The glossary
Cybersecurity Glossary
Learn about Cybrary's impact initiatives where we focus on reducing industry-wide gatekeeping, improving security teams, and making a difference throughout the cybersecurity industry and beyond.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Letter for filtering (will be hidden in prod) :
A
Asset
An asset is the resources of an organization, business either having tangible value – finance, infrastructure, physical properties, human resource – or of intangible value such as goodwill that helps business and can be converted to cash for future use.
Letter for filtering (will be hidden in prod) :
A
Acceptable Use Policy
Acceptable use policy is a policy that defines the level of access and degree of use of the organization’s network or internet by the members of an organization.
Letter for filtering (will be hidden in prod) :
A
Attack
An attack is an action with malicious intention to interrupt the operations of a network or steal the data, etc.
Letter for filtering (will be hidden in prod) :
A
Accounting Legend Code
Accounting legend code is numeric code used to indicate the minimum accounting controls required for items accountable communications security (ComSec) material within the control systems.
Letter for filtering (will be hidden in prod) :
A
Advanced Penetration Testing
Advanced penetration testing is the process of testing a network to discover vulnerabilities which make it open to harmful intruders; then addressing and remedying the issues.
Letter for filtering (will be hidden in prod) :
A
Access Control List (ACL)
An access control list is a set of rules or instructions to inform the operating system about the access constraints for users or user groups, so that the operating system knows whether or not a user id has permission to access a file or a directory.
Letter for filtering (will be hidden in prod) :
A
Audit Trail
An audit trail is a detailed history of transactions to help you trace a piece of information back to its origin. In the field of computers, audit trail or paper log, helps maintain security, recover any lost data.
Letter for filtering (will be hidden in prod) :
A
Availability
Availability is the time duration a system or resource is ready for use.
Letter for filtering (will be hidden in prod) :
A
Access Point
An access point is a computer networking device which allows a wi-fi compliant device to connect to a wired network and usually connects via a router.
Letter for filtering (will be hidden in prod) :
A
Authentication
Authentication is the process of identifying a piece of information, the veracity of information provided. In computers, it is the process of identifying a person or system with the username; password, etc. Authentication helps individuals; systems gain authorization based on their identity.