Find definitions for IT security and compliance in our online glossary of key terms, acronyms, and vocabulary.

AJAX progress indicator
  • Term
    Definition
  • "The field that combines domain expertise, programming skills, and knowledge of mathematics and statistics to extract meaningful insights from data."
  • "A practitioner who has sufficient knowledge in the overlapping regimes of business needs, domain knowledge, analytical skills, and software and systems engineering to manage the end-to-end data processes in the analytics life cycle."
  • "The intentional introduction of initial state conditions, influencing factors, and outcomes (both successful and unsuccessful) in a data fabric to create sufficient machine learning analysis signals to enable encouragement/discouragement to enrich deterministic relationships between data(...)
  • Definition: The deliberate or intentional act of stealing of information. Related Term(s): data aggregation, data leakage, data loss
  • "process by which the data required by an application is identified, extracted, cleaned and integrated, to yield a data set that is suitable for exploration and analysis."
  • De-Duplication (“De-Duping”) is the process of comparing electronic records based on their characteristics and removing duplicate records from the data set. 
  • Definition: To convert enciphered text to plain text by means of a cryptographic system. Synonym(s): decode, decrypt
  • "A conclusion reached after consideration of business rules and relevant data within a given process."
  • "the cognitive process resulting in the selection of a belief or a course of action among several possible alternative options. It could be either rational or irrational. The decision-making process is a reasoning process based on assumptions of values, preferences and beliefs of the(...)
  • "A point within a business process where the process flow can take one of several alternative paths, including recursive."
  • ""
  • "a computer program application used to improve a company's decision-making capabilities. It analyzes large amounts of data and presents an organization with the best possible options available[; they] bring together data and knowledge from different areas and sources to provide users with(...)
  • "Tree‐structure resembling a flowchart, where every node represents a test to an attribute, each branch represents the possible outcomes of that test, and the leaves represent the class labels."
  • Definition: To convert encoded text to plain text by means of a code. Synonym(s): decipher, decrypt
  • "the total or partial removal of existing components and their corresponding sub-components from Production and any relevant environment, minimizing risks and impacts, ensuring policy compliance, and maximizing the financial benefits (i.e., optimizing the cost reduction)."
  • Definition: A generic term encompassing decode and decipher. Synonym(s): decipher, decode
  • Definition: The process of transforming ciphertext into its original plaintext. Extended Definition: The process of converting encrypted data back into its original form, so it can be understood.Synonym(s): decode, decrypt, decipher
  • "Insights, reporting, and information answering the question, "What would likely happen IF…?” Deductive analytics evaluates causes and outcomes of possible future events."
  • "A subset of machine learning that relies on neural networks with many layers of neurons. In so doing, deep learning employs statistics to spot underlying trends or data patterns and applies that knowledge to other layers of analysis. Some have labeled this as a way to “learn by example” and a(...)
  • "Digital images and audio that are artificially altered or manipulated by AI and/or deep learning often to make someone do or say something he or she did not actually do or say. Pictures or videos can be edited to put someone in a compromising position or to have someone make a controversial(...)
  • Deleted data is data that, in the past, existed on the computer as live data and which has been deleted by the computer system or end-user activity. Deleted data remains on storage media in whole or in part until it is overwritten by ongoing usage or “wiped” with a software program(...)
  • A file with disk space that has been designated as available for reuse. The deleted file remains intact until it has been overwritten with a new file. 
  • Deletion is the process whereby data is removed from active files and other data storage structures on computers and rendered inaccessible except using special data recovery tools designed to recover deleted data.
  • Definition: An attack that prevents or impairs the authorized use of information system resources or services.
  • "(denigrate) to attack the reputation of"