Cyber Security Glossary
Find definitions for IT security and compliance in our online glossary of key terms, acronyms, and vocabulary.
-
TermDefinition
- Unauthorized Access Definition: Any access that violates the stated security policy.
- uncertainty"Result of not having accurate or sufficient knowledge of a situation; state, even partial, of deficiency of information related to understanding or knowledge of an event, its consequence, or likelihood"
- underfitting"Underfitting occurs when a statistical model cannot adequately capture the underlying structure of the data."
- underrepresentation"inadequately represented. (See note.)"
- unexplainable"impossibility of providing an explanation for certain decisions made by an intelligent system which is both 100% accurate and comprehensible."
- unstructured data"Data that does not have a predefined data model or is not organized in a predefined way"
- unsupervised learning"Algorithms, which take a set of data consisting only of inputs and then they attempt to cluster the data objects based on the similarities or dissimilarities in them."
- URL The Uniform Resource Locator is commonly known as the address for a website such as www.janusassociates.com.
- usability"extent to which a system product or service can be used by specified users to achieve specified goals with effectiveness, efficiency and satisfaction in a specified context of use (note 1: The “specified” users, goals and context of use refer to the particular combination of users, goals and(...)
- usability testing"refers to evaluating a product or service by testing it with representative users. Typically, during a test, participants will try to complete typical tasks while observers watch, listen and takes notes. The goal is to identify any usability problems, collect qualitative and quantitative data(...)
- user"individual or group that interacts with a system or benefits from a system during its utilization"
- user-centered design"the practice of the following principles, the active involvement of users for a clear understanding of user and task requirements, iterative design and evaluation, and a multi-disciplinary approach"