Coming mid-July
Get 3 months of access for the price of 2!
Celebrate Cybersecurity Awareness Month with our buy 2, get 1 offer. Valid until October 31. Elevate your skills today!
October Special
Get 3 months of access for the price of 2!
Celebrate Cybersecurity Awareness Month with our buy 2, get 1 offer!
Celebrate Cybersecurity Awareness Month with our buy 2, get 1 offer. Valid until October 31. Elevate your skills today!
Valid until October 31. Elevate your skills today!
Buy now
The glossary

Cybersecurity Glossary

Learn about Cybrary's impact initiatives where we focus on reducing industry-wide gatekeeping, improving security teams, and making a difference throughout the cybersecurity industry and beyond.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Letter for filtering (will be hidden in prod) :

L

Layer 2 Tunneling Protocol (L2TP)

An extension of the point-to-point tunneling protocol used by an internet service provider to enable the operation of a virtual private network over the internet.

Letter for filtering (will be hidden in prod) :

L

Lightweight Directory Access Protocol (LDAP)

Lightweight directory access protocol (LDAP) is an open, vendor-neutral, industry standard application protocol used for accessing and maintaining distributed directory information services over an IP network.

Letter for filtering (will be hidden in prod) :

L

Loopback Access

A loopback address is a pseudo address that sends outgoing signals back to the same computer for testing. In a TCP/IP network, the loopback IP address is 127.0.0.1, and pinging this address always returns a reply unless the firewall prevents it.

Letter for filtering (will be hidden in prod) :

L

Layer 2 Forwarding Protocol (L2F)

Layer 2 forwarding protocol (L2F) is an internet protocol, originally developed by Cisco corporation, that uses tunneling of PPP over IP to create a virtual extension of a dial-up link across a network, initiated by the dial-up server and transparent to the dial-up user.

Letter for filtering (will be hidden in prod) :

L

Log Clipping

Log clipping is the selective removal of log entries from a system log to hide a compromise.

Letter for filtering (will be hidden in prod) :

L

Legion

A legion is a software used to detect unprotected shares.

Letter for filtering (will be hidden in prod) :

L

Logic Bombs

A logic bomb is a piece of code that is deliberately inserted into a system to trigger a malicious program. Viruses and worms often contain logic bombs that execute a certain payload at a pre-defined time or when some other condition is met. Some viruses attack their host systems on specific dates, such as friday the 13th or april fools’ day. Trojans that activate on certain dates are often called time bombs.

Letter for filtering (will be hidden in prod) :

L

Least Privilege

Least privilege is the principle of allowing users or applications the least amount of permissions necessary to perform their intended function.

Letter for filtering (will be hidden in prod) :

L

Lattice Techniques

Lattice techniques use security designations to determine access to information.

Letter for filtering (will be hidden in prod) :

L

Link-State

Link-state routing protocols are one of the two main classes of routing protocols used in packet switching networks. The link-state protocol is performed by every switching node in the network. Every node creates a map of the connectivity to the network (in the form of a graph) displaying all the nodes that are connected to other nodes. Each node then calculates the next best logical path from it to every possible destination in the network. The collection of these best paths forms the node’s routing table.