Cyber Security Glossary
Find definitions for IT security and compliance in our online glossary of key terms, acronyms, and vocabulary.
-
TermDefinition
- positionality"Awareness and discussion of ones’ social and institutional position with regards to research, particularly of power imbalances, and limitations the researcher may have because of differences in lived experience."
- post-hoc explanation"also known as the reverse engineering approach[;] tries to reconstruct explanations for decisions made by a black-box[;] . . . can be further divided into global and local methods. Global explanations concern understanding the overall logic and behavior of a black-box model, while local(...)
- post-processing"Typically performed with the help of a holdout dataset (data not used in the training of the model). Here, the learned model is treated as a black box and its predictions are altered by a function during the post-processing phase. The function is deduced from the performance of the black box(...)
- post-processing algorithm"A bias mitigation algorithm that is applied to predicted labels."
- practical significance"speaks to the magnitude of the relationship [between two variables] and whether or not that magnitude is important."
- pre-processing algorithm"A bias mitigation algorithm that is applied to training data."
- precision"A metric for classification models. Precision identifies the frequency with which a model was correct when classifying the positive class."
- Precursor Definition: An observable occurrence or sign that an attacker may be preparing to cause an incident.Related Term(s): indicator
- prediction"Forecasting quantitative or qualitative outputs through function approximation, applied on input data or measurements."
- predictive analysis"The organization of analyses of structured and unstructured data for inference and correlation that provides a useful predictive capability to new circumstances or data."
- predictive analytics"Insights, reporting, and information answering the question, "What is likely to happen?" Predictive analytics support high confidence foretelling of future event(s)."
- Preparedness Definition: The activities to build, sustain, and improve readiness capabilities to prevent, protect against, respond to, and recover from natural or manmade incidents.
- preprocessing"Transforming the data so that the underlying discrimination is mitigated. This method can be used if a modeling pipeline is allowed to modify the training data."
- prescriptive analytics"Insights, reporting, and information answering the question, “What should I do about it?" Prescriptive analytics determines information that provides high confidence actions necessary to recover from an event or fulfill a need."
- Preservation Notice, Preservation Order See Legal Hold.
- Prima Facie Evidence Prima Facie evidence that is sufficient to raise a presumption of fact or to establish the fact in question unless rebutted.
- Privacy Definition: The ability of individuals to understand and exercise control over how information about themselves may be used by others.
- privacy-by-design"Embedding privacy measures and privacy enhancing technologies directly into the design of information technologies and systems."
- privacy-enhancing technology"A coherent system of ICT (Information and Communications Technology) measures that protects privacy by eliminating or reducing personal data or by preventing unnecessary and/or undesired processing of personal data, all without losing the functionality of the information system."
- Private Key Definition: A cryptographic key that must be kept confidential and is used to enable the operation of an asymmetric (public key) cryptographic algorithm. Related Term(s): public key, asymmetric cryptography
- Private Network A network that is connected to the Internet but is isolated from the Internet.
- privileged protected attribute"A value of a protected attribute indicating a group that has historically been at systematic advantage."
- Probative Value Evidence that is sufficiently useful to prove something important in a trial. However, probative value of proposed evidence must be weighed by the trial judge against prejudicing in the minds of jurors toward the opposing party or criminal defendant.
- procedure"Information item that presents an ordered series of steps to perform a process, activity, or task."
- process"A sequence or flow of activities in an organization with the objective of carrying out work, which may include a set of activities, events, tasks, and decisions in a sequenced flow that adhere to finite execution semantics. Process levels will generally follow structure at the capability(...)