Browse Definitions:
  • August 29, 2014 29 Aug'14

    document sanitization

    In addition to making sure the document text doesn’t openly divulge anything it shouldn’t, document sanitization includes removing document metadata that could pose a privacy or security risk.  Continue Reading

  • August 29, 2014 29 Aug'14

    metadata security

    Metadata is defined as “data about data.” It adds information to data that makes it possible to process it automatically and to effectively find, categorize, share and reuse it, among other things. However, metadata that is accessed by unauthorized ...  Continue Reading

  • August 29, 2014 29 Aug'14

    Slingshot

    Slingshot is Facebook's photograph sharing smartphone application, developed to compete with services like Snapchat and Instagram. Slingshot is available for iOS and Android. The app is modeled on Snapchat and, like Snapchat, is designed to send ...  Continue Reading

  • August 29, 2014 29 Aug'14

    GPS tracking

    GPS tracking is the surveillance of location through use of the Global Positioning System (GPS ) to track the location of an entity or object remotely. The technology can pinpoint longitude, latitude, ground speed, and course direction of the target.  Continue Reading

  • August 29, 2014 29 Aug'14

    DSC pull server

    A DSC pull server (desired state configuration pull server) is an automation server that allows configurations to be maintained on many servers, computer workstations and devices across a network. DSC pull servers use Microsoft Windows PowerShell ...  Continue Reading

  • August 29, 2014 29 Aug'14

    passive scanning

    Passive scanning is a method of vulnerability detection that relies on information gleaned from network data that is captured from a target computer without direct interaction.  Continue Reading

  • August 29, 2014 29 Aug'14

    magnetic storage

    Magnetic storage has been around in many forms since 1888 by Oberlan Smith, who publicized his audio recording on a wire in Electrical World. In broad terms, magnetic storage mostly works very similarly to Smith's recording. Read and write heads (...  Continue Reading

  • August 29, 2014 29 Aug'14

    document lifecycle

    The document lifecycle is the sequence of stages that a document goes through from its creation to its eventual archival or destruction. Proper procedures throughout the document’s lifecycle are an important part of enterprise content management (...  Continue Reading

  • August 28, 2014 28 Aug'14

    sensitive information

    Sensitive information is data that must be protected from unauthorized access to safeguard the privacy or security of an individual or organization.  Continue Reading

  • August 28, 2014 28 Aug'14

    mindfulness training

    Mindfulness training is the teaching or learning of practices designed to help participants increase their ability to live fully in the present moment. The ability to be present and aware is a powerful counter to the common tendencies to relive past...  Continue Reading

  • August 27, 2014 27 Aug'14

    document metadata

    Document metadata is information attached to a text-based file that may not be visible on the face of the document; documents may also contain supporting elements such as graphic images, photographs, tables and charts, each of which can have its own...  Continue Reading

  • August 27, 2014 27 Aug'14

    metadata management

    Metadata management is the oversight of data associated with data assets to ensure that information can be integrated, accessed, shared, linked, analyzed and maintained to best effect across an organization.  Continue Reading

  • August 22, 2014 22 Aug'14

    BIOS (basic input/output system)

    BIOS (basic input/output system) is the program a personal computer's microprocessor uses to get the computer system started after you turn it on. It also manages data flow between the computer's operating system and attached devices such as the ...  Continue Reading

  • August 22, 2014 22 Aug'14

    multi-tenancy

    Multi-tenancy is an architecture in which a single instance of a software application serves multiple customers. Each customer is called a tenant. Tenants may be given the ability to customize some parts of the application, such as color of the user...  Continue Reading

  • August 21, 2014 21 Aug'14

    redundant array of inexpensive servers (RAIS)

    A redundant array of inexpensive servers (RAIS) is the use of multiple servers with load balancing to manage demand across servers and allow one server to take over for another in the case of failure.  Continue Reading

  • August 21, 2014 21 Aug'14

    active attack

    An active attack is a network exploit in which a hacker attempts to make changes to data on the target or data en route to the target. In a masquerade attack, for example, the intruder pretends to be a particular user of a system to gain access or ...  Continue Reading

  • August 21, 2014 21 Aug'14

    passive attack

    A passive attack is a network attack in which a system is monitored and sometimes scanned for open ports and vulnerabilities. The purpose is solely to gain information about the target and no data is changed on the target.  Continue Reading

  • August 20, 2014 20 Aug'14

    surveillance metadata

    Surveillance metadata is details about data pertaining to the actions of an observed party. Surveillance metadata not only facilitates categorizing and retrieving content but provides information on its own and may also be used to legitimize ...  Continue Reading

  • August 15, 2014 15 Aug'14

    false positive

    This definition of false positive explains what the term means and how it applies in various contexts. We also discuss the difference between false positives and false negatives and include links to more information.  Continue Reading

  • August 14, 2014 14 Aug'14

    multipoint control unit (MCU)

    A multipoint control unit (MCU) is a type of video conferencing hardware that bridges terminals involved into a multi-point conference system. MCU makes it possible for a multipoint audio/video conference to be controlled and moderated from a ...  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

  • nearline storage

    Nearline storage is the on-site storage of data on removable media.

  • application-aware storage

    Application-aware storage is a storage system with built-in intelligence about relevant applications and their utilization ...

  • Remote Direct Memory Access (RDMA)

    Remote Direct Memory Access (RDMA) is a technology that allows computers in a network to exchange data in main memory without ...

SearchSolidStateStorage

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close