Coming mid-July
Get 3 months of access for the price of 2!
Celebrate Cybersecurity Awareness Month with our buy 2, get 1 offer. Valid until October 31. Elevate your skills today!
October Special
Get 3 months of access for the price of 2!
Celebrate Cybersecurity Awareness Month with our buy 2, get 1 offer!
Celebrate Cybersecurity Awareness Month with our buy 2, get 1 offer. Valid until October 31. Elevate your skills today!
Valid until October 31. Elevate your skills today!
Buy now
The glossary

Cybersecurity Glossary

Learn about Cybrary's impact initiatives where we focus on reducing industry-wide gatekeeping, improving security teams, and making a difference throughout the cybersecurity industry and beyond.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Letter for filtering (will be hidden in prod) :

G

Gethostbyaddr

The gethostbyaddr is a DNS (domain name system) query that returns the internet host name corresponding to an IP address.

Letter for filtering (will be hidden in prod) :

G

Gnu

The name gnu stands for “gnu’s not unix” (gnu is pronounced as g’noo). The development of gnu started in january 1984 and is known as the gnu project. Gnu is a unix-like operating system (os), that comprises many programs such as applications, libraries, developer tools, games. The gnu is available with source code that allows a user to run, copy, modify, distribute, study, change, and improve the software.

Letter for filtering (will be hidden in prod) :

G

Guideline

A guideline is a general rule or a piece of advice required to follow in order to accomplish the set goals of an organization.

Letter for filtering (will be hidden in prod) :

G

Guessing Entropy

A guessing entropy is a measure of the difficulty that an attacker has to guess the average password used in a system. In this document, entropy is stated in bits. When a password has n-bits of guessing entropy then an attacker has as much difficulty guessing the average password as in guessing an n-bit random quantity. The attacker is assumed to know the actual password frequency distribution.

Letter for filtering (will be hidden in prod) :

G

Get Nearest Server

Get nearest server is a request packet sent by a client on an IPX network to locate the nearest active server of a particular type. An IPX network client issues a GNS request to solicit either a direct response from a connected server or a response from a router that tells it where on the inter-network the service can be located. GNS is part of the IPX sap.

Letter for filtering (will be hidden in prod) :

G

Gnutella

Gnutella is an open file sharing or peer-to-peer (p2p) network that was originally developed by Justin Frankel and Tom Pepper of Nullsoft in the early 2000. It was the first decentralized file sharing network that acted as a server for sharing files while simultaneously acting as a client that searches for and downloads files from other users.

Letter for filtering (will be hidden in prod) :

G

Gateway

Gateways are network points that act as an entrance to another network. A node or stopping point can be either a gateway node or a host (end-point) node.

Letter for filtering (will be hidden in prod) :

G

Governance, Risk Management, and Compliance

Governance, risk management, and compliance is a comprehensive and integrated organization-wide system for achieving the goals set in each area namely governance, risk management, and compliance, and meet the regulatory standards and requirements.

Letter for filtering (will be hidden in prod) :

G

Global Information Infrastructure (GII)

The global information infrastructure is the worldwide interconnections of the information systems of all countries, international and multinational organizations, and international commercial communications.

Letter for filtering (will be hidden in prod) :

H

Hashing

Hashing is a system of generating string values with the help of algorithms to maintain data integrity and accuracy.