The FREE Cybersecurity Glossary by Thor Pedersen!

Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.

- Passive Attack
Passive Attack: A type of network attack where the attacker intercepts and reads information transmitted over a network without altering the data or affecting the system's operation. The intent is usually to gather information, often confidential, without detection. Examples include eavesdropping, traffic analysis, and sniffing, where the attacker's main goal is to obtain unauthorized access to the data.
- Passive Detection
Passive Detection: A security method that identifies threats and vulnerabilities by monitoring systems for suspicious activities without altering data or interacting with it. This technique is employed to detect potential attacks early and mitigate them effectively. Examples include intrusion detection systems and network security monitoring tools.
- Passive Response
Passive Response: A method of dealing with potential threats by logging them and possibly issuing alerts but not taking direct action to interrupt or mitigate the threat. These responses are often employed when the cost or potential disruption of active response exceeds the perceived risk of the threat. The goal is to gather information about the threat for later analysis and possible action.
- Pass-the-hash
Pass-the-hash: A type of exploit where an attacker uses a hashed form of a user's password instead of the actual password to authenticate against a network service. This kind of attack bypasses the need to decrypt or crack the password and takes advantage of the fact that many systems authenticate users by comparing the hash of the provided password with the stored hash.
- Password
Password: A password is a sequence of characters used as a security credential to authenticate users and protect access to computer systems and online accounts. Good password practices include using length and complexity to resist password-cracking attempts. Examples provided should reflect strong passwords rather than weak, commonly used ones.
- Password Authentication Protocol (PAP)
Password Authentication Protocol (PAP): Password Authentication Protocol (PAP) is an authentication protocol that sends usernames and passwords as plaintext and is therefore considered insecure by modern standards. PAP is susceptible to eavesdropping and interception, as the credentials are not encrypted. It's typically used in legacy or less secure environments where more secure authentication methods are not feasible.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions
-
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
2,500 CISSP Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
A 200-page CISM study guide
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
A 120-page CC study guide
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access