The FREE Cybersecurity Glossary by Thor Pedersen!

Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.

- SEC (Securities and Exchange Commission)
SEC (Securities and Exchange Commission): A U.S. government agency that regulates the securities industry and oversees the stock and options exchanges. The SEC is responsible for enforcing federal securities laws and protecting investors from fraudulent or misleading practices. For example, the SEC might investigate a company for insider trading or issuing false financial statements.
- Secure communications
Secure communications: The use of cryptographic techniques to protect the confidentiality, integrity, and authenticity of communication between two or more parties. It is used to prevent unauthorized access to sensitive information and to protect against man-in-the-middle attacks. Examples include using encryption to protect the contents of an email, using digital signatures to verify the authenticity of a message, and using secure protocols to establish a secure channel between two parties.
- Secure Cryptoprocessors
Secure Cryptoprocessors: Hardware components designed to securely handle sensitive data such as cryptographic keys and personal identification numbers (PINs). They are embedded in tamper-resistant packaging to prevent physical attacks and are integral to the security of systems processing transactions, authentication credentials, and other critical data.
- Secure defaults (or secure-by-default)
Secure defaults (or secure-by-default): The practice of setting security settings to the most secure option as the default so that users do not have to manually adjust them. This is used in software and system design, as well as in network and device configuration. For example, a password manager may have a secure default password length requirement, or a router may have a secure default firewall configuration.
- Secure Electronic Transaction (SET)
Secure Electronic Transaction (SET): An early protocol designed to secure electronic credit card transactions. While SET introduced mechanisms to safeguard payment information, it is now considered obsolete and has been largely replaced by more versatile and widely supported standards such as TLS and EMV for online and offline credit card transaction security.
- Secure FTP (SFTP)
Secure FTP (SFTP): A secure protocol for transferring files over a network, ensuring the confidentiality and integrity of the transferred files and preventing unauthorized access to sensitive information. Examples include transferring sensitive documents between two parties, financial data between a client and a server, and software updates to a network of devices.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions
-
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
2,500 CISSP Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
A 200-page CISM study guide
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
A 120-page CC study guide
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access