Coming mid-July
Get 3 months of access for the price of 2!
Celebrate Cybersecurity Awareness Month with our buy 2, get 1 offer. Valid until October 31. Elevate your skills today!
October Special
Get 3 months of access for the price of 2!
Celebrate Cybersecurity Awareness Month with our buy 2, get 1 offer!
Celebrate Cybersecurity Awareness Month with our buy 2, get 1 offer. Valid until October 31. Elevate your skills today!
Valid until October 31. Elevate your skills today!
Buy now
The glossary

Cybersecurity Glossary

Learn about Cybrary's impact initiatives where we focus on reducing industry-wide gatekeeping, improving security teams, and making a difference throughout the cybersecurity industry and beyond.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Letter for filtering (will be hidden in prod) :

A

Account Management User

User account management is the methods which are used to create, manage and authenticate users.

Letter for filtering (will be hidden in prod) :

A

Advanced Persistent Threat (APT)

Advanced persistent threat is a user or a program that has highly sophisticated techniques and intends to pursue them with a malicious intent.

Letter for filtering (will be hidden in prod) :

A

Application Layer

An application layer is one of the seven layers in the open-system interconnection (osi) model of the tcp/ip protocol suite. Application layer defines the way process-to-process communication happens in a network; it only offers a strong communication interface and end user services.

Letter for filtering (will be hidden in prod) :

A

Administrative Safeguards

Administrative safeguards are a special set of the HIPAA security rules. Administrative safeguards focus on internal organization, policies and procedures and the maintenance of security managers which are in place to protect sensitive patient information.

Letter for filtering (will be hidden in prod) :

A

Access Profile

An access profile is information about a user that is stored on a computer, including their password and name as well as what they are allowed access to.

Letter for filtering (will be hidden in prod) :

A

Advanced Encryption Standard (AES)

An advanced data encryption algorithm that employs key sizes of variable length in the range of 128 – 256 bits. Advanced encryption standards help protect highly sensitive data such as financial information, and classified government records.

Letter for filtering (will be hidden in prod) :

A

Alert Situation

An alert situation is when the interruption in an enterprise is not resolved even after the completion of the threshold stage, an alert situation requires the enterprise to start an escalation procedure.

Letter for filtering (will be hidden in prod) :

A

Authenticity

Authenticity is the proof or validity that a claimed identity (whether human or a resource) is real and legitimate.

Letter for filtering (will be hidden in prod) :

A

Acceptable Interruption Window 1

An acceptable interruption window is the maximum time allowed for restoration, when interrupted, of critical systems or applications of an organization, so that its business goals are not negatively affected.

Letter for filtering (will be hidden in prod) :

A

Access Rights

Access rights are the privileges or permissions awarded to a user or a program to access or alter, edit, delete the files stored on a network.