Find definitions for IT security and compliance in our online glossary of key terms, acronyms, and vocabulary.

AJAX progress indicator
  • Term
    Definition
  • Definition: An exchange of data, information, and/or knowledge to manage risks or respond to incidents.
  • Definition: The ability of an information system to: 1) continue to operate under adverse conditions or stress, even if in a degraded or debilitated state, while maintaining essential operational capabilities; and  2) recover effectively in a timely manner.Related Term(s): resilience
  • Definition: In the NICE Framework, cybersecurity work where a person: Oversees the information assurance program of an information system in or outside the network environment; may include procurement duties (e.g., Information Systems Security Officer).
  • Definition: Any equipment or interconnected system or subsystem of equipment that processes, transmits, receives, or interchanges data or information.Related Term(s): information and communication(s) technology
  • "Data received from an external source"
  • "Those who are within [an] organisation may have authorised access to vast amounts of sensitive company records that are essential for maintaining competitiveness and market position, and knowledge of information services and procedures that are crucial for daily operations. . . .[and] should(...)
  • Definition: One or more individuals with the access and/or inside knowledge of a company, organization, or enterprise that would allow them to exploit the vulnerabilities of that entity's security, systems, services, products, or facilities with the intent to cause harm.Related Term: outsider(...)
  • "Discrete, bounded thing with an intrinsic, immutable, and unique identity. Individual occurrence of a type"
  • "A numerical value that multiplies the contribution of a data point in a model."
  • Instant Messaging is a form of electronic communication which involves immediate correspondence between two or more users who are all online simultaneously. 
  • Definition: The structured approach that enables an enterprise or organization to share risk information and risk analysis and to synchronize independent yet complementary risk management strategies to unify efforts across the enterprise.Related Term(s): risk management, enterprise risk management
  • Definition: The property whereby information, an information system, or a component of a system has not been modified or destroyed in an unauthorized manner.Related Term(s): availability, confidentiality, data integrity, system integrity
  • "A preconfigured software instance that combines business rules, experience- based context determination logic, and decision criteria to initiate and execute multiple interrelated human and automated processes in a dynamic context. The goal is to complete the execution of a combination of(...)
  • Definition: A state of mind or desire to achieve an objective.Related Term(s): capability
  • "Action that takes place with the participation of the environment of the object."
  • "The ability of your research design to adequately test your hypotheses"
  • The interconnecting global public network made by connecting smaller shared public networks. The most well-known Internet is the Internet, the worldwide network of networks which use the TCP/IP protocol to facilitate information exchange. 
  • Definition: The ability of two or more systems or components to exchange information and to use the information that has been exchanged.
  • "The ability to understand the value and accuracy of system output. Interpretability refers to the extent to which a cause and effect can be observed within �a system or to which what is going to happen given a change in input or algorithmic parameters can be predicted."
  • "An interpretable machine learning model obeys a domain-specific set of constraints to allow it (or its predictions, or the data) to be more easily understood by humans. These constraints can differ dramatically depending on the domain."
  • "the property that intervention is possible concerning all ongoing or planned privacy relevant data processing[; ...] the data subjects themselves should be able to intervene with regards to the processing of their own data ... [to ensure] that data subjects have the ability to control how(...)
  • A network of interconnecting smaller private networks that are isolated from the public Internet. 
  • Definition: An unauthorized act of bypassing the security mechanisms of a network or information system.Synonym(s): penetration
  • Definition: The process and methods for analyzing information from networks and information systems to determine if a security breach or security violation has occurred.
  • Definition: a NICE Framework category consisting of specialty areas responsible for the investigation of cyber events and/or crimes of IT systems, networks, and digital evidence