The FREE Cybersecurity Glossary by Thor Pedersen!

Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.

- Virtual Private Cloud (VPC)
Virtual Private Cloud (VPC): A virtual network that provides a private and isolated environment in a public cloud infrastructure. It offers an organization control over network configurations, including IP address ranges, subnets, route tables, and network gateways, enabling it to launch resources in a defined virtual network, enhancing the organization's data privacy and security.
- Virtual Private Network (VPN)
Virtual Private Network (VPN): A secure connection method used to add security and privacy to private and public networks. VPNs use encryption and other security mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted, offering secure communication over potentially insecure networks, such as the internet.
- Virtual Private Network (VPN) Concentrator
Virtual Private Network (VPN) Concentrator: A networking device that creates a secure end for multiple VPN connections, providing capabilities like data encryption and tunneling protocols. It is often used in scenarios where numerous VPN connections are required, such as for remote workers or multiple office locations, ensuring secure and efficient network access.
- Virus
Virus: A type of malicious software that, when executed, replicates itself by modifying other computer programs and inserting its own code. Viruses can have harmful side effects, causing harm to system software by corrupting or destroying data, slowing down system performance, or giving attackers access to system resources.
- Virus signature file
Virus signature file: A file that contains the definitions and characteristics of known viruses, used by antivirus software to identify and block viruses. Virus signature files are used to protect computers and networks from virus attacks. Examples of virus signature files include virus definition files and virus pattern files.
- Vishing
Vishing: A fraudulent practice where perpetrators use a telephone system to deceive individuals into revealing sensitive information. Often, these attackers pretend to represent legitimate organizations, using social engineering techniques to manipulate victims, gain their trust, and access their personal, financial, or security data.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions
-
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
2,500 CISSP Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
A 200-page CISM study guide
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
A 120-page CC study guide
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access