The glossary
Cybersecurity Glossary
Learn about Cybrary's impact initiatives where we focus on reducing industry-wide gatekeeping, improving security teams, and making a difference throughout the cybersecurity industry and beyond.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Letter for filtering (will be hidden in prod) :
E
Enterprise Risk Management
Enterprise risk management is the methods and processes used by an enterprise to manage risks to its mission and to establish the trust necessary for the enterprise to support shared missions. It involves the identification of mission dependencies on enterprise capabilities, the identification and prioritization of risks due to defined threats, the implementation of countermeasures to provide both a static risk posture and an effective dynamic response to active threats; and it assesses enterprise performance against threats and adjusts countermeasures as necessary.
Letter for filtering (will be hidden in prod) :
E
Electronic Signature
An electronic signature is the process of applying any mark in electronic form with the intent to sign a data object and is used interchangeably with digital signature.
Letter for filtering (will be hidden in prod) :
E
Encryption Key
An encryption key is a code of variable value developed with the help of an encryption algorithm to encrypt and decrypt information.
Letter for filtering (will be hidden in prod) :
F
Focused Testing
Focused testing is a test methodology that assumes some knowledge of the internal structure and implementation detail of the assessment object. Focused testing is also known as gray box testing.
Letter for filtering (will be hidden in prod) :
F
Flaw Hypothesis Methodology
Flaw hypothesis methodology is the system analysis and penetration technique in which the specification and documentation for an information system are analyzed to produce a list of hypothetical flaws. This list is prioritized on the basis of the estimated probability that a flaw exists, on the ease of exploiting it, and on the extent of control or compromise it would provide. The prioritized list is used to perform penetration testing of a system.
Letter for filtering (will be hidden in prod) :
F
Forensic Specialist
A forensic specialist is a professional who locates, identifies, collects, analyzes, and examines data while preserving the integrity and maintaining a strict chain of custody of information discovered.
Letter for filtering (will be hidden in prod) :
F
Forensically Clean
Forensically clean describes digital media that is completely wiped of all data, including nonessential and residual data, scanned for malware, and verified before use.
Letter for filtering (will be hidden in prod) :
F
Forensics
Forensics is the practice of gathering, retaining, and analyzing computer-related data for investigative purposes in a manner that maintains the integrity of the data.
Letter for filtering (will be hidden in prod) :
F
Fail Safe
A fail safe is the automatic protection of programs and/or processing systems when hardware or software failure is detected.
Letter for filtering (will be hidden in prod) :
F
Fail Soft
Fail soft is the elective termination of affected nonessential processing when hardware or software failure is determined to be imminent.