Browse Definitions:
  • August 29, 2014 29 Aug'14

    document sanitization

    In addition to making sure the document text doesn’t openly divulge anything it shouldn’t, document sanitization includes removing document metadata that could pose a privacy or security risk.  Continue Reading

  • August 29, 2014 29 Aug'14

    metadata security

    Metadata is defined as “data about data.” It adds information to data that makes it possible to process it automatically and to effectively find, categorize, share and reuse it, among other things. However, metadata that is accessed by unauthorized ...  Continue Reading

  • August 29, 2014 29 Aug'14

    Slingshot

    Slingshot is Facebook's photograph sharing smartphone application, developed to compete with services like Snapchat and Instagram. Slingshot is available for iOS and Android. The app is modeled on Snapchat and, like Snapchat, is designed to send ...  Continue Reading

  • August 29, 2014 29 Aug'14

    GPS tracking

    GPS tracking is the surveillance of location through use of the Global Positioning System (GPS ) to track the location of an entity or object remotely. The technology can pinpoint longitude, latitude, ground speed, and course direction of the target.  Continue Reading

  • August 29, 2014 29 Aug'14

    DSC pull server

    A DSC pull server (desired state configuration pull server) is an automation server that allows configurations to be maintained on many servers, computer workstations and devices across a network.  Continue Reading

  • August 29, 2014 29 Aug'14

    passive scanning

    Passive scanning is a method of vulnerability detection that relies on information gleaned from network data that is captured from a target computer without direct interaction.  Continue Reading

  • August 29, 2014 29 Aug'14

    magnetic storage

    Magnetic storage has been around in many forms since 1888 by Oberlan Smith, who publicized his audio recording on a wire in Electrical World. In broad terms, magnetic storage mostly works very similarly to Smith's recording. Read and write heads (...  Continue Reading

  • August 29, 2014 29 Aug'14

    document lifecycle

    The document lifecycle is the sequence of stages that a document goes through from its creation to its eventual archival or destruction. Proper procedures throughout the document’s lifecycle are an important part of enterprise content management (...  Continue Reading

  • August 28, 2014 28 Aug'14

    sensitive information

    Sensitive information is data that must be protected from unauthorized access to safeguard the privacy or security of an individual or organization.  Continue Reading

  • August 28, 2014 28 Aug'14

    mindfulness training

    Mindfulness training is the teaching or learning of practices designed to help participants increase their ability to live fully in the present moment. The ability to be present and aware is a powerful counter to the common tendencies to relive past...  Continue Reading

  • August 27, 2014 27 Aug'14

    document metadata

    Document metadata is information attached to a text-based file that may not be visible on the face of the document; documents may also contain supporting elements such as graphic images, photographs, tables and charts, each of which can have its own...  Continue Reading

  • August 22, 2014 22 Aug'14

    BIOS (basic input/output system)

    BIOS (basic input/output system) is the program a personal computer's microprocessor uses to get the computer system started after you turn it on. It also manages data flow between the computer's operating system and attached devices such as the ...  Continue Reading

  • August 22, 2014 22 Aug'14

    multi-tenancy

    Multi-tenancy is an architecture in which a single instance of a software application serves multiple customers. Each customer is called a tenant. Tenants may be given the ability to customize some parts of the application, such as color of the user...  Continue Reading

  • August 21, 2014 21 Aug'14

    redundant array of inexpensive servers (RAIS)

    A redundant array of inexpensive servers (RAIS) is the use of multiple servers with load balancing to manage demand across servers and allow one server to take over for another in the case of failure.  Continue Reading

  • August 21, 2014 21 Aug'14

    active attack

    An active attack is a network exploit in which a hacker attempts to make changes to data on the target or data en route to the target. In a masquerade attack, for example, the intruder pretends to be a particular user of a system to gain access or ...  Continue Reading

  • August 21, 2014 21 Aug'14

    passive attack

    A passive attack is a network attack in which a system is monitored and sometimes scanned for open ports and vulnerabilities. The purpose is solely to gain information about the target and no data is changed on the target.  Continue Reading

  • August 20, 2014 20 Aug'14

    surveillance metadata

    Surveillance metadata is details about data pertaining to the actions of an observed party. Surveillance metadata not only facilitates categorizing and retrieving content but provides information on its own and may also be used to legitimize ...  Continue Reading

  • August 15, 2014 15 Aug'14

    false positive

    This definition of false positive explains what the term means and how it applies in various contexts. We also discuss the difference between false positives and false negatives and include links to more information.  Continue Reading

  • August 14, 2014 14 Aug'14

    multipoint control unit (MCU)

    A multipoint control unit (MCU) is a type of video conferencing hardware that bridges terminals involved into a multi-point conference system. MCU makes it possible for a multipoint audio/video conference to be controlled and moderated from a ...  Continue Reading

  • August 14, 2014 14 Aug'14

    raster graphics

    Raster graphics are digital images created or captured (for example, by scanning in a photo) as a set of samples of a given space.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

SearchSecurity

SearchHealthIT

SearchDisasterRecovery

  • incident management plan (IMP)

    An incident management plan (IMP), sometimes called an incident response plan or emergency management plan, is a document that ...

  • crisis communication

    Crisis communication is a method of corresponding with people and organizations during a disruptive event to provide them with ...

  • Zerto

    Zerto is a storage software vendor that specializes in enterprise-class business continuity and disaster recovery in virtual and ...

SearchStorage

  • SSD write cycle

    An SSD write cycle is the process of programming data to a NAND flash memory chip in a solid-state storage device.

  • data storage

    Data storage is the collective methods and technologies that capture and retain digital information on electromagnetic, optical ...

  • hard disk

    A hard disk is part of a unit -- often called a disk drive, hard drive or hard disk drive -- that stores and provides relatively ...

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close