Browse Definitions:
  • March 31, 2015 31 Mar'15


    Burstiness is an intermittent type of data transmission. That transmission type contrasts with with streamed, paced or continuous transmissions.  Continue Reading

  • March 31, 2015 31 Mar'15


    A vendor is an individual or company that sells goods or services to somone else in the economic production chain. Learn about different types of vendors.  Continue Reading

  • March 31, 2015 31 Mar'15

    hypervisor attack

    A hypervisor attack can allow hackers to take control of your VMs. While numerous guest OS and network security vulnerabilities exist in a virtual environment, a successful hypervisor attack could have devastating consequences.  Continue Reading

  • March 31, 2015 31 Mar'15

    attack surface analysis

    An organization's attack surface includes all the exploitable vulnerabilities in its hardware, software, connections and even its employees, in the form of social engineering. Attack surface analysis allows the organization to detect those ...  Continue Reading

  • March 31, 2015 31 Mar'15

    public sector

    The public sector is the segment of an economic system that is controlled by government; it contrasts with the private sector, which is run by private citizens.  Continue Reading

  • March 30, 2015 30 Mar'15

    PCI DSS vocabulary quiz

    Take this quiz to test your knowledge of abbreviations related to the Payment Card Industry Data Security Standard (PCI DSS).  Continue Reading

  • March 30, 2015 30 Mar'15

    Quick Start Glossary: PCI DSS (Payment Card Industry Data Security Standard)

    Payment Card Industry Data Security Standard (PCI DSS): Print the glossary out for a fast reference or access online to see full definitions and further resources.  Continue Reading

  • March 30, 2015 30 Mar'15

    RFC 1918

    RFC 1918 specifies ranges of IP addresses for use in private networks. These private IP addresses cannot be routed on the Internet.  Continue Reading

  • March 27, 2015 27 Mar'15

    network socket

    Sockets are created and used with a set of programming requests or "function calls" sometimes called the sockets application programming interface (API). The most common sockets API is the Berkeley UNIX C interface for sockets.  Continue Reading

  • March 26, 2015 26 Mar'15


    Although 5G, the fifth-generation wireless standard, is not scheduled for launch until 2020, some manufacturers are already incorporating some of the coming standard's specifications into their products.  Continue Reading

  • March 26, 2015 26 Mar'15

    behavioral biometrics

    Behavioral biometrics are based on human activity such as typing patterns. The term contrasts with physical biometrics, which involves innate physical characteristics such as iris patterns or fingerprints.  Continue Reading

  • March 26, 2015 26 Mar'15

    National Vulnerability Database (NVD)

    NVD (National Vulnerability Database) is a product of the National Institute of Standards and Technology (NIST) Computer Security Division and is used by the U.S. Government for security management and compliance as well as automatic vulnerability ...  Continue Reading

  • March 26, 2015 26 Mar'15

    enterprise search

    There are a number of kinds of enterprise search including local installations, hosted versions, and search appliances, sometimes called “search in a box.” Each has relative advantages and disadvantages.  Continue Reading

  • March 26, 2015 26 Mar'15

    virtual payment terminal

    Virtual terminals allow sellers to take credit card payments online for orders made online or over the phone without requiring a card reader device.  Continue Reading

  • March 25, 2015 25 Mar'15

    critical path

    The critical path is the longest sequence of tasks in a project plan. Each task must be completed before the next can be begun.  Continue Reading

  • March 25, 2015 25 Mar'15

    negative float (negative slack)

    Negative float or slack is time that must be made up on a task on a project's critical path so that it does not delay the completion of a project.  Continue Reading

  • March 25, 2015 25 Mar'15

    float (project float, slack)

    In project management, float or slack is the time span between the completion of the last task on the critical path and the finish date for the project. Essentially, float is margin for error -- the amount of time that a task can be delayed without ...  Continue Reading

  • March 21, 2015 21 Mar'15

    cone of uncertainty

    The cone of uncertainty is a project management tool that illustrates the fact that the accuracy of estimates increases over the span of the project.  Continue Reading

  • March 20, 2015 20 Mar'15

    pick two (pick any two)

    Pick two is the principle that, for any given three desirable qualities, you are likely to only be able to achieve two out of the three.  Continue Reading

  • March 20, 2015 20 Mar'15

    triple constraint

    The project management triangle is also known as the triple constraint, the project management triple constraint and the the iron triangle. The model defines the most significant project management constraints: scope, time and cost.  Continue Reading



  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.


  • security information and event management (SIEM)

    Security information and event management (SIEM) is an approach to security management that seeks to provide a holistic view of ...

  • polymorphic virus

    A polymorphic virus is a harmful, destructive or intrusive type of malware that can change or 'morph,' making it difficult to ...

  • cyberterrorism

    According to the U.S. Federal Bureau of Investigation, cyberterrorism is any 'premeditated, politically motivated attack against ...


  • accountable care organization (ACO)

    An accountable care organization (ACO) is an association of hospitals, healthcare providers and insurers in which all parties ...

  • patient engagement

    Patient engagement is an ideal healthcare situation in which people are well-informed about -- and motivated to be involved -- in...

  • personal health record (PHR)

    A personal health record (PHR) is a collection of health-related information that is documented and maintained by the individual ...


  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...



  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.