This is a cybersecurity glossary that I created to help me study for the CompTIA Security+ exam. It is a collection of terms and definitions that I found useful while studying for the exam. I hope you find it useful as well.
This interactive glossary is designed to help cybersecurity professionals quickly reference key terms, concepts, and techniques across the field. Built with a clean, dark-themed interface, it features:
- Search functionality (Ctrl/Cmd + K)
- Filtering by category
- Expand/collapse all definitions
- Grid/list view toggle
| Category | Count | Focus Area |
|---|---|---|
| Attacks & Threats | ~35 | Malware, exploits, social engineering, attack vectors |
| Defense & Protection | ~15 | Hardening, firewalls, patching, monitoring |
| Cryptography | ~20 | Encryption, hashing, PKI, digital signatures |
| Authentication & Access | ~15 | MFA, SSO, RBAC, access control |
| Networking & VPN | ~15 | IPsec, VPN types, protocols, network security |
| Data & Privacy | ~20 | PII, PHI, GDPR, HIPAA, data integrity |
| Browser & Web | ~15 | Cookies, extensions, HTTPS, browser security |
| General Concepts | ~10 | CIA triad, firmware, DRM, digital accounting |
- Malware types: Viruses, Worms, Trojans, Ransomware, Spyware, Adware
- Attack methods: Phishing, Social Engineering, Man-in-the-Middle, DDoS
- Password attacks: Brute Force, Dictionary, Rainbow Attacks
- Advanced threats: Polymorphic Viruses, Stealth Viruses, Replay Attacks
- Security tools: Firewalls, Antivirus, File Integrity Monitoring
- Best practices: Hardening, Patch Management, Strong Passwords
- System security: Secure Boot, TPM, Autorun controls
- Monitoring: Logs, Auditing, Digital Accounting
- Encryption types: Symmetric, Asymmetric, Drive Encryption
- Key concepts: Cipher, Ciphertext, Plain Text, Decryption Key
- PKI: Digital Certificates, Certificate Authorities, SSL/TLS
- Hashing: Cryptographic Hash, Password Hash, Digital Signatures
- Protocols: IPsec, AH, ESP, IKE
- Methods: SSO, 2FA, MFA, Smart Card Authentication
- Factors: Something you know/have/are
- Access Control: RBAC, ROLP, Authorization
- Concepts: Non-repudiation, Trusted Entities, Access Tokens
- VPN types: Site-to-Site, Host-to-Site, Host-to-Host
- IPsec modes: Transport Mode, Tunnel Mode
- Network types: Open Networks, Public WiFi
- Protocols: HTTP, HTTPS, IPsec, IKE
- Security: Anti-Replay Protection, Security Associations
- Data classifications: PII, PHI, Confidential Information
- Regulations: GDPR, HIPAA, DMCA
- Data states: Data at Rest, Data in Motion/Transit
- Concepts: Data Integrity (Physical/Logical), Data Breaches
- Analytics: Data Capture, Correlation, Meaningful Reporting
- Browser components: Extensions, Add-ons, Plug-ins, Toolbars
- Tracking: Cookies (Authentication, Session, Third-Party, Zombie)
- Privacy: Private Browsing, Incognito Mode, Cache
- Security: HTTPS Websites, SSL Certificates, ActiveX, Java
- Security frameworks: CIA Triad
- Hardware: BIOS, UEFI, Firmware
- Legal: DMCA, DRM, Intellectual Property
- Career: Entry-Level, Median, Range
- Real-time search across terms and definitions
- 8 category filters with color-coded pills
- Search highlighting in both terms and definitions
- Keyboard shortcut:
Ctrl+Kto focus search - Live result count with visual feedback
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ TOTAL TERMS: 140+ โ
โ CATEGORIES: 8 โ
โ EXPANDED: 0 โ
โ SHOWING: 140 โ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
| View | Icon | Description |
|---|---|---|
| Grid View | โ |
Card-based layout with term previews |
| List View | โฐ |
Compact list for quick scanning |
- Expandable definitions with click-to-expand
- Category color-coding with left border indicator
- Definition preview (collapsed view)
- See-also cross-references for related terms
- Copy button for easy definition sharing
- Highlighted search terms in results
- Staggered card animations for smooth loading
| Category | Color | Hex | Usage |
|---|---|---|---|
| Attacks & Threats | Red | #f43f5e |
Malware, exploits, attack vectors |
| Defense & Protection | Green | #22c55e |
Security controls, hardening |
| Cryptography | Blue | #38bdf8 |
Encryption, hashing, PKI |
| Authentication & Access | Purple | #c084fc |
MFA, SSO, access control |
| Networking & VPN | Orange | #fb923c |
IPsec, VPN types, protocols |
| Data & Privacy | Teal | #2dd4bf |
PII, PHI, regulations |
| Browser & Web | Yellow | #facc15 |
Cookies, extensions, HTTPS |
| General Concepts | Gray | #94a3b8 |
Frameworks, hardware, career |
- Visit ๐ https://willie-conway.github.io/Cybersecurity-Field-Reference/
- Browse terms by category using the color-coded filter bar
- Search using the search bar or
Ctrl+Kshortcut - Click any card to expand the full definition
- Copy definitions with the copy button
- Toggle views between grid and list layouts
- Expand/Collapse All for bulk reading
- Use A-Z grouping to navigate alphabetically
- Quick reference during security assessments
- Look up attack vectors for threat modeling
- Review encryption concepts for architecture design
- Share definitions with team members
- Prepare for client meetings and presentations
- Study for certification exams (Security+, CISSP, CEH)
- Look up unfamiliar terms while reading
- Build vocabulary for interviews
- Quick reference during study sessions
- Cross-reference related concepts via "See also" links
- Understand cybersecurity landscape
- Learn industry terminology
- Navigate between related concepts
- Build foundational knowledge
- Prepare for entry-level roles
- Classroom reference tool
- Assignment resource
- Study guide material
- Quiz preparation
- Concept mapping exercises
- Dark background (
#080b10) for reduced eye strain โ SOC standard - Red accent (
#f43f5e) for threat/attack categories - Scan line animation for authentic terminal feel
- Grid background for technical depth
- Threat panel with live statistics
- Blinking cursor for authenticity
- IBM Plex Mono โ Monospace for stats, tags, and code-like elements
- IBM Plex Sans โ Body text for readability
- IBM Plex Sans Condensed โ Bold headers for impact
- Hover effects with category-specific glow
- Expansion animations for definitions
- Copy feedback with success state
- Active filter highlighting
- Staggered card animations (14ms increments)
- Sweep line animation across screen
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ Cybersecurity Field Reference โ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโค
โ โ
โ โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ โ
โ โ Data Layer โ โ
โ โ โข TERMS array (140+ entries)โ โ
โ โ โข Categories: 8 โ โ
โ โ โข Cross-references (see-also)โ โ
โ โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ โ
โ โ
โ โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ โ
โ โ Filter Layer โ โ
โ โ โข Category pills (8) โ โ
โ โ โข Search filter (debounced) โ โ
โ โ โข Combined filtering logic โ โ
โ โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ โ
โ โ
โ โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ โ
โ โ View Layer โ โ
โ โ โข Grid view (cards) โ โ
โ โ โข List view (compact) โ โ
โ โ โข A-Z grouping โ โ
โ โ โข Expandable cards โ โ
โ โ โข Copy functionality โ โ
โ โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ โ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
// Core filtering
getFiltered() // Apply category and search filters
updateFooter() // Update category counts in footer
// Search & Highlight
hl(text, query) // Highlight search terms in results
esc(s) // Sanitize HTML for security
// Rendering
render() // Main render function with A-Z grouping
groups[letter] // Group terms by first letter
// Interactivity
copyDef(e, btn, text) // Copy definition to clipboard
expand/collapse // Toggle definition visibility
allOpen toggle // Expand/collapse all cards
// Keyboard
Ctrl+K // Focus search input{
term: "Ransomware", // Term name
cat: "attack", // Category ID (8 options)
def: "Software that locks a system...", // Full definition
see: "See also: Malware, Encryption" // Optional cross-reference
}| Category | ID | Count | Key Terms |
|---|---|---|---|
| Attacks & Threats | attack |
~35 | Ransomware, Phishing, DDoS, Malware, Trojan |
| Defense & Protection | defense |
~15 | Firewall, Hardening, Patches, FIM |
| Cryptography | crypto |
~20 | Encryption, Hashing, PKI, Digital Signature |
| Authentication & Access | auth |
~15 | MFA, SSO, RBAC, Biometrics |
| Networking & VPN | network |
~15 | IPsec, VPN, Open Network, HTTPS |
| Data & Privacy | data |
~20 | PII, PHI, GDPR, Data Breach |
| Browser & Web | browser |
~15 | Cookies, Extensions, HTTPS, Private Browsing |
| General Concepts | general |
~10 | CIA Triad, BIOS, UEFI, DRM |
| Browser | Support |
|---|---|
| Chrome | โ Full support |
| Firefox | โ Full support |
| Safari | โ Full support |
| Edge | โ Full support |
| Opera | โ Full support |
| Mobile Chrome | โ Responsive |
| Mobile Safari | โ Responsive |
- Load Time: < 0.8 seconds (zero external dependencies)
- Memory Usage: < 25 MB
- Search Speed: Instant (client-side filtering with debounce)
- Network: Zero requests after initial load
The Cybersecurity Field Reference is completely safe:
- โ No data collection
- โ No external scripts
- โ No tracking
- โ No cookies
- โ No network requests
- โ Pure static HTML/CSS/JS
MIT License โ see LICENSE file for details.
- CompTIA for Security+ certification framework
- (ISC)ยฒ for CISSP common body of knowledge
- MITRE ATT&CK for attack classification
- NIST for cybersecurity standards and definitions
- OWASP for web security concepts
- GitHub Issues: Create an issue
- Website: https://willie-conway.github.io/Cybersecurity-Field-Reference/
- Add pronunciation guides for technical terms
- Include acronym expansions
- Add related frameworks (NIST, ISO 27001)
- Include exam mapping (which terms appear on which certs)
- Add dark/light theme toggle
- Export glossary as PDF
- Add quiz mode for self-testing
- Include real-world breach examples
Last updated: March 2026








