The glossary
Cybersecurity Glossary
Learn about Cybrary's impact initiatives where we focus on reducing industry-wide gatekeeping, improving security teams, and making a difference throughout the cybersecurity industry and beyond.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Letter for filtering (will be hidden in prod) :
A
Account Management User
User account management is the methods which are used to create, manage and authenticate users.
Letter for filtering (will be hidden in prod) :
A
Advanced Persistent Threat (APT)
Advanced persistent threat is a user or a program that has highly sophisticated techniques and intends to pursue them with a malicious intent.
Letter for filtering (will be hidden in prod) :
A
Application Layer
An application layer is one of the seven layers in the open-system interconnection (osi) model of the tcp/ip protocol suite. Application layer defines the way process-to-process communication happens in a network; it only offers a strong communication interface and end user services.
Letter for filtering (will be hidden in prod) :
A
Administrative Safeguards
Administrative safeguards are a special set of the HIPAA security rules. Administrative safeguards focus on internal organization, policies and procedures and the maintenance of security managers which are in place to protect sensitive patient information.
Letter for filtering (will be hidden in prod) :
A
Access Profile
An access profile is information about a user that is stored on a computer, including their password and name as well as what they are allowed access to.
Letter for filtering (will be hidden in prod) :
A
Advanced Encryption Standard (AES)
An advanced data encryption algorithm that employs key sizes of variable length in the range of 128 – 256 bits. Advanced encryption standards help protect highly sensitive data such as financial information, and classified government records.
Letter for filtering (will be hidden in prod) :
A
Alert Situation
An alert situation is when the interruption in an enterprise is not resolved even after the completion of the threshold stage, an alert situation requires the enterprise to start an escalation procedure.
Letter for filtering (will be hidden in prod) :
A
Authenticity
Authenticity is the proof or validity that a claimed identity (whether human or a resource) is real and legitimate.
Letter for filtering (will be hidden in prod) :
A
Acceptable Interruption Window 1
An acceptable interruption window is the maximum time allowed for restoration, when interrupted, of critical systems or applications of an organization, so that its business goals are not negatively affected.
Letter for filtering (will be hidden in prod) :
A
Access Rights
Access rights are the privileges or permissions awarded to a user or a program to access or alter, edit, delete the files stored on a network.