Find definitions for IT security and compliance in our online glossary of key terms, acronyms, and vocabulary.

AJAX progress indicator
  • Term
    Definition
  • Definition: A man-made threat achieved through exploitation of the information and communications technology (ICT) system’s supply chain, including acquisition processes.Related Term(s): supply chain, threat
  • Definition: The methods and processes used to manage subjects and their authentication and authorizations to access specific objects.  Synonym(s): consequence
  • "the force of impression of one thing on another : a significant or major effect"
  • "a risk management tool that seeks to ensure an organization has sufficiently considered a system's relative benefits and costs before implementation. In the context of AI, an impact assessment helps to answer a simple question: alongside this system’s intended use, for whom could it fail?"
  • "A malicious individual is able to impersonate a legitimate data subject to the data controller. The adversary forges a valid access request and goes through the identity verification enforced by the data controller. The data controller sends to the adversary the data of a legitimate data(...)
  • "Techniques that modify the algorithms in order to mitigate bias during model training. Model training processes could incorporate changes to the objective (cost) function or impose a new optimization constraint."
  • "A bias mitigation algorithm that is applied to a model during its training."
  • "carrying out some experiment by means of a computer simulation"
  • Inactive records are those Records related to closed, completed, or concluded activities. Inactive Records are no longer routinely referenced, but must be retained in order to fulfill reporting requirements or for purposes of audit or analysis. Inactive records generally reside in a long-term(...)
  • Definition: An occurrence that actually or potentially results in adverse consequences to (adverse effects on) (poses a threat to) an information system or the information that the system processes, stores, or transmits and that may require a response action to mitigate the(...)
  • Definition: The management and coordination of activities associated with an actual or potential occurrence of an event that may result in adverse consequences to information or information systems.
  • Definition: In the Workforce framework, cybersecurity work where a person: Responds to crisis or urgent situations within the pertinent domain to mitigate immediate and potential threats; uses mitigation, preparedness, and response and recovery approaches, as needed, to maximize survival of(...)
  • Definition: A set of predetermined and documented procedures to detect and respond to a cyber incident.
  • "a cultural and environmental feeling of belonging and sense of uniqueness. It represents the extent to which employees feel valued, respected, encouraged to fully participate, and able to be their authentic selves."
  • "Of software quality assurance (SQA), situation in which SQA is free from technical, managerial, and financial influences, intentional or unintentional"
  • Definition: An occurrence or sign that an incident may have occurred or may be in progress.Related Term(s): precursor
  • "The goal of similar individuals receiving similar treatments or outcomes."
  • Definition: An information system used to control industrial processes such as manufacturing, product handling, production, and distribution or to control infrastructure assets.Related Term(s): Supervisory Control and Data Acquisition, Operations Technology
  • "The stage of ML in which a model is applied to a task. For example, a classifier model produces the classification of a test sample."
  • Definition: Any information technology, equipment, or interconnected system or subsystem of equipment that processes, transmits, receives, or interchanges data or information.Related Term(s): information technology
  • Definition: The measures that protect and defend information and information systems by ensuring their availability, integrity, and confidentiality.Related Term(s): information security
  • Definition: In the NICE Framework, cybersecurity work where a person: Oversees, evaluates, and supports the documentation, validation, and accreditation processes necessary to assure that new IT systems meet the organization's information assurance and security requirements; ensures(...)
  • "One of the three components of a model. This component delivers assumptions and data to the model."
  • "preservation of confidentiality, integrity and availability of information; in addition, other properties, such as authenticity, accountability, non-repudiation, and reliability can also be involved."
  • Definition: An aggregate of directives, regulations, rules, and practices that prescribe how an organization manages, protects, and distributes information.Related Term(s): security policy