The FREE Cybersecurity Glossary by Thor Pedersen!

Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.

- Secure Hash Algorithm-3
Secure Hash Algorithm-3: A cryptographic hash function that was announced as the winner of the NIST hash function competition in 2012. Despite being part of the same family, SHA-3 is fundamentally different from SHA-1 and SHA-2, offering better performance and resistance against potential vulnerabilities. SHA-3 can be used for creating hash values to ensure data integrity, generating unique identifiers for data, and creating digital signatures, among other uses.
- Secure Hash Algorithm (SHA)
Secure Hash Algorithm (SHA): A group of cryptographic hash functions designed to ensure data integrity. By producing a fixed-size hash value from variable input data, SHA helps verify unchanged data transfer, confirm file authenticity, and securely store passwords.
- Secure Hashing Algorithm (SHA-1)
Secure Hashing Algorithm (SHA-1): A cryptographic hash function that produces a 160-bit hash value, which is typically rendered as a 40-digit hexadecimal number. SHA-1 is part of the Secure Hash Algorithm family designed by the National Security Agency (NSA) and published by the National Institute of Standards and Technology (NIST). It was widely used for security applications and protocols, including TLS and SSL, PGP, SSH, and IPsec. However, SHA-1 is no longer considered secure against well-funded attackers; as of 2005, theoretical weaknesses were discovered, and over time, practical attacks have demonstrated the ability to produce collisions (two different inputs that result in the same hash value). As a result, it has been recommended to transition to stronger hash functions such as SHA-256 or SHA-3.
- Secure hash standard
Secure hash standard: A set of cryptographic hash functions that include SHA-1, SHA-2, and SHA-3, as approved and published by the National Institute of Standards and Technology (NIST) in the United States. These algorithms are widely used to verify data integrity and authenticity. The Secure Hash Standard plays a critical role in many security protocols and applications to provide assurances of data integrity.
- Secure Hypertext Transfer Protocol (S-HTTP)
Secure Hypertext Transfer Protocol (S-HTTP): S-HTTP was an extension of HTTP to support the secure exchange of data over the internet. However, it has not been widely adopted, and its use has been largely superseded by HTTPS, which combines HTTP with the SSL/TLS protocol to provide a secure browsing experience.
- Secure Shell (SSH)
Secure Shell (SSH): A network protocol that enables secure remote login and other secure network services over an unsecured network. SSH provides robust authentication and secure encrypted data communication between two computers connecting over an open network, ensuring the confidentiality and integrity of data transmitted. It is widely used by network administrators for remotely controlling servers and applications.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions 625 Hard questions
750 Complex questions
3,250 Easy/Mid questions - Both as Exam emulation and Per-Domain
201 After Topic questions
240 After Domain questions -
2,800 CISSP Flashcards Access from anywhere, on any device, at any time (web, Android, iOS apps).
Automated reminders, progress tracking, optimized spaced repetitions, confidence-based algorithm. -
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
A 200-page CISM study guide
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
A 120-page CC study guide
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access