Browse Definitions :
  • March 31, 2015 31 Mar'15


    Burstiness is an intermittent type of data transmission. That transmission type contrasts with with streamed, paced or continuous transmissions.  Continue Reading

  • March 31, 2015 31 Mar'15


    A vendor is an individual or company that sells goods or services to somone else in the economic production chain. Learn about different types of vendors.  Continue Reading

  • March 31, 2015 31 Mar'15

    hypervisor attack

    A hypervisor attack can allow hackers to take control of your VMs. While numerous guest OS and network security vulnerabilities exist in a virtual environment, a successful hypervisor attack could have devastating consequences.  Continue Reading

  • March 31, 2015 31 Mar'15

    attack surface analysis

    An organization's attack surface includes all the exploitable vulnerabilities in its hardware, software, connections and even its employees, in the form of social engineering. Attack surface analysis allows the organization to detect those ...  Continue Reading

  • March 31, 2015 31 Mar'15

    public sector

    The public sector is the segment of an economic system that is controlled by government; it contrasts with the private sector, which is run by private citizens.  Continue Reading

  • March 30, 2015 30 Mar'15

    PCI DSS vocabulary quiz

    Take this quiz to test your knowledge of abbreviations related to the Payment Card Industry Data Security Standard (PCI DSS).  Continue Reading

  • March 30, 2015 30 Mar'15

    Quick Start Glossary: PCI DSS (Payment Card Industry Data Security Standard)

    Payment Card Industry Data Security Standard (PCI DSS): Print the glossary out for a fast reference or access online to see full definitions and further resources.  Continue Reading

  • March 30, 2015 30 Mar'15

    RFC 1918

    RFC 1918 specifies ranges of IP addresses for use in private networks. These private IP addresses cannot be routed on the Internet.  Continue Reading

  • March 27, 2015 27 Mar'15

    network socket

    Sockets are created and used with a set of programming requests or "function calls" sometimes called the sockets application programming interface (API). The most common sockets API is the Berkeley UNIX C interface for sockets.  Continue Reading

  • March 26, 2015 26 Mar'15

    behavioral biometrics

    Behavioral biometrics are based on human activity such as typing patterns. The term contrasts with physical biometrics, which involves innate physical characteristics such as iris patterns or fingerprints.  Continue Reading

  • March 26, 2015 26 Mar'15

    National Vulnerability Database (NVD)

    NVD (National Vulnerability Database) is a product of the National Institute of Standards and Technology (NIST) Computer Security Division and is used by the U.S. Government for security management and compliance as well as automatic vulnerability ...  Continue Reading

  • March 26, 2015 26 Mar'15

    enterprise search

    There are a number of kinds of enterprise search including local installations, hosted versions, and search appliances, sometimes called “search in a box.” Each has relative advantages and disadvantages.  Continue Reading

  • March 26, 2015 26 Mar'15

    virtual payment terminal

    Virtual terminals allow sellers to take credit card payments online for orders made online or over the phone without requiring a card reader device.  Continue Reading

  • March 25, 2015 25 Mar'15

    critical path

    The critical path is the longest sequence of tasks in a project plan. Each task must be completed before the next can be begun.  Continue Reading

  • March 25, 2015 25 Mar'15

    negative float (negative slack)

    Negative float or slack is time that must be made up on a task on a project's critical path so that it does not delay the completion of a project.  Continue Reading

  • March 25, 2015 25 Mar'15

    float (project float, slack)

    In project management, float or slack is the time span between the completion of the last task on the critical path and the finish date for the project. Essentially, float is margin for error -- the amount of time that a task can be delayed without ...  Continue Reading

  • March 21, 2015 21 Mar'15

    cone of uncertainty

    The cone of uncertainty is a project management tool that illustrates the fact that the accuracy of estimates increases over the span of the project.  Continue Reading

  • March 20, 2015 20 Mar'15

    pick two (pick any two)

    Pick two is the principle that, for any given three desirable qualities, you are likely to only be able to achieve two out of the three.  Continue Reading

  • March 20, 2015 20 Mar'15

    triple constraint

    The project management triangle is also known as the triple constraint, the project management triple constraint and the the iron triangle. The model defines the most significant project management constraints: scope, time and cost.  Continue Reading

  • March 19, 2015 19 Mar'15

    constraint (project constraint)

    A project constraint is any limit or restriction applied to a project. The traditional triple constraint of project management, for example, consists of time, cost and scope.  Continue Reading



  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...


  • identity provider

    An identity provider is a system component that is able to provide an end user or internet-connected device with a single set of ...

  • firewall

    A firewall is software or firmware that enforces a set of rules about what data packets will be allowed to enter or leave a ...

  • encryption

    Encryption is the method by which information is converted into secret code that hides the information's true meaning. The ...



  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider.