Part of the Network security glossary:

An object identifier (OID) is an unambiguous, long-term name for any type of object or entity

The OID mechanism finds application in diverse scenarios, particularly in security, and is endorsed by the International Telecommunication Union (ITU), the Internet Engineering Task Force (IETF), and ISO.

In computing, an OID appears as a group of characters that allows a server or end user to retrieve an object without needing to know the physical location of the data. This approach is useful for automating and streamlining data storage in cloud computing environments. On the Internet, an OID takes the form of a Universal Unique Identifier (UUID), a 128-bit number used to uniquely identify an object or entity. In a database, an OID is a set of integers that uniquely identifies each row (or record) in a table.

This was last updated in June 2013
Contributor(s): Stan Gibilisco
Posted by: Margaret Rouse

Related Terms

Definitions

  • encryption

    - Encryption is the conversion of electronic data into another form, called ciphertext, which cannot be easily understood by anyone except authorized parties. (SearchSecurity.com)

  • firewall

    - A firewall is a network security system, either hardware or software based, that controls incoming and outgoing network traffic based on a set of rules. (SearchSecurity.com)

  • digital signature

    - A digital signature (not to be confused with a digital certificate) is a mathematical technique used to validate the authenticity and integrity of a message, software, or digital document. (SearchSecurity.com)

Glossaries

  • Network security

    - Terms related to network security, including definitions about intrusion prevention and words and phrases about VPNs and firewalls.

  • Internet applications

    - This WhatIs.com glossary contains terms related to Internet applications, including definitions about Software as a Service (SaaS) delivery models and words and phrases about web sites, e-commerce ...

Ask a Question. Find an Answer.Powered by ITKnowledgeExchange.com

Ask An IT Question

Get answers from your peers on your most technical challenges

Ask Question

Tech TalkComment

Share
Comments

    Results

    Contribute to the conversation

    All fields are required. Comments will appear at the bottom of the article.