Browse Definitions :
  • March 31, 2015 31 Mar'15


    Burstiness is an intermittent type of data transmission. That transmission type contrasts with with streamed, paced or continuous transmissions.  Continue Reading

  • March 31, 2015 31 Mar'15


    A vendor is an individual or company that sells goods or services to somone else in the economic production chain. Learn about different types of vendors.  Continue Reading

  • March 31, 2015 31 Mar'15

    hypervisor attack

    A hypervisor attack can allow hackers to take control of your VMs. While numerous guest OS and network security vulnerabilities exist in a virtual environment, a successful hypervisor attack could have devastating consequences.  Continue Reading

  • March 31, 2015 31 Mar'15

    attack surface analysis

    An organization's attack surface includes all the exploitable vulnerabilities in its hardware, software, connections and even its employees, in the form of social engineering. Attack surface analysis allows the organization to detect those ...  Continue Reading

  • March 31, 2015 31 Mar'15

    public sector

    The public sector is the segment of an economic system that is controlled by government; it contrasts with the private sector, which is run by private citizens.  Continue Reading

  • March 30, 2015 30 Mar'15

    PCI DSS vocabulary quiz

    Take this quiz to test your knowledge of abbreviations related to the Payment Card Industry Data Security Standard (PCI DSS).  Continue Reading

  • March 30, 2015 30 Mar'15

    Quick Start Glossary: PCI DSS (Payment Card Industry Data Security Standard)

    Payment Card Industry Data Security Standard (PCI DSS): Print the glossary out for a fast reference or access online to see full definitions and further resources.  Continue Reading

  • March 30, 2015 30 Mar'15

    RFC 1918

    RFC 1918 specifies ranges of IP addresses for use in private networks. These private IP addresses cannot be routed on the Internet.  Continue Reading

  • March 27, 2015 27 Mar'15

    network socket

    Sockets are created and used with a set of programming requests or "function calls" sometimes called the sockets application programming interface (API). The most common sockets API is the Berkeley UNIX C interface for sockets.  Continue Reading

  • March 26, 2015 26 Mar'15

    behavioral biometrics

    Behavioral biometrics are based on human activity such as typing patterns. The term contrasts with physical biometrics, which involves innate physical characteristics such as iris patterns or fingerprints.  Continue Reading

  • March 26, 2015 26 Mar'15

    National Vulnerability Database (NVD)

    NVD (National Vulnerability Database) is a product of the National Institute of Standards and Technology (NIST) Computer Security Division and is used by the U.S. Government for security management and compliance as well as automatic vulnerability ...  Continue Reading

  • March 26, 2015 26 Mar'15

    enterprise search

    There are a number of kinds of enterprise search including local installations, hosted versions, and search appliances, sometimes called “search in a box.” Each has relative advantages and disadvantages.  Continue Reading

  • March 26, 2015 26 Mar'15

    virtual payment terminal

    Virtual terminals allow sellers to take credit card payments online for orders made online or over the phone without requiring a card reader device.  Continue Reading

  • March 25, 2015 25 Mar'15

    critical path

    The critical path is the longest sequence of tasks in a project plan. Each task must be completed before the next can be begun.  Continue Reading

  • March 25, 2015 25 Mar'15

    negative float (negative slack)

    Negative float or slack is time that must be made up on a task on a project's critical path so that it does not delay the completion of a project.  Continue Reading

  • March 25, 2015 25 Mar'15

    float (project float, slack)

    In project management, float or slack is the time span between the completion of the last task on the critical path and the finish date for the project. Essentially, float is margin for error -- the amount of time that a task can be delayed without ...  Continue Reading

  • March 21, 2015 21 Mar'15

    cone of uncertainty

    The cone of uncertainty is a project management tool that illustrates the fact that the accuracy of estimates increases over the span of the project.  Continue Reading

  • March 20, 2015 20 Mar'15

    pick two (pick any two)

    Pick two is the principle that, for any given three desirable qualities, you are likely to only be able to achieve two out of the three.  Continue Reading

  • March 20, 2015 20 Mar'15

    triple constraint

    The project management triangle is also known as the triple constraint, the project management triple constraint and the the iron triangle. The model defines the most significant project management constraints: scope, time and cost.  Continue Reading

  • March 19, 2015 19 Mar'15

    constraint (project constraint)

    A project constraint is any limit or restriction applied to a project. The traditional triple constraint of project management, for example, consists of time, cost and scope.  Continue Reading



  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...


  • cybersecurity insurance (cybersecurity liability insurance)

    Cybersecurity insurance, also called cyber liability insurance or cyber insurance, is a contract that an entity can purchase to ...

  • phishing

    Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication ...

  • cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.



  • disaster recovery plan (DRP)

    A disaster recovery plan (DRP) is a documented, structured approach that describes how an organization can quickly resume work ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...


  • NVMe over Fabrics (NVMe-oF)

    NVMe over Fabrics, also known as NVMe-oF and non-volatile memory express over fabrics, is a protocol specification designed to ...

  • logical unit number (LUN)

    A logical unit number (LUN) is a unique identifier for designating an individual or collection of physical or virtual storage ...

  • CIFS (Common Internet File System)

    CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an ...