Browse Definitions :
  • August 29, 2014 29 Aug'14

    document sanitization

    In addition to making sure the document text doesn’t openly divulge anything it shouldn’t, document sanitization includes removing document metadata that could pose a privacy or security risk.  Continue Reading

  • August 29, 2014 29 Aug'14

    metadata security

    Metadata is defined as “data about data.” It adds information to data that makes it possible to process it automatically and to effectively find, categorize, share and reuse it, among other things. However, metadata that is accessed by unauthorized ...  Continue Reading

  • August 29, 2014 29 Aug'14

    Slingshot

    Slingshot is Facebook's photograph sharing smartphone application, developed to compete with services like Snapchat and Instagram. Slingshot is available for iOS and Android. The app is modeled on Snapchat and, like Snapchat, is designed to send ...  Continue Reading

  • August 29, 2014 29 Aug'14

    GPS tracking

    GPS tracking is the surveillance of location through use of the Global Positioning System (GPS ) to track the location of an entity or object remotely. The technology can pinpoint longitude, latitude, ground speed, and course direction of the target.  Continue Reading

  • August 29, 2014 29 Aug'14

    DSC pull server

    A DSC pull server (desired state configuration pull server) is an automation server that allows configurations to be maintained on many servers, computer workstations and devices across a network.  Continue Reading

  • August 29, 2014 29 Aug'14

    passive scanning

    Passive scanning is a method of vulnerability detection that relies on information gleaned from network data that is captured from a target computer without direct interaction.  Continue Reading

  • August 29, 2014 29 Aug'14

    magnetic storage

    Magnetic storage has been around in many forms since 1888 by Oberlan Smith, who publicized his audio recording on a wire in Electrical World. In broad terms, magnetic storage mostly works very similarly to Smith's recording. Read and write heads (...  Continue Reading

  • August 29, 2014 29 Aug'14

    document lifecycle

    The document lifecycle is the sequence of stages that a document goes through from its creation to its eventual archival or destruction. Proper procedures throughout the document’s lifecycle are an important part of enterprise content management (...  Continue Reading

  • August 28, 2014 28 Aug'14

    sensitive information

    Sensitive information is data that must be protected from unauthorized access to safeguard the privacy or security of an individual or organization.  Continue Reading

  • August 28, 2014 28 Aug'14

    mindfulness training

    Mindfulness training is the teaching or learning of practices designed to help participants increase their ability to live fully in the present moment. The ability to be present and aware is a powerful counter to the common tendencies to relive past...  Continue Reading

  • August 27, 2014 27 Aug'14

    document metadata

    Document metadata is information attached to a text-based file that may not be visible on the face of the document; documents may also contain supporting elements such as graphic images, photographs, tables and charts, each of which can have its own...  Continue Reading

  • August 22, 2014 22 Aug'14

    BIOS (basic input/output system)

    BIOS (basic input/output system) is the program a personal computer's microprocessor uses to get the computer system started after you turn it on. It also manages data flow between the computer's operating system and attached devices such as the ...  Continue Reading

  • August 22, 2014 22 Aug'14

    multi-tenancy

    Multi-tenancy is an architecture in which a single instance of a software application serves multiple customers. Each customer is called a tenant. Tenants may be given the ability to customize some parts of the application, such as color of the user...  Continue Reading

  • August 21, 2014 21 Aug'14

    redundant array of inexpensive servers (RAIS)

    A redundant array of inexpensive servers (RAIS) is the use of multiple servers with load balancing to manage demand across servers and allow one server to take over for another in the case of failure.  Continue Reading

  • August 21, 2014 21 Aug'14

    active attack

    An active attack is a network exploit in which a hacker attempts to make changes to data on the target or data en route to the target. In a masquerade attack, for example, the intruder pretends to be a particular user of a system to gain access or ...  Continue Reading

  • August 21, 2014 21 Aug'14

    passive attack

    A passive attack is a network attack in which a system is monitored and sometimes scanned for open ports and vulnerabilities. The purpose is solely to gain information about the target and no data is changed on the target.  Continue Reading

  • August 20, 2014 20 Aug'14

    surveillance metadata

    Surveillance metadata is details about data pertaining to the actions of an observed party. Surveillance metadata not only facilitates categorizing and retrieving content but provides information on its own and may also be used to legitimize ...  Continue Reading

  • August 15, 2014 15 Aug'14

    false positive

    This definition of false positive explains what the term means and how it applies in various contexts. We also discuss the difference between false positives and false negatives and include links to more information.  Continue Reading

  • August 14, 2014 14 Aug'14

    multipoint control unit (MCU)

    A multipoint control unit (MCU) is a type of video conferencing hardware that bridges terminals involved into a multi-point conference system. MCU makes it possible for a multipoint audio/video conference to be controlled and moderated from a ...  Continue Reading

  • August 14, 2014 14 Aug'14

    raster graphics

    Raster graphics are digital images created or captured (for example, by scanning in a photo) as a set of samples of a given space.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • Payload (computing)

    The term payload, when used in the context of networking or telecommunications, is the data carried inside of a packet (or other ...

  • access control

    Access control is a security technique that regulates who or what can view or use resources in a computing environment.

  • ethical hacker

    An ethical hacker, also referred to as a white hat hacker, is an information security expert who systematically attempts to ...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • storage at the edge

    Storage at the edge is the collective methods and technologies that capture and retain digital information at the periphery of ...

  • Flash Storage

    Flash storage is any type of drive, repository or system that uses flash memory to keep data for an extended period of time.

  • optical disc

    An optical disc is an electronic data storage medium that can be written to and read from using a low-powered laser beam.

Close