Cyber Security Glossary
Find definitions for IT security and compliance in our online glossary of key terms, acronyms, and vocabulary.
-
TermDefinition
- Access Definition: The ability and means to communicate with or otherwise interact with a system, to use system resources to handle information, to gain knowledge of the information the system contains, or to control system components and functions. Synonym(s): identity and access management
- Access Control Definition: The process of granting or denying specific requests for or attempts to: 1) obtain and use information and related information processing services; and 2) enter specific physical facilities. Related Term(s): access control mechanism
- Access Control Mechanism Definition: Security measures designed to detect and deny unauthorized access and permit authorized access to an information system or a physical facility.
- accountability"1) relates to an allocated responsibility. The responsibility can be based on regulation or agreement or through assignment as part of delegation; 2) For systems, a property that ensures that actions of an entity can be traced uniquely to the entity; 3) In a governance context, the obligation(...)
- accuracy"Closeness of computations or estimates to the exact or true values that the statistics were intended to measure."
- actionable recourse"The ability of a person to change the decision of the model through actionable input variables."
- Active Attack Definition: An actual assault perpetrated by an intentional threat source that attempts to alter a system, its resources, its data, or its operations. Related Term(s): passive attack
- Active Content Definition: Software that is able to automatically carry out or trigger actions without the explicit intervention of a user.
- Active Data Active data is information residing on the direct access storage media of computer systems, which is readily visible to the operating system and/or application software with which it was created and immediately accessible to users without undeletion, modification or reconstruction (i.e., word(...)
- Active Files Files residing on disk drives of PCs, LAN file servers, laptops, etc. Include backup files created by application software such as Microsoft Word.
- active learning"A proposed method for modifying machine learning algorithms by allowing them to specify test regions to improve their accuracy. At any point, the algorithm can choose a new point x, observe the output and incorporate the new (x, y) pair into its training base. It has been applied to neural(...)
- active learning agent"[a machine learning algorithm that can] decide what actions to take [with regards to its training data, in contrast to a passive learning agent, which is limited to a fixed policy]."
- Active Records Active records are records related to current, ongoing or in process activities and are referred to on a regular basis to respond to day-to-day operational requirements. An active record resides in native application format and is accessible for purposes of business processing with no(...)
- activity"Work that an organization performs using business processes; can be singular or compound."
- adaptive dynamic programming"An adaptive dynamic programming (or ADP) agent takes advantage of the constraints among the utilities of states by learning the transition model that connects them and solving the corresponding Markov decision process using dynamic programming."
- adaptive learning"Updating predictive models online during their operation to react to concept drifts"
- Address The term address can be used to mean: • An Internet address - a unique location on the Internet. • An e-mail address or • A web page address (also known as a URL)
- Advanced Persistent Threat Definition: An adversary that possesses sophisticated levels of expertise and significant resources which allow it to create opportunities to achieve its objectives by using multiple attack vectors (e.g., cyber, physical, and deception).
- adversarial action"actions characterised by mala fide (malicious) intent and/or bad faith."
- adversarial example"Machine learning input sample formed by applying a small but intentionally worst-case perturbation ... to a clean example, such that the perturbed input causes a learned model to output an incorrect answer."
- adversarial machine learning"A practice concerned with the design of ML algorithms that can resist security challenges, the study of the capabilities of attackers, and the understanding of attack consequences."
- Adversary Definition: An individual, group, organization, or government that conducts or has the intent to conduct detrimental activities. Related Term(s): threat agent, attacker
- adverse action notice"A notification of i) a refusal to grant credit in substantially the amount or on substantially the terms requested in an application unless the creditor makes a counteroffer (to grant credit in a different amount or on other terms) and the applicant uses or expressly accepts the credit(...)
- adverse impact ratio"A substantially different rate of selection [such as in hiring] which works to the disadvantage of members of a race, sex, or ethnic group."
- agile"a development approach that delivers software in increments by following the principles of the Manifesto for Agile Software Development."