Find definitions for IT security and compliance in our online glossary of key terms, acronyms, and vocabulary.

AJAX progress indicator
  • Term
    Definition
  • One of the most widely supported file formats for storing bit-mapped images. Files in TIFF format often end with a .tif extension. 
  • "Ability to trace the history, application or location of an entity by means of recorded identification. ["Chain of custody" is a related term.] Alternatively, traceability is a property of the result of a measurement or the value of a standard whereby it can be related with a stated(...)
  • Definition: A set of designations employing four colors (RED, AMBER, GREEN, and WHITE) used to ensure that sensitive information is shared with the correct audience.
  • "A dataset from which a model is learned."
  • "Enactment of a process represented by a set of coordinated activities carried out by multiple systems and/or participants in accordance with defined relationships. This coordination leads to an intentional, consistent, and verifiable result across all participants."
  • "A technique in machine learning in which an algorithm learns to perform one task, such as recognizing cars, and builds on that knowledge when learning a different but related task, such as recognizing cats."
  • "A procedure that modifies a dataset."
  • A collection of protocols that define the basic workings of the features of the Internet. 
  • " open, comprehensive, accessible, clear and understandable presentation of information; property of a system or process to imply openness and accountability"
  • Definition: A computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms, sometimes by exploiting legitimate authorizations of a system entity that invokes the program.
  • A malicious computer program that is disguised as or hidden within another program
  • "outcome where the model correctly predicts the negative class."
  • "an outcome where the model correctly predicts the positive class."
  • "the system status in the mind of human beings based on their perception of and experience with the system; concerns the attitude that a person or technology will help achieve specific goals in a situation characterized by uncertainty and vulnerability."
  • "The degree to which an information system (including the information technology components that are used to build the system) can be expected to preserve the confidentiality, integrity, and availability of the information being processed, stored, or transmitted by the system across the full(...)
  • "Characteristics of trustworthy AI systems include: valid and reliable, safe, secure and resilient, accountable and transparent, explainable and interpretable, privacy-enhanced, and fair with harmful bias managed."
  • "The null hypothesis H0 is rejected, even though it is [true]"
  • "The null hypothesis H0 is accepted, even though it is [false]"