Find definitions for IT security and compliance in our online glossary of key terms, acronyms, and vocabulary.

AJAX progress indicator
  • Term
    Definition
  • Definition: A NICE Framework category consisting of specialty areas providing leadership, management, direction, and/or development and advocacy so that all individuals and the organization may effectively conduct cybersecurity work.
  • "a folder with all the code and metadata needed to train and serve a machine learning model."
  • Paper discovery refers to the discovery of writings on paper that can be read without the aid of some devices. 
  • "A learning model that summarizes data with a set of parameters of fixed size (independent of the number of training examples)"
  • Parent-child relationships is a term used in e-discovery to describe a chain of documents that stems from a single e-mail or storage folder. These types of relationships are primarily encountered when a party is faced with a discovery request for e-mail. A “child” (i.e., an attachment) is(...)
  • "A process that may contain one or more sub-processes, activities, and tasks."
  • "Bit(s) used to determine whether a block of data has been altered. Rationale: Term has been replaced by the term “parity bit”."
  • "A computer system, data, input, business rule, human intervention, and other contributor to the flow of a process."
  • "engag[ing] multiple stakeholders in deliberative processes in order to achieve consensus."
  • Definition: An actual assault perpetrated by an intentional threat source that attempts to learn or make use of information from a system, but does not attempt to alter the system, its resources, its data, or its operations.Related Term(s): active attack
  • "A passive learning agent has a fixed policy that determines its behavior. An active learning agent gets to decide what actions to take."
  • Definition: A string of characters (letters, numbers, and other symbols) used to authenticate an identity or to verify access authorization.
  • Personal computer.
  • Handheld digital organizers.
  • An Adobe technology for formatting documents so that they can be viewed and printed using the Adobe Acrobat reader.  Peer-to-peer networks physically connect each computer in the network to every other computer in the network. Files are stored on the hard drives of the individual PCs with(...)
  • Definition: A colloquial term for penetration test or penetration testing.Synonym(s): penetration testing
  • Definition: An evaluation methodology whereby assessors search for vulnerabilities and attempt to circumvent the security features of a network and/or information system.
  • "‘Personal data’ means any information relating to an identified or identifiable natural person (‘data subject’); an identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location(...)
  • Definition: The information that permits the identity of an individual to be directly or indirectly inferred.
  • A petabyte is a measure of computer data storage capacity and is one thousand million million (1,000,000,000,000,000) bytes. 
  • Definition: A digital form of social engineering to deceive individuals into providing sensitive information.
  • Definition: Unencrypted information.Related Term(s): ciphertext
  • The least formatted and therefore most portable form of text for computerized documents. 
  • A pointer is an index entry in the directory of a disk (or other storage medium) that identifies the space on the disc in which an electronic document or piece of electronic data resides, thereby preventing that space from being overwritten by other data. In most cases, when an electronic(...)
  • "The general principles by which a government is guided in its management of public affairs, or the legislature in its measures. This term, as applied to a law, ordinance, or rule of law, denotes its general purpose or tendency considered as directed to the POLICY"