Cyber Security Glossary
Find definitions for IT security and compliance in our online glossary of key terms, acronyms, and vocabulary.
-
TermDefinition
- interpretability"The ability to understand the value and accuracy of system output. Interpretability refers to the extent to which a cause and effect can be observed within �a system or to which what is going to happen given a change in input or algorithmic parameters can be predicted."
- interpretable model"An interpretable machine learning model obeys a domain-specific set of constraints to allow it (or its predictions, or the data) to be more easily understood by humans. These constraints can differ dramatically depending on the domain."
- intervenability"the property that intervention is possible concerning all ongoing or planned privacy relevant data processing[; ...] the data subjects themselves should be able to intervene with regards to the processing of their own data ... [to ensure] that data subjects have the ability to control how(...)
- Intranet A network of interconnecting smaller private networks that are isolated from the public Internet.
- Intrusion Definition: An unauthorized act of bypassing the security mechanisms of a network or information system.Synonym(s): penetration
- Intrusion Detection Definition: The process and methods for analyzing information from networks and information systems to determine if a security breach or security violation has occurred.
- Investigate Definition: a NICE Framework category consisting of specialty areas responsible for the investigation of cyber events and/or crimes of IT systems, networks, and digital evidence
- Investigation Definition: A systematic and formal inquiry into a qualified threat or incident using digital forensics and perhaps other traditional criminal inquiry techniques to determine the events that transpired and to collect evidence.
- IP address A string of four numbers separated by periods used to represent a computer on the Internet.
- IS/IT (Information Systems or Information Technology) Usually refers to the people who make computers and computer systems run.
- ISP (Internet Service Provider) A business that delivers access to the Internet.
- JPEG (Joint Photographic Experts Group) An image compression standard for photographs.
- Key Definition: The numerical value used to control cryptographic operations, such as decryption, encryption, signature generation, or signature verification. Related Term(s): private key, public key, secret key, symmetric key
- Key Pair Definition: Two mathematically related keys having the property that one key can be used to encrypt a message that can only be decrypted using the other key.Related Term(s): private key, public key
- Key Resource Definition: A publicly or privately controlled asset necessary to sustain continuity of government and/or economic operations, or an asset that is of great historical significance.Related Term(s): critical infrastructure
- Keylogger Definition: Software or hardware that tracks keystrokes and keyboard events, usually surreptitiously / secretly, to monitor actions by the user of an information system.Related Term(s): spyware
- Keyword Search A search for documents containing one or more words that are specified by a user.
- kill switch"a form of safety mechanism used to completely shut off a device in case of an emergency situation where it cannot be shut off using the normal process or if immediate shut off is required."
- Kilobyte (K) One thousand bytes of data is 1K of data.
- knowledge"The sum of all information derived from diagnostic, descriptive, predictive, and prescriptive analytics embedded in or available to or from a cognitive computing system."
- Knowledge Management Definition: In the NICE Framework, cybersecurity work where a person: Manages and administers processes and tools that enable the organization to identify, document, and access intellectual capital and information content.
- label"A value corresponding to an outcome."
- label shift"Under label shift, the label distribution p(y) might change but the class-conditional distributions p(x|y) do not. ... We work with the label shift assumption, i.e., ps(x|y) = pt(x|y)"
- LAN (Local area network) Usually refers to a network of computers in a single building or other discrete location.
- language model"A language model is an approximative description that captures patterns and regularities present in natural language and is used for making assumptions on previously unseen language fragments."