Browse Definitions :
  • August 29, 2014 29 Aug'14

    document sanitization

    In addition to making sure the document text doesn’t openly divulge anything it shouldn’t, document sanitization includes removing document metadata that could pose a privacy or security risk.  Continue Reading

  • August 29, 2014 29 Aug'14

    metadata security

    Metadata is defined as “data about data.” It adds information to data that makes it possible to process it automatically and to effectively find, categorize, share and reuse it, among other things. However, metadata that is accessed by unauthorized ...  Continue Reading

  • August 29, 2014 29 Aug'14

    Slingshot

    Slingshot is Facebook's photograph sharing smartphone application, developed to compete with services like Snapchat and Instagram. Slingshot is available for iOS and Android. The app is modeled on Snapchat and, like Snapchat, is designed to send ...  Continue Reading

  • August 29, 2014 29 Aug'14

    GPS tracking

    GPS tracking is the surveillance of location through use of the Global Positioning System (GPS ) to track the location of an entity or object remotely. The technology can pinpoint longitude, latitude, ground speed, and course direction of the target.  Continue Reading

  • August 29, 2014 29 Aug'14

    DSC pull server

    A DSC pull server (desired state configuration pull server) is an automation server that allows configurations to be maintained on many servers, computer workstations and devices across a network.  Continue Reading

  • August 29, 2014 29 Aug'14

    passive scanning

    Passive scanning is a method of vulnerability detection that relies on information gleaned from network data that is captured from a target computer without direct interaction.  Continue Reading

  • August 29, 2014 29 Aug'14

    magnetic storage

    Magnetic storage has been around in many forms since 1888 by Oberlan Smith, who publicized his audio recording on a wire in Electrical World. In broad terms, magnetic storage mostly works very similarly to Smith's recording. Read and write heads (...  Continue Reading

  • August 29, 2014 29 Aug'14

    document lifecycle

    The document lifecycle is the sequence of stages that a document goes through from its creation to its eventual archival or destruction. Proper procedures throughout the document’s lifecycle are an important part of enterprise content management (...  Continue Reading

  • August 28, 2014 28 Aug'14

    sensitive information

    Sensitive information is data that must be protected from unauthorized access to safeguard the privacy or security of an individual or organization.  Continue Reading

  • August 28, 2014 28 Aug'14

    mindfulness training

    Mindfulness training is the teaching or learning of practices designed to help participants increase their ability to live fully in the present moment. The ability to be present and aware is a powerful counter to the common tendencies to relive past...  Continue Reading

  • August 27, 2014 27 Aug'14

    document metadata

    Document metadata is information attached to a text-based file that may not be visible on the face of the document; documents may also contain supporting elements such as graphic images, photographs, tables and charts, each of which can have its own...  Continue Reading

  • August 22, 2014 22 Aug'14

    BIOS (basic input/output system)

    BIOS (basic input/output system) is the program a personal computer's microprocessor uses to get the computer system started after you turn it on. It also manages data flow between the computer's operating system and attached devices such as the ...  Continue Reading

  • August 21, 2014 21 Aug'14

    redundant array of inexpensive servers (RAIS)

    A redundant array of inexpensive servers (RAIS) is the use of multiple servers with load balancing to manage demand across servers and allow one server to take over for another in the case of failure.  Continue Reading

  • August 21, 2014 21 Aug'14

    active attack

    An active attack is a network exploit in which a hacker attempts to make changes to data on the target or data en route to the target. In a masquerade attack, for example, the intruder pretends to be a particular user of a system to gain access or ...  Continue Reading

  • August 21, 2014 21 Aug'14

    passive attack

    A passive attack is a network attack in which a system is monitored and sometimes scanned for open ports and vulnerabilities. The purpose is solely to gain information about the target and no data is changed on the target.  Continue Reading

  • August 20, 2014 20 Aug'14

    surveillance metadata

    Surveillance metadata is details about data pertaining to the actions of an observed party. Surveillance metadata not only facilitates categorizing and retrieving content but provides information on its own and may also be used to legitimize ...  Continue Reading

  • August 15, 2014 15 Aug'14

    false positive

    This definition of false positive explains what the term means and how it applies in various contexts. We also discuss the difference between false positives and false negatives and include links to more information.  Continue Reading

  • August 14, 2014 14 Aug'14

    multipoint control unit (MCU)

    A multipoint control unit (MCU) is a type of video conferencing hardware that bridges terminals involved into a multi-point conference system. MCU makes it possible for a multipoint audio/video conference to be controlled and moderated from a ...  Continue Reading

  • August 14, 2014 14 Aug'14

    raster graphics

    Raster graphics are digital images created or captured (for example, by scanning in a photo) as a set of samples of a given space.  Continue Reading

  • August 14, 2014 14 Aug'14

    second-level address translation (SLAT)

    Second-level address translation (SLAT) is a hardware virtualization technology that reduces hypervisor overhead. To do so, SLAT addresses the inefficiencies associated with looking up virtualized memory addresses in software shadow volumes.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • quantum key distribution (QKD)

    Quantum key distribution (QKD) is a secure communication method for exchanging encryption keys only known between shared parties.

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

SearchHealthIT

SearchDisasterRecovery

  • disaster recovery plan (DRP)

    A disaster recovery plan (DRP) is a documented, structured approach that describes how an organization can quickly resume work ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

SearchStorage

  • logical unit number (LUN)

    A logical unit number (LUN) is a unique identifier for designating an individual or collection of physical or virtual storage ...

  • NVMe over Fabrics (NVMe-oF)

    NVMe over Fabrics, also known as NVMe-oF and non-volatile memory express over fabrics, is a protocol specification designed to ...

  • CIFS (Common Internet File System)

    CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an ...

Close