The glossary
Cybersecurity Glossary
Learn about Cybrary's impact initiatives where we focus on reducing industry-wide gatekeeping, improving security teams, and making a difference throughout the cybersecurity industry and beyond.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Letter for filtering (will be hidden in prod) :
B
Behavioral Outcome
A behavioral outcome is what an individual who has completed a specific training module is expected to accomplish on regular IT security job performance.
Letter for filtering (will be hidden in prod) :
B
Bastion Host
A bastion host is a special services computer on a network that is designed to withstand attacks.
Letter for filtering (will be hidden in prod) :
B
Bandwidth
Bandwidth is the volume of data or information that can pass through a network for a given period, and is usually measured in bits per second.
Letter for filtering (will be hidden in prod) :
B
Backdoor
A backdoor or trapdoor is a process to gain unauthorized access to a computer or a network. A programmer may bypass security steps and gain access to a computer by trapdoor programs, in the event of an attack on the computer system or networks. Attackers may also use such mechanisms to enter computers or networks without proper permission.
Letter for filtering (will be hidden in prod) :
B
Block Cipher
A block cipher is a method used to cipher text information by encrypting data in blocks, strings, or groups at a time rather than encrypting individual bits.
Letter for filtering (will be hidden in prod) :
B
Botnet
A botnet is a remote controlled robotic network or a network of computers set up to further attacks such as spam, virus, etc., to the target computers or networks. Attackers use various malicious programs, viruses to take control of computers and form a botnet or robotic network; the owners of such member computers may be unaware that their computer carries and forwards such a threat.
Letter for filtering (will be hidden in prod) :
C
Cybercop
A cybercop is a law enforcement officer entrusted with the responsibilities of monitoring online activities to control criminal activities online or cybercrimes.
Letter for filtering (will be hidden in prod) :
C
Cross Site Scripting (XSS)
Cross site scripting is an attack on trusted and otherwise secure websites, by injecting malicious scripting. Attackers target websites that do not filter user inputs for strings or common characters in a script.
Letter for filtering (will be hidden in prod) :
C
Cybersecurity
Cybersecurity is the processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked. It requires extensive knowledge of the possible threats such as viruses or such other malicious objects. Identity management, risk management and incident management form the crux of cyber security strategies of an organization.
Letter for filtering (will be hidden in prod) :
C
Criticality Analysis
Criticality analysis is evaluating the importance of an asset or information to an organization; and the effects its failure would have on the overall performance of the organization.