Cyber Security Glossary
Find definitions for IT security and compliance in our online glossary of key terms, acronyms, and vocabulary.
-
TermDefinition
- human-machine teaming (HMT)"The ability of humans and AI systems to work together to undertake complex, evolving tasks in a variety of environments with seamless handoff both ways between human and AI team members. Areas of effort include developing effective policies for controlling human and machine initiatives,(...)
- human-operator-intervention"The need for human interaction in a normally fully autonomous behavior due to some extenuating circumstances."
- human subjects"a living individual about whom an investigator (whether professional or student) conducting research: (i) Obtains information or biospecimens through intervention or interaction with the individual, and uses, studies, or analyzes the information or biospecimens; or (ii) Obtains, uses,(...)
- human system integration (HSI)"methods and approaches for testing and optimizing all human-related considerations from a “whole-system” or “system-of-systems” level."
- human values"Artificial intelligence systems use data we generate in our daily lives and as such are a mirror of our interests, weaknesses, and differences. Artificial intelligence, like any other technology, is not value-neutral. Understanding the values behind the technology and deciding on how we want(...)
- hyperparameters"the parameters that are used to either configure a ML model (e.g., the penalty parameter C in a support vector machine, and the learning rate to train a neural network) or to specify the algorithm used to minimize the loss function (e.g., the activation function and optimizer types in a(...)
- hypothesis testing"A term used generally to refer to testing significance when specific alternatives to the null hypothesis are considered."
- ICT Supply Chain Threat Definition: A man-made threat achieved through exploitation of the information and communications technology (ICT) system’s supply chain, including acquisition processes.Related Term(s): supply chain, threat
- Identity and Access Management Definition: The methods and processes used to manage subjects and their authentication and authorizations to access specific objects. Synonym(s): consequence
- impact"the force of impression of one thing on another : a significant or major effect"
- impact assessment"a risk management tool that seeks to ensure an organization has sufficiently considered a system's relative benefits and costs before implementation. In the context of AI, an impact assessment helps to answer a simple question: alongside this system’s intended use, for whom could it fail?"
- impersonation"A malicious individual is able to impersonate a legitimate data subject to the data controller. The adversary forges a valid access request and goes through the identity verification enforced by the data controller. The data controller sends to the adversary the data of a legitimate data(...)
- in-processing"Techniques that modify the algorithms in order to mitigate bias during model training. Model training processes could incorporate changes to the objective (cost) function or impose a new optimization constraint."
- in-processing algorithm"A bias mitigation algorithm that is applied to a model during its training."
- in silico"carrying out some experiment by means of a computer simulation"
- Inactive Record Inactive records are those Records related to closed, completed, or concluded activities. Inactive Records are no longer routinely referenced, but must be retained in order to fulfill reporting requirements or for purposes of audit or analysis. Inactive records generally reside in a long-term(...)
- Incident Definition: An occurrence that actually or potentially results in adverse consequences to (adverse effects on) (poses a threat to) an information system or the information that the system processes, stores, or transmits and that may require a response action to mitigate the(...)
- Incident Management Definition: The management and coordination of activities associated with an actual or potential occurrence of an event that may result in adverse consequences to information or information systems.
- Incident Response Definition: In the Workforce framework, cybersecurity work where a person: Responds to crisis or urgent situations within the pertinent domain to mitigate immediate and potential threats; uses mitigation, preparedness, and response and recovery approaches, as needed, to maximize survival of(...)
- Incident Response Plan Definition: A set of predetermined and documented procedures to detect and respond to a cyber incident.
- inclusion"a cultural and environmental feeling of belonging and sense of uniqueness. It represents the extent to which employees feel valued, respected, encouraged to fully participate, and able to be their authentic selves."
- independence"Of software quality assurance (SQA), situation in which SQA is free from technical, managerial, and financial influences, intentional or unintentional"
- Indicator Definition: An occurrence or sign that an incident may have occurred or may be in progress.Related Term(s): precursor
- individual fairness"The goal of similar individuals receiving similar treatments or outcomes."
- Industrial Control System Definition: An information system used to control industrial processes such as manufacturing, product handling, production, and distribution or to control infrastructure assets.Related Term(s): Supervisory Control and Data Acquisition, Operations Technology