Cyber Security Glossary
Find definitions for IT security and compliance in our online glossary of key terms, acronyms, and vocabulary.
-
TermDefinition
- validation"Confirmation by examination and provision of objective evidence that the particular requirements for a specific intended use are fulfilled."
- value sensitive design"a theoretically grounded approach to the design of technology that accounts for human values in a principled and systematic manner throughout the design process."
- variable"A variable is a characteristic of a unit being observed that may assume more than one of a set of values to which a numerical measure or a category from a classification can be assigned."
- variable importance"Represents the statistical significance of each variable in the data in terms of its affect on the model."
- variance"The variance is the mean square deviation of the variable around the average value. It reflects the dispersion of the empirical values around its mean."
- verifiable"can be checked for correctness by a person or tool"
- Virus Definition: A computer program that can replicate itself, infect a computer without permission or knowledge of the user, and then spread or propagate to another computer.Related Term(s): macro virus
- Virus A piece of malicious programming code designed to create an unexpected and, for the victim, usually undesirable event.
- Vlog (Videoblog) A vlog is a Weblog that uses video as its primary medium for distributing content. Vlog posts are usually accompanied by text, image, and other metadata to provide a context or overview for the video.
- VPN (Virtual Private Network) A virtually private network that is constructed by using public wires to connect nodes.
- Vulnerability Definition: A characteristic or specific weakness that renders an organization or asset (such as information or an information system) open to exploitation by a given threat or susceptible to a given hazard. Extended Definition: Characteristic of location or security posture or of design,(...)
- Vulnerability Assessment and Management Definition: In the NICE Framework, cybersecurity work where a person: Conducts assessments of threats and vulnerabilities, determines deviations from acceptable configurations, enterprise or local policy, assesses the level of risk, and develops and/or recommends appropriate mitigation(...)