Coming mid-July
Get 3 months of access for the price of 2!
Celebrate Cybersecurity Awareness Month with our buy 2, get 1 offer. Valid until October 31. Elevate your skills today!
October Special
Get 3 months of access for the price of 2!
Celebrate Cybersecurity Awareness Month with our buy 2, get 1 offer!
Celebrate Cybersecurity Awareness Month with our buy 2, get 1 offer. Valid until October 31. Elevate your skills today!
Valid until October 31. Elevate your skills today!
Buy now
The glossary

Cybersecurity Glossary

Learn about Cybrary's impact initiatives where we focus on reducing industry-wide gatekeeping, improving security teams, and making a difference throughout the cybersecurity industry and beyond.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Letter for filtering (will be hidden in prod) :

V

Voice Firewall

A voice firewall is a physical discontinuity in a voice network that monitors, alerts, and controls inbound and outbound voice network activity based on user-defined call admission control (CAC) policies, voice application layer security threats or unauthorized service use violations.

Letter for filtering (will be hidden in prod) :

V

Virus

A virus is a hidden, self-replicating section of a computer software or program, usually malicious logic, that propagates by infecting, i.e., inserting a copy of itself into and becoming part of another program. A virus cannot run by itself and requires that its host program be run to make the virus active.

Letter for filtering (will be hidden in prod) :

V

Voice Intrusion Prevention System (VIPS)

A voice intrusion prevention system (VIPS) is a security management system for voice networks that monitors voice traffic for multiple calling patterns or attack/abuse signatures to proactively detect and prevent toll fraud, denial of service, telecom attacks, service abuse, and other anomalous activities.

Letter for filtering (will be hidden in prod) :

W

Windowing

Windowing is the process of taking a small subset of a larger dataset for processing and analysis. In this approach, the rectangular window involves simply truncating the dataset before and after the window, while not modifying the contents of the window at all.

Letter for filtering (will be hidden in prod) :

W

Warchalking

Warchalking is marking areas, usually on sidewalks with chalk, that receive wireless signals to advertise an open wi-fi network. Warchalking was inspired by hobo symbols and was conceived by a group of friends in June 2002. They were published by Matt Jones who designed the set of icons and produced a downloadable document containing them.

Letter for filtering (will be hidden in prod) :

W

Windowing System

A windowing system is a system that is used for sharing a computer’s graphical display presentation resources among multiple applications at the same time. A windowing system uses a window manager to keep track of where each window is located on the display screen and its size and status. A windowing system doesn’t just manage the windows but also other forms of graphical user interface entities.

Letter for filtering (will be hidden in prod) :

W

World Wide Web (www)

The world wide web (www) is the global, hypermedia-based collection of information and services that is available on internet servers and is accessed by browsers using hypertext transfer protocol and other information retrieval mechanisms.

Letter for filtering (will be hidden in prod) :

W

Web of Trust

The web of trust is a concept that is used in PGP, gnupg, and other openpgp-compatible systems to establish the authenticity of the binding between a public key and its owner. Its decentralized trust model is an alternative to the centralized trust model of a public key infrastructure (PKI), which relies exclusively on a certificate authority.

Letter for filtering (will be hidden in prod) :

W

War Dialer

A war dialer is a computer program that automatically dials a series of telephone numbers to locate lines connected to computer systems, and catalogs those numbers so that a cracker or attacker can try to break into the systems.

Letter for filtering (will be hidden in prod) :

W

Wiretapping

Wiretapping is the process of monitoring and recording data that is flowing between two points in a communication system.