The FREE Cybersecurity Glossary by Thor Pedersen!

Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.

- War chalking
War chalking: The practice of marking physical locations with symbols to indicate the presence of wireless networks, particularly those that are open for public use. This practice has been largely obsolete with the widespread use of mobile internet and security improvements in wireless technology.
- Watering hole attack
Watering hole attack: An attack where attackers seek to compromise a specific group of individuals by infecting websites that members of the group are known to visit. The goal is to infect a targeted user's computer and gain access to the network at the targeted user's place of employment.
- Wave-Division Multiplexing (WDM)
Wave-Division Multiplexing (WDM): A technique in fiber optics that combines multiple optical signals so they can be transmitted simultaneously over a single fiber. The signals are separated by using different wavelengths (colors) of light, which helps increase the overall capacity and speed of data transmission.
- Web hosting
Web hosting: A service that enables organizations and individuals to post a website or web page onto the internet. A web host, or web hosting service provider, provides the technologies and services necessary for the website or webpage to be viewed on the internet.
- Workstation
Workstation: A computer that is connected to a network and is used for tasks like data processing, data analysis, and other professional applications. Workstations can be individually targeted in network attacks due to their access to valuable data or network resources. Thus, security measures such as antivirus software, firewalls, and user access controls are crucial to protect the data and network resources accessible from a workstation.
- Worm
Worm: A type of malware that self-replicates to spread to other computers. Unlike viruses, worms do not need to attach themselves to a host program. They often exploit network vulnerabilities to infect systems and can cause widespread damage without user intervention.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions
-
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
2,500 CISSP Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
A 200-page CISM study guide
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
A 120-page CC study guide
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access