The FREE Cybersecurity Glossary by Thor Pedersen!

Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.

- Virtual Extensible Local Area Network (VXLAN)
Virtual Extensible Local Area Network (VXLAN): A network virtualization technology that attempts to address the scalability issues associated with large cloud computing environments. It uses a virtual network identifier to enable the creation of isolated, multi-tenant broadcast domains in a network, providing the ability to spawn fine-grained networks on demand with improved security and isolation.
- Virtualization
Virtualization: The process of creating a software-based (or virtual) representation of something rather than a physical one. It can apply to applications, servers, storage, and networks and is the backbone of cloud computing, enabling more efficient utilization of physical computer hardware and offering flexibility, scalability, and potential cost savings.
- Virtual LAN (VLAN)
Virtual LAN (VLAN): A group of devices on a LAN that are grouped together logically, regardless of their physical location. VLANs are used to segment network traffic and improve network security. Examples of VLANs include departmental VLANs, guest VLANs, and VLANs for virtual machines.
- Virtual machine escape
The instance where an attacker successfully breaches a virtual machine's confines to interact with the host system. By exploiting vulnerabilities within the virtual machine environment, attackers may breach the separation boundary, leading to the compromise of other virtual machines hosted on the same physical system.
- Virtual memory
Virtual memory: A memory management technique that provides an idealized abstraction of the storage resources that are actually available on a system. It creates an illusion to users of a very large (main) memory by using the hard disk as an extension of the RAM, enhancing system performance and isolation of processes.
- Virtual organizations
Virtual organizations: Networked groups of independent entities that share resources and skills to achieve common objectives but are not limited by traditional organizational boundaries or physical locations. They leverage information and communication technologies to operate, offering flexibility and scalability, but require robust security measures to protect shared information and to ensure reliable and secure collaboration.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions
-
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
2,500 CISSP Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
A 200-page CISM study guide
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
A 120-page CC study guide
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access