Find definitions for IT security and compliance in our online glossary of key terms, acronyms, and vocabulary.

AJAX progress indicator
  • Term
    Definition
  • "Confirmation by examination and provision of objective evidence that the particular requirements for a specific intended use are fulfilled."
  • "a theoretically grounded approach to the design of technology that accounts for human values in a principled and systematic manner throughout the design process."
  • "A variable is a characteristic of a unit being observed that may assume more than one of a set of values to which a numerical measure or a category from a classification can be assigned."
  • "Represents the statistical significance of each variable in the data in terms of its affect on the model."
  • "The variance is the mean square deviation of the variable around the average value. It reflects the dispersion of the empirical values around its mean."
  • "can be checked for correctness by a person or tool"
  • Definition: A computer program that can replicate itself, infect a computer without permission or knowledge of the user, and then spread or propagate to another computer.Related Term(s): macro virus
  • A piece of malicious programming code designed to create an unexpected and, for the victim, usually undesirable event. 
  • A vlog is a Weblog that uses video as its primary medium for distributing content. Vlog posts are usually accompanied by text, image, and other metadata to provide a context or overview for the video. 
  • A virtually private network that is constructed by using public wires to connect nodes.
  • Definition: A characteristic or specific weakness that renders an organization or asset (such as information or an information system) open to exploitation by a given threat or susceptible to a given hazard. Extended Definition: Characteristic of location or security posture or of design,(...)
  • Definition: In the NICE Framework, cybersecurity work where a person: Conducts assessments of threats and vulnerabilities, determines deviations from acceptable configurations, enterprise or local policy, assesses the level of risk, and develops and/or recommends appropriate mitigation(...)