Find definitions for IT security and compliance in our online glossary of key terms, acronyms, and vocabulary.

AJAX progress indicator
  • Term
    Definition
  • "Awareness and discussion of ones’ social and institutional position with regards to research, particularly of power imbalances, and limitations the researcher may have because of differences in lived experience."
  • "also known as the reverse engineering approach[;] tries to reconstruct explanations for decisions made by a black-box[;] . . . can be further divided into global and local methods. Global explanations concern understanding the overall logic and behavior of a black-box model, while local(...)
  • "Typically performed with the help of a holdout dataset (data not used in the training of the model). Here, the learned model is treated as a black box and its predictions are altered by a function during the post-processing phase. The function is deduced from the performance of the black box(...)
  • "A bias mitigation algorithm that is applied to predicted labels."
  • "speaks to the magnitude of the relationship [between two variables] and whether or not that magnitude is important."
  • "A bias mitigation algorithm that is applied to training data."
  • "A metric for classification models. Precision identifies the frequency with which a model was correct when classifying the positive class."
  • Definition: An observable occurrence or sign that an attacker may be preparing to cause an incident.Related Term(s): indicator
  • "Forecasting quantitative or qualitative outputs through function approximation, applied on input data or measurements."
  • "The organization of analyses of structured and unstructured data for inference and correlation that provides a useful predictive capability to new circumstances or data."
  • "Insights, reporting, and information answering the question, "What is likely to happen?" Predictive analytics support high confidence foretelling of future event(s)."
  • Definition: The activities to build, sustain, and improve readiness capabilities to prevent, protect against, respond to, and recover from natural or manmade incidents.
  • "Transforming the data so that the underlying discrimination is mitigated. This method can be used if a modeling pipeline is allowed to modify the training data."
  • "Insights, reporting, and information answering the question, “What should I do about it?" Prescriptive analytics determines information that provides high confidence actions necessary to recover from an event or fulfill a need."
  • See Legal Hold. 
  •  Prima Facie evidence that is sufficient to raise a presumption of fact or to establish the fact in question unless rebutted. 
  • Definition: The ability of individuals to understand and exercise control over how information about themselves may be used by others.
  • "Embedding privacy measures and privacy enhancing technologies directly into the design of information technologies and systems."
  • "A coherent system of ICT (Information and Communications Technology) measures that protects privacy by eliminating or reducing personal data or by preventing unnecessary and/or undesired processing of personal data, all without losing the functionality of the information system."
  • Definition: A cryptographic key that must be kept confidential and is used to enable the operation of an asymmetric (public key) cryptographic algorithm. Related Term(s): public key, asymmetric cryptography
  • A network that is connected to the Internet but is isolated from the Internet.
  • "A value of a protected attribute indicating a group that has historically been at systematic advantage."
  •  Evidence that is sufficiently useful to prove something important in a trial. However, probative value of proposed evidence must be weighed by the trial judge against prejudicing in the minds of jurors toward the opposing party or criminal defendant. 
  • "Information item that presents an ordered series of steps to perform a process, activity, or task."
  • "A sequence or flow of activities in an organization with the objective of carrying out work, which may include a set of activities, events, tasks, and decisions in a sequenced flow that adhere to finite execution semantics. Process levels will generally follow structure at the capability(...)