Find definitions for IT security and compliance in our online glossary of key terms, acronyms, and vocabulary.

AJAX progress indicator
  • Term
    Definition
  • A malicious computer program that is disguised as or hidden within another program
  • "outcome where the model correctly predicts the negative class."
  • "an outcome where the model correctly predicts the positive class."
  • "the system status in the mind of human beings based on their perception of and experience with the system; concerns the attitude that a person or technology will help achieve specific goals in a situation characterized by uncertainty and vulnerability."
  • "The degree to which an information system (including the information technology components that are used to build the system) can be expected to preserve the confidentiality, integrity, and availability of the information being processed, stored, or transmitted by the system across the full(...)
  • "Characteristics of trustworthy AI systems include: valid and reliable, safe, secure and resilient, accountable and transparent, explainable and interpretable, privacy-enhanced, and fair with harmful bias managed."
  • "The null hypothesis H0 is rejected, even though it is [true]"
  • "The null hypothesis H0 is accepted, even though it is [false]"
  • Definition: Any access that violates the stated security policy.
  • "Result of not having accurate or sufficient knowledge of a situation; state, even partial, of deficiency of information related to understanding or knowledge of an event, its consequence, or likelihood"
  • "Underfitting occurs when a statistical model cannot adequately capture the underlying structure of the data."
  • "inadequately represented. (See note.)"
  • "impossibility of providing an explanation for certain decisions made by an intelligent system which is both 100% accurate and comprehensible."
  • "Data that does not have a predefined data model or is not organized in a predefined way"
  • "Algorithms, which take a set of data consisting only of inputs and then they attempt to cluster the data objects based on the similarities or dissimilarities in them."
  • The Uniform Resource Locator is commonly known as the address for a website such as www.janusassociates.com. 
  • "extent to which a system product or service can be used by specified users to achieve specified goals with effectiveness, efficiency and satisfaction in a specified context of use (note 1: The “specified” users, goals and context of use refer to the particular combination of users, goals and(...)
  • "refers to evaluating a product or service by testing it with representative users. Typically, during a test, participants will try to complete typical tasks while observers watch, listen and takes notes. The goal is to identify any usability problems, collect qualitative and quantitative data(...)
  • "individual or group that interacts with a system or benefits from a system during its utilization"
  • "the practice of the following principles, the active involvement of users for a clear understanding of user and task requirements, iterative design and evaluation, and a multi-disciplinary approach"
  • "Confirmation by examination and provision of objective evidence that the particular requirements for a specific intended use are fulfilled."
  • "a theoretically grounded approach to the design of technology that accounts for human values in a principled and systematic manner throughout the design process."
  • "A variable is a characteristic of a unit being observed that may assume more than one of a set of values to which a numerical measure or a category from a classification can be assigned."
  • "Represents the statistical significance of each variable in the data in terms of its affect on the model."
  • "The variance is the mean square deviation of the variable around the average value. It reflects the dispersion of the empirical values around its mean."