The FREE Cybersecurity Glossary by Thor Pedersen!

Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.

- Scoping process
Scoping process: The process of defining the boundaries and limitations of a system or network to determine which assets and resources require protection and the relevant security controls needed. Examples include setting the scope for a security assessment, data protection plan, or security policy.
- Screened host
Screened host: A host protected from external threats by a screening router to prevent unauthorized access and safeguard sensitive information. Examples include a server, database, or web application situated behind a screening router.
- Screened subnet architecture
Screened subnet architecture: A network configuration that uses firewalls to create a "demilitarized zone" (DMZ), a separate subnet for public-facing servers. In this setup, one firewall sits between the internal network and the DMZ, and another firewall sits between the DMZ and the external network (e.g., the internet). This configuration allows public traffic to access servers in the DMZ while maintaining a protective barrier between the external network and the internal network, thereby enhancing the security of the internal network.
- Screening routers
Screening routers: Network devices that filter packets to control access and manage traffic between different parts of a network. They are configured with specific rules to block or allow traffic based on factors such as source and destination IP addresses, ports, or protocols. The goal of a screening router is to enhance network security by preventing unauthorized access or traffic, mitigating the risk of network attacks, and managing network load.
- Screen lock
Screen lock: A security feature that requires a user to provide authentication, such as a password, pattern, or biometric verification, to access a device after the screen has been idle for a certain period of time. The purpose of a screen lock is to protect the device and its contents from unauthorized access. In scenarios where devices hold sensitive data or can access protected networks, a screen lock serves as a fundamental line of defense against potential breaches.
- Screen scraping
Screen scraping: A technique used to extract data from the display output of a program or system. It involves capturing data from a screen interface and converting it into structured datasets. While screen scraping can be used for legitimate purposes like data aggregation and legacy system integration, it can also pose privacy risks if used to harvest sensitive information without authorization.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions
-
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
2,500 CISSP Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
A 200-page CISM study guide
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
A 120-page CC study guide
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access