Coming mid-July
Get 3 months of access for the price of 2!
Celebrate Cybersecurity Awareness Month with our buy 2, get 1 offer. Valid until October 31. Elevate your skills today!
October Special
Get 3 months of access for the price of 2!
Celebrate Cybersecurity Awareness Month with our buy 2, get 1 offer!
Celebrate Cybersecurity Awareness Month with our buy 2, get 1 offer. Valid until October 31. Elevate your skills today!
Valid until October 31. Elevate your skills today!
Buy now
The glossary

Cybersecurity Glossary

Learn about Cybrary's impact initiatives where we focus on reducing industry-wide gatekeeping, improving security teams, and making a difference throughout the cybersecurity industry and beyond.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Letter for filtering (will be hidden in prod) :

I

Incident Handling

Incident handling is an action plan developed (by an organization or individual) to counteract intrusions, cyber-theft, denial of service, fire, flood, and any other security-related events. It comprises six process steps: preparation, identification of attack, containment of attack, eradication, recovery, and analysis (lessons learned documentation).

Letter for filtering (will be hidden in prod) :

I

Incident

An incident is an unplanned disruption or degradation of a network or system service and needs to be resolved immediately. An example of an incident is a server crash that causes a disruption in the business process. However, if the disruption is planned, say, a scheduled maintenance, it is not an incident.

Letter for filtering (will be hidden in prod) :

I

Ingress Filtering

Ingress filtering is used to ensure that all incoming packets (of data) are from the networks from which they claim to originate. Network ingress filtering is a commonly used packet filtering technique by many internet service providers to prevent any source address deceiving. This helps in combating several net abuses or crimes by making internet traffic traceable to its source.

Letter for filtering (will be hidden in prod) :

J

Jump Bag

A jump bag is a container that has all the items necessary to respond to an incident inside to help mitigate the effects of delayed reactions.

Letter for filtering (will be hidden in prod) :

J

Jitter

Jitter is any deviation in, or displacement of, the signal pulses in a high-frequency digital signal. The aberration can be in amplitude, phase timing, or the width of the signal pulse. Jitter is sometimes referred to as “packet delay variation,” or pdv. Controlling jitter is critical for a good online experience.

Letter for filtering (will be hidden in prod) :

K

Kerberos

Kerberos is a computer network authentication protocol and is ticket-based allowing nodes to communicate over a non-secure. Massachusetts Institute of Technology (MIT) developed the kerberos to protect network services provided by the project athena. This protocol is based on the earlier Needham–Schroeder Symmetric Key Protocol. Kerberos protocol messages are protected against snooping and replay attacks.

Letter for filtering (will be hidden in prod) :

K

Kernel

The kernel is an essential center of a computer operating system, the core that provides basic services for all other parts of the operating system. A synonym is nucleus. A kernel can be contrasted with a shell, the outermost part of an operating system that interacts with user commands. Kernel and shell are terms used more frequently in unix operating systems than in IBM mainframe or Microsoft Windows systems.

Letter for filtering (will be hidden in prod) :

L

Logic Gate

A logic gate is an elementary building block of a digital circuit. This device is used to implement a boolean function. It performs a logical operation on one or more logical inputs, and produces a single logical output.

Letter for filtering (will be hidden in prod) :

L

Loadable Kernel Modules (LKM)

Loadable kernel modules (LKM) is an object file that contains code to extend the running kernel or the base kernel of an operating system. LKMs are usually used to add support for new hardware and/or file systems, and even for adding system calls.

Letter for filtering (will be hidden in prod) :

L

List-Based Access Control

List based access control associates a list of users and their privileges with each object, such as a file directory or individual file. Each object has a security attribute that identifies its access control list. The list has an entry for each system user with access privileges. This list is implemented differently by each operating system.