Find definitions for IT security and compliance in our online glossary of key terms, acronyms, and vocabulary.

AJAX progress indicator
  • Term
    Definition
  • Definition: The application of one or more measures to reduce the likelihood of an unwanted occurrence and/or lessen its consequences.
  • "In mixed methods, the researcher collects and analyzes both qualitative and quantitative data rigorously in response to research questions and hypotheses; integrates the two forms of data and their results; organizes these procedures into specific research designs that provide the logic and(...)
  • "MLOps (machine learning operations) stands for the collection of techniques and tools for the deployment of ML models in production."
  • "A function that takes features as input and predicts labels as output."
  • "Model assertions are arbitrary functions over a model’s input and output that indicate when errors may be occurring"
  • "short documents accompanying trained machine learning models that provide benchmarked evaluation in a variety of conditions, such as across different cultural, demographic, or phenotypic groups (e.g., race, geographic location, sex, Fitzpatrick skin type) and intersectional groups (e.g., age(...)
  • "Model debugging aims to diagnose a model’s failures."
  • "Model decay depicts that the performance of the model is degrading over time"
  • "An area of research that aims to enable fast, data-efficient updates to a pre-trained base model’s behavior for only a small region of the domain, without damaging model performance on other inputs of interest"
  • "Adversaries maliciously exploiting the query interface to steal the model. More precisely, in a model extraction attack, a good approximation of a sensitive or proprietary model held by the server is extracted (i.e. learned) by a dishonest user who interacts with the server only via the query(...)
  • "Model Governance is the name for the overall internal framework of a firm or organization that controls the processes for Model Development, Model Validation and Model Usage, assign responsibilities and roles etc."
  • "in the context of Risk Management, [...] a database/[management information system] developed for the purpose of aggregating quantitative model related information that is in use by a firm or organization."
  • "Judgmental or qualitative adjustments to model inputs or outputs to compensate for model, data, or other known limitations. A model overlay is a type of override."
  • "model risk management encompasses governance and control mechanisms such as board and senior management oversight, policies and procedures, controls and compliance, and an appropriate incentive and organizational structure"
  • "A group of models that work together."
  • "the phase in the data science development lifecycle where practitioners try to fit the best combination of weights and bias to a machine learning algorithm to minimize a loss function over the prediction range"
  • "the set of processes and activities intended to verify that models are performing as expected."
  • A piece of hardware that lets a computer talk to another computer over a phone line. 
  • "Examination of the status of the activities of a supplier and of their results by the acquirer or a third party."
  • "The capacity for moral action, reasoning, judgment, and decision making, as opposed to merely having moral consequences."
  • "The moral standing of an entity in the sense of how that entity should be treated."
  • The process of making off-line data available for on-line processing. For example, placing a magnetic tape in a drive and setting up the software to recognize or read that tape. The terms “load” and “loading” are often used in conjunction with, or synonymously with, “mount” and “mounting” (as(...)
  • Definition: The presentation of a dynamic attack surface, increasing an adversary's work factor necessary to probe, attack, or maintain presence in a cyber target.