Find definitions for IT security and compliance in our online glossary of key terms, acronyms, and vocabulary.

AJAX progress indicator
  • Term
    Definition
  • Definition: Any access that violates the stated security policy.
  • "Result of not having accurate or sufficient knowledge of a situation; state, even partial, of deficiency of information related to understanding or knowledge of an event, its consequence, or likelihood"
  • "Underfitting occurs when a statistical model cannot adequately capture the underlying structure of the data."
  • "inadequately represented. (See note.)"
  • "impossibility of providing an explanation for certain decisions made by an intelligent system which is both 100% accurate and comprehensible."
  • "Data that does not have a predefined data model or is not organized in a predefined way"
  • "Algorithms, which take a set of data consisting only of inputs and then they attempt to cluster the data objects based on the similarities or dissimilarities in them."
  • The Uniform Resource Locator is commonly known as the address for a website such as www.janusassociates.com. 
  • "extent to which a system product or service can be used by specified users to achieve specified goals with effectiveness, efficiency and satisfaction in a specified context of use (note 1: The “specified” users, goals and context of use refer to the particular combination of users, goals and(...)
  • "refers to evaluating a product or service by testing it with representative users. Typically, during a test, participants will try to complete typical tasks while observers watch, listen and takes notes. The goal is to identify any usability problems, collect qualitative and quantitative data(...)
  • "individual or group that interacts with a system or benefits from a system during its utilization"
  • "the practice of the following principles, the active involvement of users for a clear understanding of user and task requirements, iterative design and evaluation, and a multi-disciplinary approach"