Skip to content

Willie-Conway/CYBERSECURITY-FIELD-REFERENCE-Glossary

Folders and files

NameName
Last commit message
Last commit date

Latest commit

ย 

History

6 Commits
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 

Repository files navigation

๐Ÿ“– Cybersecurity โ€” Field Reference Glossary

alt text

Cybersecurity Field Reference HTML5 CSS3 JavaScript CompTIA Security+


Overview

This is a cybersecurity glossary that I created to help me study for the CompTIA Security+ exam. It is a collection of terms and definitions that I found useful while studying for the exam. I hope you find it useful as well.

๐Ÿ“– About This Project

This interactive glossary is designed to help cybersecurity professionals quickly reference key terms, concepts, and techniques across the field. Built with a clean, dark-themed interface, it features:

  • Search functionality (Ctrl/Cmd + K)
  • Filtering by category
  • Expand/collapse all definitions
  • Grid/list view toggle

โœจ Key Features

๐Ÿ“š Comprehensive Term Database (140+ Terms)

Category Count Focus Area
Attacks & Threats ~35 Malware, exploits, social engineering, attack vectors
Defense & Protection ~15 Hardening, firewalls, patching, monitoring
Cryptography ~20 Encryption, hashing, PKI, digital signatures
Authentication & Access ~15 MFA, SSO, RBAC, access control
Networking & VPN ~15 IPsec, VPN types, protocols, network security
Data & Privacy ~20 PII, PHI, GDPR, HIPAA, data integrity
Browser & Web ~15 Cookies, extensions, HTTPS, browser security
General Concepts ~10 CIA triad, firmware, DRM, digital accounting

๐ŸŽฏ Category Coverage

Attacks & Threats โš”๏ธ

  • Malware types: Viruses, Worms, Trojans, Ransomware, Spyware, Adware
  • Attack methods: Phishing, Social Engineering, Man-in-the-Middle, DDoS
  • Password attacks: Brute Force, Dictionary, Rainbow Attacks
  • Advanced threats: Polymorphic Viruses, Stealth Viruses, Replay Attacks

alt text

Defense & Protection ๐Ÿ›ก๏ธ

  • Security tools: Firewalls, Antivirus, File Integrity Monitoring
  • Best practices: Hardening, Patch Management, Strong Passwords
  • System security: Secure Boot, TPM, Autorun controls
  • Monitoring: Logs, Auditing, Digital Accounting

alt text

Cryptography ๐Ÿ”

  • Encryption types: Symmetric, Asymmetric, Drive Encryption
  • Key concepts: Cipher, Ciphertext, Plain Text, Decryption Key
  • PKI: Digital Certificates, Certificate Authorities, SSL/TLS
  • Hashing: Cryptographic Hash, Password Hash, Digital Signatures
  • Protocols: IPsec, AH, ESP, IKE

alt text

Authentication & Access ๐Ÿ”‘

  • Methods: SSO, 2FA, MFA, Smart Card Authentication
  • Factors: Something you know/have/are
  • Access Control: RBAC, ROLP, Authorization
  • Concepts: Non-repudiation, Trusted Entities, Access Tokens

alt text

Networking & VPN ๐ŸŒ

  • VPN types: Site-to-Site, Host-to-Site, Host-to-Host
  • IPsec modes: Transport Mode, Tunnel Mode
  • Network types: Open Networks, Public WiFi
  • Protocols: HTTP, HTTPS, IPsec, IKE
  • Security: Anti-Replay Protection, Security Associations

alt text

Data & Privacy ๐Ÿ“Š

  • Data classifications: PII, PHI, Confidential Information
  • Regulations: GDPR, HIPAA, DMCA
  • Data states: Data at Rest, Data in Motion/Transit
  • Concepts: Data Integrity (Physical/Logical), Data Breaches
  • Analytics: Data Capture, Correlation, Meaningful Reporting

alt text

Browser & Web ๐ŸŒ

  • Browser components: Extensions, Add-ons, Plug-ins, Toolbars
  • Tracking: Cookies (Authentication, Session, Third-Party, Zombie)
  • Privacy: Private Browsing, Incognito Mode, Cache
  • Security: HTTPS Websites, SSL Certificates, ActiveX, Java

alt text

General Concepts ๐Ÿ“Œ

  • Security frameworks: CIA Triad
  • Hardware: BIOS, UEFI, Firmware
  • Legal: DMCA, DRM, Intellectual Property
  • Career: Entry-Level, Median, Range

alt text

๐Ÿ” Advanced Search & Filtering

  • Real-time search across terms and definitions
  • 8 category filters with color-coded pills
  • Search highlighting in both terms and definitions
  • Keyboard shortcut: Ctrl+K to focus search
  • Live result count with visual feedback

๐Ÿ“Š Interactive Statistics

โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
โ”‚  TOTAL TERMS: 140+                   โ”‚
โ”‚  CATEGORIES: 8                        โ”‚
โ”‚  EXPANDED: 0                          โ”‚
โ”‚  SHOWING: 140                         โ”‚
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜

๐ŸŽจ Dual View Modes

View Icon Description
Grid View โŠž Card-based layout with term previews
List View โ˜ฐ Compact list for quick scanning

๐Ÿ“– Term Card Features

  • Expandable definitions with click-to-expand
  • Category color-coding with left border indicator
  • Definition preview (collapsed view)
  • See-also cross-references for related terms
  • Copy button for easy definition sharing
  • Highlighted search terms in results
  • Staggered card animations for smooth loading

๐ŸŽจ Category Color Coding

Category Color Hex Usage
Attacks & Threats Red #f43f5e Malware, exploits, attack vectors
Defense & Protection Green #22c55e Security controls, hardening
Cryptography Blue #38bdf8 Encryption, hashing, PKI
Authentication & Access Purple #c084fc MFA, SSO, access control
Networking & VPN Orange #fb923c IPsec, VPN types, protocols
Data & Privacy Teal #2dd4bf PII, PHI, regulations
Browser & Web Yellow #facc15 Cookies, extensions, HTTPS
General Concepts Gray #94a3b8 Frameworks, hardware, career

๐Ÿš€ Quick Start

  1. Visit ๐ŸŒ https://willie-conway.github.io/Cybersecurity-Field-Reference/
  2. Browse terms by category using the color-coded filter bar
  3. Search using the search bar or Ctrl+K shortcut
  4. Click any card to expand the full definition
  5. Copy definitions with the copy button
  6. Toggle views between grid and list layouts
  7. Expand/Collapse All for bulk reading
  8. Use A-Z grouping to navigate alphabetically

๐ŸŽฏ Use Cases

For Security Professionals ๐Ÿ’ผ

  • Quick reference during security assessments
  • Look up attack vectors for threat modeling
  • Review encryption concepts for architecture design
  • Share definitions with team members
  • Prepare for client meetings and presentations

For Students ๐Ÿ“š

  • Study for certification exams (Security+, CISSP, CEH)
  • Look up unfamiliar terms while reading
  • Build vocabulary for interviews
  • Quick reference during study sessions
  • Cross-reference related concepts via "See also" links

For Career-Changers ๐Ÿš€

  • Understand cybersecurity landscape
  • Learn industry terminology
  • Navigate between related concepts
  • Build foundational knowledge
  • Prepare for entry-level roles

For Educators ๐Ÿซ

  • Classroom reference tool
  • Assignment resource
  • Study guide material
  • Quiz preparation
  • Concept mapping exercises

๐ŸŽจ Design Philosophy

Security Operations Center Aesthetic ๐Ÿ–ฅ๏ธ

  • Dark background (#080b10) for reduced eye strain โ€” SOC standard
  • Red accent (#f43f5e) for threat/attack categories
  • Scan line animation for authentic terminal feel
  • Grid background for technical depth
  • Threat panel with live statistics
  • Blinking cursor for authenticity

Typography โœ๏ธ

  • IBM Plex Mono โ€” Monospace for stats, tags, and code-like elements
  • IBM Plex Sans โ€” Body text for readability
  • IBM Plex Sans Condensed โ€” Bold headers for impact

Interactive Elements ๐ŸŽฎ

  • Hover effects with category-specific glow
  • Expansion animations for definitions
  • Copy feedback with success state
  • Active filter highlighting
  • Staggered card animations (14ms increments)
  • Sweep line animation across screen

๐Ÿ› ๏ธ Technical Implementation

Architecture

โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
โ”‚   Cybersecurity Field Reference      โ”‚
โ”œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ค
โ”‚                                     โ”‚
โ”‚  โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”   โ”‚
โ”‚  โ”‚      Data Layer             โ”‚   โ”‚
โ”‚  โ”‚  โ€ข TERMS array (140+ entries)โ”‚   โ”‚
โ”‚  โ”‚  โ€ข Categories: 8             โ”‚   โ”‚
โ”‚  โ”‚  โ€ข Cross-references (see-also)โ”‚   โ”‚
โ”‚  โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜   โ”‚
โ”‚                                     โ”‚
โ”‚  โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”   โ”‚
โ”‚  โ”‚      Filter Layer           โ”‚   โ”‚
โ”‚  โ”‚  โ€ข Category pills (8)        โ”‚   โ”‚
โ”‚  โ”‚  โ€ข Search filter (debounced) โ”‚   โ”‚
โ”‚  โ”‚  โ€ข Combined filtering logic  โ”‚   โ”‚
โ”‚  โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜   โ”‚
โ”‚                                     โ”‚
โ”‚  โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”   โ”‚
โ”‚  โ”‚      View Layer             โ”‚   โ”‚
โ”‚  โ”‚  โ€ข Grid view (cards)         โ”‚   โ”‚
โ”‚  โ”‚  โ€ข List view (compact)       โ”‚   โ”‚
โ”‚  โ”‚  โ€ข A-Z grouping              โ”‚   โ”‚
โ”‚  โ”‚  โ€ข Expandable cards          โ”‚   โ”‚
โ”‚  โ”‚  โ€ข Copy functionality        โ”‚   โ”‚
โ”‚  โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜   โ”‚
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜

Key Functions

// Core filtering
getFiltered()                 // Apply category and search filters
updateFooter()                 // Update category counts in footer

// Search & Highlight
hl(text, query)                // Highlight search terms in results
esc(s)                         // Sanitize HTML for security

// Rendering
render()                       // Main render function with A-Z grouping
groups[letter]                  // Group terms by first letter

// Interactivity
copyDef(e, btn, text)          // Copy definition to clipboard
expand/collapse                // Toggle definition visibility
allOpen toggle                 // Expand/collapse all cards

// Keyboard
Ctrl+K                         // Focus search input

Data Structure

{
  term: "Ransomware",                    // Term name
  cat: "attack",                          // Category ID (8 options)
  def: "Software that locks a system...", // Full definition
  see: "See also: Malware, Encryption"    // Optional cross-reference
}

๐Ÿ“Š Category Breakdown

Category ID Count Key Terms
Attacks & Threats attack ~35 Ransomware, Phishing, DDoS, Malware, Trojan
Defense & Protection defense ~15 Firewall, Hardening, Patches, FIM
Cryptography crypto ~20 Encryption, Hashing, PKI, Digital Signature
Authentication & Access auth ~15 MFA, SSO, RBAC, Biometrics
Networking & VPN network ~15 IPsec, VPN, Open Network, HTTPS
Data & Privacy data ~20 PII, PHI, GDPR, Data Breach
Browser & Web browser ~15 Cookies, Extensions, HTTPS, Private Browsing
General Concepts general ~10 CIA Triad, BIOS, UEFI, DRM

๐ŸŒ Browser Compatibility

Browser Support
Chrome โœ… Full support
Firefox โœ… Full support
Safari โœ… Full support
Edge โœ… Full support
Opera โœ… Full support
Mobile Chrome โœ… Responsive
Mobile Safari โœ… Responsive

๐Ÿšฆ Performance

  • Load Time: < 0.8 seconds (zero external dependencies)
  • Memory Usage: < 25 MB
  • Search Speed: Instant (client-side filtering with debounce)
  • Network: Zero requests after initial load

๐Ÿ›ก๏ธ Security Notes

The Cybersecurity Field Reference is completely safe:

  • โœ… No data collection
  • โœ… No external scripts
  • โœ… No tracking
  • โœ… No cookies
  • โœ… No network requests
  • โœ… Pure static HTML/CSS/JS

๐Ÿ“ License

MIT License โ€” see LICENSE file for details.


๐Ÿ™๐Ÿฟ Acknowledgments

  • CompTIA for Security+ certification framework
  • (ISC)ยฒ for CISSP common body of knowledge
  • MITRE ATT&CK for attack classification
  • NIST for cybersecurity standards and definitions
  • OWASP for web security concepts

๐Ÿ“ง Contact


๐Ÿ Future Enhancements

  • Add pronunciation guides for technical terms
  • Include acronym expansions
  • Add related frameworks (NIST, ISO 27001)
  • Include exam mapping (which terms appear on which certs)
  • Add dark/light theme toggle
  • Export glossary as PDF
  • Add quiz mode for self-testing
  • Include real-world breach examples

Last updated: March 2026

About

Comprehensive cybersecurity field reference glossary featuring 140+ terms across 8 critical security domains. Built as a professional-grade reference tool for cybersecurity practitioners, students, and career-changers. Includes detailed definitions, cross-references, and real-world context for attacks, defenses, cryptography, authentication, etc๐Ÿ“š.

Topics

Resources

License

Stars

Watchers

Forks

Contributors

Languages