.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions 625 Hard questions
750 Complex questions
3,250 Easy/Mid questions - Both as Exam emulation and Per-Domain
201 After Topic questions
240 After Domain questions -
2,800 CISSP Flashcards Access from anywhere, on any device, at any time (web, Android, iOS apps).
Automated reminders, progress tracking, optimized spaced repetitions, confidence-based algorithm. -
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
A 200-page CISM study guide
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
A 120-page CC study guide
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access