Browse Definitions :

Browse Definitions by Alphabet

CER - CHA

  • certificate authority - A certificate authority (CA) is a trusted entity that issues digital certificates, which are data files used to cryptographically link an entity with a public key.
  • certificate authority (CA) - A certificate authority (CA) is a trusted entity that issues digital certificates, which are data files used to cryptographically link an entity with a public key.
  • Certificate of Competency - In defense contracting, a Certificate of Competency states that the holder is authorized to receive and perform on a specific government contract.
  • Certificate Revocation List - A Certificate Revocation List (CRL) is a list of digital certificates that have been revoked by the issuing Certificate Authority and should not be trusted.
  • Certificate Revocation List (CRL) - A Certificate Revocation List (CRL) is a list of digital certificates that have been revoked by the issuing Certificate Authority and should not be trusted.
  • certification - In information technology as in other fields such as teaching, accounting, and acupuncture, certification is a formal process of making certain that an individual is qualified in terms of particular knowledge or skills.
  • certified 8(a) - In defense contracting, a Certified 8(a) Firm is a firm that is eligible to receive eligible to receive federal contracts under the Small Business Administration's 8(a) Business Development Program because it is owned and operated by socially and economically disadvantaged individuals.
  • certified 8(a) firm - In defense contracting, a Certified 8(a) Firm is a firm that is eligible to receive eligible to receive federal contracts under the Small Business Administration's 8(a) Business Development Program because it is owned and operated by socially and economically disadvantaged individuals.
  • certified 8a - In defense contracting, a Certified 8(a) Firm is a firm that is eligible to receive eligible to receive federal contracts under the Small Business Administration's 8(a) Business Development Program because it is owned and operated by socially and economically disadvantaged individuals.
  • Certified Associate in Project Management (CAPM) - Certified Associate in Project Management (CAPM) is a vendor-neutral, entry-level certification for individuals interested in entering the project management (PM) field.
  • Certified Cloud Security Professional (CCSP) - The Certified Cloud Security Professional (CCSP) certification is intended for experienced IT professionals who have a minimum of five years of experience in the industry with three of those years being in information security and one year in one of the six CCSP domains.
  • certified e-mail - Certified e-mail, also known as authenticated e-mail or stamped e-mail, is a system in which senders of commercial e-mail messages pay a small fee to ensure that their messages will bypass spam filters to reach intended recipients.
  • certified e-mail (authenticated e-mail or stamped e-mail) - Certified e-mail, also known as authenticated e-mail or stamped e-mail, is a system in which senders of commercial e-mail messages pay a small fee to ensure that their messages will bypass spam filters to reach intended recipients.
  • certified email - Certified e-mail, also known as authenticated e-mail or stamped e-mail, is a system in which senders of commercial e-mail messages pay a small fee to ensure that their messages will bypass spam filters to reach intended recipients.
  • Certified in Risk and Information Systems Control (CRISC) - Certified in Risk and Information Systems Control (CRISC) is a certification program that recognizes knowledge and training in the field of risk management for IT.
  • Certified in the Governance of Enterprise IT (CGEIT) - Certified in the Governance of Enterprise IT (CGEIT) is a vendor-neutral certification for experienced tech professionals looking to expand their knowledge and skills in enterprise information technology (IT) governance.
  • Certified Information Security Manager (CISM) - Certified Information Security Manager (CISM) is an advanced certification which indicates that an individual possesses the knowledge and experience required to develop and manage an enterprise information security (infosec) program.
  • Certified Information Systems Auditor - The Certified Information Systems Auditor (CISA) is a certification and globally recognized standard for appraising an IT auditor's knowledge, expertise and skill in assessing vulnerabilities and instituting IT controls in an enterprise environment.
  • Certified Information Systems Auditor (CISA) - The Certified Information Systems Auditor (CISA) is a certification and globally recognized standard for appraising an IT auditor's knowledge, expertise and skill in assessing vulnerabilities and instituting IT controls in an enterprise environment.
  • Certified Information Systems Risk and Compliance Professional (CISRCP) - A Certified Information Systems Risk and Compliance Professional (CISRCP) is a person in the information technology (IT) field that has passed an examination on risk and compliance topics developed by the International Association of Risk and Compliance Professionals (IARCP).
  • Certified Information Systems Security Professional - Certified Information Systems Security Professional (CISSP) is an information security certification developed by the International Information Systems Security Certification Consortium, also known as (ISC)².
  • Certified Information Systems Security Professional (CISSP) - Certified Information Systems Security Professional (CISSP) is an information security certification developed by the International Information Systems Security Certification Consortium, also known as (ISC)².
  • Certified Internet Webmaster - Certified Internet Webmaster (CIW) is a set of courses and exams that, when completed successfully, certifies an individual as capable in Web site development and server administration, including security and e-commerce.
  • Certified Internet Webmaster (CIW) - Certified Internet Webmaster (CIW) is a set of courses and exams that, when completed successfully, certifies an individual as capable in Web site development and server administration, including security and e-commerce.
  • Certified OpenStack Administrator - Certified OpenStack Administrator (COA) is a vendor-agnostic exam designed by the OpenStack Foundation in conjunction with a number of international partners to test an administrator's abilities in cloud management and day-to-day operations.
  • Certified ScrumMaster (CSM) - Certified ScrumMaster (CSM) is an entry-level credential designed to give professionals getting started as Scrum practitioners an understanding of the project management methodology.
  • Certified Wireless Networking Professional - Certified Wireless Networking Professional (CWNP)is the name for the family of wireless certifications from Planet3Wireless.
  • Certified Wireless Networking Professional (CWNP) - Certified Wireless Networking Professional (CWNP)is the name for the family of wireless certifications from Planet3Wireless.
  • CES (Consumer Electronics Show) - CES (International Consumer Electronics Show) is an annual technology conference for the consumer electronics industry.
  • CESG - CESG is the UK government's national technical authority for information assurance (IA).
  • CESG Good Practice Guides (GPG) - Good Practice Guides (GPG) are documents created by the CESG, which provides guidance on aspects of information assurance (IA) to help organisations manage risk effectively.
  • CF card - A CompactFlash card (CF card) is a memory card format developed by SanDisk in 1994 that uses flash memory technology to store data on a very small portable device.
  • CFAA - The Computer Fraud and Abuse Act (CFAA) of 1986 is United States legislation that made it a federal crime to access a protected computer without proper authorization.
  • CFB - Ciphertext feedback (CFB) is a mode of operation for a block cipher.
  • CFI - Custom factory integration (CFI) is an arrangement that a computer equipment vendor makes with a customer in which programs and files are pre-installed and the equipment is configured and tested at the factory prior to delivery.
  • cfl - A compact fluorescent light bulb (CFL) is a fluorescent light bulb that has been compressed into the size of a standard-issue incandescent light bulb.
  • CFML - CFML (ColdFusion Markup Language) is a Web page markup language that allows a Web site developer to create pages with variable information (text or graphics) that is filled in dynamically (on the fly) in response to variables such as user input.
  • CFML (ColdFusion Markup Language) - CFML (ColdFusion Markup Language) is a Web page markup language that allows a Web site developer to create pages with variable information (text or graphics) that is filled in dynamically (on the fly) in response to variables such as user input.
  • CFO - CFO (Chief Financial Officer) is the corporate title for the person responsible for managing the company's financial operations and strategy.
  • CFO (Chief Financial Officer) - CFO (Chief Financial Officer) is the corporate title for the person responsible for managing the company's financial operations and strategy.
  • CFR - The call failure rate (CFR) is the percentage of calls to an ISP or any network provider that fail to get through.
  • CGA - The term display mode refers to the characteristics of a computer display, in particular the maximum number of colors and the maximum image resolution (in pixels horizontally by pixels vertically).
  • CGI - Also see FastCGI.
  • CGI (computer-generated imagery) - CGI (computer-generated imagery) is used to produce visual content for many purposes including visual art, advertising, anatomical modeling, architectural design, engineering, video game art and film special effects, as well as augmented reality (AR) and virtual reality (VR) applications.
  • CGI scanner - A CGI (common gateway interface) scanner is a program that searches for known vulnerabilities in Web servers and application programs by testing HTTP requests against known CGI strings.
  • CGO - A CGO is a Chief Green Officer.
  • CGO (Chief Green Officer) - A CGO is a Chief Green Officer.
  • cgs - The small-unit metric system (or more formally, the centimeter-gram-second (cgs) system of units) is based on three fundamental units: the centimeter (cm), which quantifies displacement, the gram (g), which quantifies mass, and the second (s or sec), which quantifies time.
  • cgs system of units - The small-unit metric system (or more formally, the centimeter-gram-second (cgs) system of units) is based on three fundamental units: the centimeter (cm), which quantifies displacement, the gram (g), which quantifies mass, and the second (s or sec), which quantifies time.
  • chaffing - Chaffing and winnowing are dual components of a privacy-enhancement scheme that does not require encryption.
  • chalcogenide RAM - Phase-change memory (PCM) is a form of computer RAM (random-access memory) that stores data by altering the state of the matter from which the device is fabricated.
  • Challenge Handshake Authentication Protocol - CHAP (Challenge-Handshake Authentication Protocol) is a more secure procedure for connecting to a system than the Password Authentication Procedure (PAP).
  • challenge response authentication mechanism - CRAM (challenge-response authentication mechanism) is the two-level scheme for authenticating network users that is used as part of the Web's Hypertext Transfer Protocol (HTTP).
  • Challenge-Handshake Authentication Procedure - CHAP (Challenge-Handshake Authentication Protocol) is a more secure procedure for connecting to a system than the Password Authentication Procedure (PAP).
  • Challenge-Handshake Authentication Protocol - CHAP (Challenge-Handshake Authentication Protocol) is a more secure procedure for connecting to a system than the Password Authentication Procedure (PAP).
  • challenge-response authentication - In computer security, challenge-response authentication is a set of protocols used to protect digital assets and services from unauthorized users, programs or activities.
  • challenge-response authentication mechanism - CRAM (challenge-response authentication mechanism) is the two-level scheme for authenticating network users that is used as part of the Web's Hypertext Transfer Protocol (HTTP).
  • change agent (agent of change) - A change agent, or agent of change, is someone who promotes and enables change to happen within any group or organization.
  • change control - Change control is a systematic approach to managing all changes made to a product or system.
  • change data capture - Change data capture (CDC) is the process of capturing changes made at the data source and applying them throughout the enterprise.
  • change data capture (CDC) - Change data capture (CDC) is the process of capturing changes made at the data source and applying them throughout the enterprise.
  • change fatigue - Change fatigue is an organizational affliction that results from management-led change initiatives.
  • Change Healthcare - Change Healthcare is a healthcare technology provider of revenue cycle management, payment management and health information exchange (HIE) solutions.
  • change log - A change log is a record of requests for change (RFCs) submitted for all changes in a service.
  • change management - Change management is a systematic approach to dealing with the transition or transformation of an organization's goals, processes or technologies.
  • change management strategy - A change management strategy is a systematic approach to making adjustments to the application of a set of tools, processes or skills during a project or initiative.
  • change mode - In a UNIX-based operating system, chmod (change mode) is a command used by a file owner or administrator to change the definition of access permissions to a file or set of files.
  • change request - A change request is a formal proposal for an alteration to some product or system.
  • Changed Block Tracking (CBT) - VMware Changed Block Tracking is an incremental backup technology for virtual machines (VMs), comparable to snapshot differential or backup delta block.
  • channel - In telecommunications in general, a channel is a separate path through which signals can flow.
  • channel 64 - B8ZS (bipolar 8-zero substitution, also called binary 8-zero substitution, clear channel, and clear 64) is an encoding method used on T1 circuits that inserts two successive ones of the same voltage - referred to as a bipolar violation - into a signal whenever eight consecutive zeros are transmitted.
  • channel associated signaling - Channel-associated signaling (CAS) is signaling (for example, in a T-carrier system line) in which control signals, such as those for synchronizing and bounding frames, are carried in the same channels as voice and data signals.
  • channel bonding - RAIN (also called channel bonding, redundant array of independent nodes, reliable array of independent nodes, or random array of independent nodes) is a cluster of nodes connected in a network topology with multiple interfaces and redundant storage, providing fault tolerance and graceful degradation.
  • channel captain - A channel captain is the individual or organization responsible for managing a particular distribution channel and overseeing channel partnerships.
  • channel conflict - Channel conflict is a situation in which channel partners have to compete against one another or a vendor's internal sales department.
  • Channel Definition Format - The Channel Definition Format (CDF) is a file format from Microsoft that lets you create a file that defines a Web "channel," which is a preselected Web site or group of related Web sites.
  • channel extender - A channel extender is a device used with IBM's S/390 line of computers to increase the maximum communication distances between the S/390 channel-connected mainframe computers, or between an S/390 and peripheral devices such as workstations, printers, and storage devices.
  • channel partner - A channel partner is a person or organization that provides services or sells products on behalf of a software, hardware, networking or cloud services vendor.
  • channel partner portal - A channel partner portal is a web-based application that provides a vendor's established partners (usually distributors, resellers, service providers or other strategic partners) with access to deal registration, marketing resources, pricing and sales information for products and services, as well as technical details and support that are unavailable to other end users.
  • channel partner rules of engagement (ROE) - Channel partner rules of engagement are a component of the sales relationship between an IT vendor and its channel partner community.
  • Channel Service Unit - A CSU/DSU (Channel Service Unit/Data Service Unit) is a hardware device about the size of an external modem that converts a digital data frame from the communications technology used on a local area network (LAN) into a frame appropriate to a wide-area network (WAN) and vice versa.
  • Channel Service Unit/Data Service Unit - A CSU/DSU (Channel Service Unit/Data Service Unit) is a hardware device about the size of an external modem that converts a digital data frame from the communications technology used on a local area network (LAN) into a frame appropriate to a wide-area network (WAN) and vice versa.
  • channel strategy - A channel strategy is a vendor's plan for moving a product or a service through the chain of commerce to the end customer.
  • channel-associated signaling - Channel-associated signaling (CAS) is signaling (for example, in a T-carrier system line) in which control signals, such as those for synchronizing and bounding frames, are carried in the same channels as voice and data signals.
  • channelized T-1 - Integrated T1 (also called channelized T is a digital carrier modulation method in which a T1 line is divided into 24 channels, each having a maximum data speed of 64 thousand bits per second (Kbps), and each capable of supporting a unique application that can run concurrently with, but independently of, other applications on different channels.
  • channelized T1 - Integrated T1 (also called channelized T is a digital carrier modulation method in which a T1 line is divided into 24 channels, each having a maximum data speed of 64 thousand bits per second (Kbps), and each capable of supporting a unique application that can run concurrently with, but independently of, other applications on different channels.
  • chaos engineering - Chaos engineering is the process of testing a distributed computing system to ensure that it can withstand unexpected disruptions.
  • Chaos Monkey - Chaos Monkey is a software tool that was developed by Netflix engineers to test the resiliency and recoverability of their Amazon Web Services (AWS).
  • chaos theory - Chaos theory is the study of nonlinear dynamics, in which seemingly random events are actually predictable from simple deterministic equations.
  • CHAP - CHAP (Challenge-Handshake Authentication Protocol) is a more secure procedure for connecting to a system than the Password Authentication Procedure (PAP).
  • CHAP (Challenge-Handshake Authentication Protocol) - CHAP (Challenge-Handshake Authentication Protocol) is a more secure procedure for connecting to a system than the Password Authentication Procedure (PAP).
  • character - In information technology, a character is a printable symbol having phonetic or pictographic meaning and usually forming part of a word of text, depicting a numeral, or expressing grammatical punctuation.
  • characteristic impedance of free space - The characteristic impedance of free space, also called the Z o of free space, is an expression of the relationship between the electric-field and magnetic-field intensities in an electromagnetic field (EM field) propagating through a vacuum.
  • characters per inch - For a given font, cpi (characters per inch) is the number of typographic character that will fit on each inch of a printed line.
  • charge - In physics, charge, also known as electric charge, electrical charge, or electrostatic charge and symbolized q, is a characteristic of a unit of matter that expresses the extent to which it has more or fewer electrons than protons.
  • charge (electric charge) - In physics, charge, also known as electric charge, electrical charge, or electrostatic charge and symbolized q, is a characteristic of a unit of matter that expresses the extent to which it has more or fewer electrons than protons.
  • charge coupled device - A charge-coupled device (CCD) is a light-sensitive integrated circuit that stores and displays the data for an image in such a way that each pixel (picture element) in the image is converted into an electical charge the intensity of which is related to a color in the color spectrum.
  • charge cycle - The number of charge cycles a rechargeable battery can withstand before performance degrades is the accepted method of measurement for rating rechargeables’ charge cycles.
  • charge quantity - Charge quantity is an expression of the extent to which an object is electrically charged.
  • charge-coupled device - A charge-coupled device (CCD) is a light-sensitive integrated circuit that stores and displays the data for an image in such a way that each pixel (picture element) in the image is converted into an electical charge the intensity of which is related to a color in the color spectrum.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • threat modeling

    Threat modeling is a procedure for optimizing application, system or business process security by identifying objectives and ...

  • distributed denial-of-service (DDoS) attack

    A distributed denial-of-service (DDoS) attack is one in which multiple compromised computer systems attack a target, such as a ...

  • social engineering

    Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into ...

SearchHealthIT
SearchDisasterRecovery
  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

SearchStorage
  • bare-metal cloud

    Bare-metal cloud is a public cloud service that offers dedicated hardware resources without any installed operating systems or ...

  • race condition

    A race condition is an undesirable situation that occurs when a device or system attempts to perform two or more operations at ...

  • storage security

    Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted ...

Close