Browse Definitions :

Browse Definitions by Alphabet

SEC - SEL

  • Section 508 - Section 508, an amendment to the United States Workforce Rehabilitation Act of 1973, is a federal law mandating that all electronic and information technology developed, procured, maintained, or used by the federal government be accessible to people with disabilities.
  • sector - On a computer diskette or hard disk, a sector is one of the "pie slices" the diskette or disk is divided into.
  • Secure Access Service Edge (SASE) - Secure Access Service Edge, also known as SASE -- pronounced 'sassy' -- is a cloud architecture that bundles network and security solutions together and delivers them as a unified cloud service.
  • secure container - A secure container is a lightweight, executable software package that has been isolated from other software or processes running on the same virtual or physical host.
  • Secure Digital card - SD cards use flash memory to provide nonvolatile storage.
  • Secure Digital card (SD card) - SD cards use flash memory to provide nonvolatile storage.
  • Secure Digital Extended Capacity card (SDXC) - A Secure Digital Extended Capacity (SDXC) card is a very small flash memory card that resembles a SD (Secure Digital) card, but has far greater storage capacity.
  • Secure Electronic Transaction - Secure Electronic Transaction (SET) is a system for ensuring the security of financial transactions on the Internet.
  • Secure Electronic Transaction (SET) - Secure Electronic Transaction (SET) is a system for ensuring the security of financial transactions on the Internet.
  • Secure File Transfer Protocol (SSH File Transfer Protocol) - SFTP is a term that refers to either Secure File Transfer Protocol or SSH File Transfer Protocol, and is a computing network protocol for accessing and managing files on remote systems.
  • Secure HTTP - S-HTTP (Secure HTTP) is an extension to the Hypertext Transfer Protocol (HTTP) that allows the secure exchange of files on the World Wide Web.
  • Secure Multi Purpose Internet Mail Extensions - S/MIME (Secure Multi-Purpose Internet Mail Extensions) is a secure method of sending e-mail that uses the Rivest-Shamir-Adleman encryption system.
  • Secure Multi-Purpose Internet Mail Extensions - S/MIME (Secure Multi-Purpose Internet Mail Extensions) is a secure method of sending e-mail that uses the Rivest-Shamir-Adleman encryption system.
  • secure real time transport protocol - SRTP (Secure Real-Time Transport Protocol or Secure RTP) is an extension to RTP (Real-Time Transport Protocol) that incorporates enhanced security features.
  • Secure Real-Time Transport Protocol - SRTP (Secure Real-Time Transport Protocol or Secure RTP) is an extension to RTP (Real-Time Transport Protocol) that incorporates enhanced security features.
  • secure realtime transport protocol - SRTP (Secure Real-Time Transport Protocol or Secure RTP) is an extension to RTP (Real-Time Transport Protocol) that incorporates enhanced security features.
  • Secure RTP - SRTP (Secure Real-Time Transport Protocol or Secure RTP) is an extension to RTP (Real-Time Transport Protocol) that incorporates enhanced security features.
  • Secure Shell - SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system administrators, a secure way to access a computer over an unsecured network.
  • Secure Shell (SSH) - SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system administrators, a secure way to access a computer over an unsecured network.
  • Secure Socket Shell - SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system administrators, a secure way to access a computer over an unsecured network.
  • Secure Sockets Layer - Secure Sockets Layer (SSL) is a computer networking protocol for securing connections between network application clients and servers over an insecure network, such as the internet.
  • Secure Sockets Layer virtual private network - An SSL VPN is a type of virtual private network that uses the Secure Sockets Layer protocol -- or, more often, its successor, the Transport Layer Security (TLS) protocol -- in standard web browsers to provide secure, remote-access VPN capability.
  • Securities and Exchange Act of 1934 (Exchange Act) - The Securities and Exchange Act of 1934 (Exchange Act) is a law that governs secondary trading and stock exchanges.
  • Securities and Exchange Commission - The Securities and Exchange Commission (SEC) is a U.
  • Securities and Exchange Commission (SEC) - The Securities and Exchange Commission (SEC) is a U.
  • security - Security, in information technology (IT), is the defense of digital information and IT assets against internal and external, malicious and accidental threats.
  • security (finance) - A security, in a financial context, is a certificate or other financial instrument that has monetary value and can be traded.
  • Security Accounts Manager - The Security Accounts Manager (SAM) is a database in the Windows operating system (OS) that contains user names and passwords.
  • Security Accounts Manager (SAM) - The Security Accounts Manager (SAM) is a database in the Windows operating system (OS) that contains user names and passwords.
  • security analytics - Security analytics is an approach to cybersecurity that uses data collection, data aggregation and analysis tools for threat detection and security monitoring.
  • Security as a Service - Security-as-a-service (SaaS) is an outsourcing model for security management.
  • Security as a Service (SaaS) - Security-as-a-service (SaaS) is an outsourcing model for security management.
  • Security Assertion Markup Language - The Security Assertion Markup Language (SAML) is an open standard for sharing security information about identity, authentication and authorization across different systems.
  • security audit - A security audit is a systematic evaluation of the security of a company's information system by measuring how well it conforms to a set of established criteria.
  • security awareness training - Security awareness training is a formal process for educating employees about corporate policies and procedures for working with information technology (IT).
  • security by design - Security by design is an approach to software and hardware development that seeks to make systems as free of vulnerabilities and impervious to attack as possible through such measures as continuous testing, authentication safeguards and adherence to best practices.
  • security certification - Certified Information Systems Security Professional (CISSP) is an information security certification developed by the International Information Systems Security Certification Consortium, also known as (ISC)².
  • security clearance - A security clearance is an authorization that allows access to information that would otherwise be forbidden.
  • security debt - Security debt is a variant of technical debt that occurs when organizations do not invest enough money or resources into security efforts upfront.
  • Security Descriptor Definition Language - Security Descriptor Definition Language (SDDL) is a formal way to specify Microsoft Windows security descriptors or text strings that describe who owns various objects such as files in the system.
  • Security Descriptor Definition Language (SDDL) - Security Descriptor Definition Language (SDDL) is a formal way to specify Microsoft Windows security descriptors or text strings that describe who owns various objects such as files in the system.
  • security event - A security event is a change in the everyday operations of a network or IT service, indicating that an security policy may have been violated or a security safeguard may have failed.
  • security ID - In Windows NT and 2000 operating systems, the security identifier (SID) is a unique alphanumeric character string that identifies each operating system and each user in a network of NT/2000 systems.
  • security identifier - In Windows NT and 2000 operating systems, the security identifier (SID) is a unique alphanumeric character string that identifies each operating system and each user in a network of NT/2000 systems.
  • security identifier (SID) - In Windows NT and 2000 operating systems, the security identifier (SID) is a unique alphanumeric character string that identifies each operating system and each user in a network of NT/2000 systems.
  • security incident - A security incident is an event that may indicate that an organization's systems or data have been compromised.
  • security information and event management (SIEM) - Security information and event management (SIEM) is an approach to security management that combines SIM (security information management) and SEM (security event management) functions into one security management system.
  • security information management - Security information management (SIM) is the practice of collecting, monitoring and analyzing security-related data from computer logs.
  • security information management (SIM) - Security information management (SIM) is the practice of collecting, monitoring and analyzing security-related data from computer logs.
  • security intelligence (SI) - Security intelligence (SI) is the information relevant to protecting an organization from external and inside threats as well as the processes, policies and tools designed to gather and analyze that information.
  • security operations center (SOC) - A security operations center (SOC) is a command center facility for a team of IT professionals with expertise in information security who monitors, analyzes and protects an organization from cyber attacks.
  • security policy - In business, a security policy is a document that states in writing how a company plans to protect the company's physical and information technology (IT) assets.
  • security posture - Security posture refers to an organization's overall cybersecurity strength and how well it can predict, prevent and respond to ever-changing cyberthreats.
  • Security Quizzes - We've gathered a collection of our quizzes on security-related topics.
  • security theater - Security theater includes any measures taken by a company or security team to create an atmosphere of safety that may only achieve the appearance of heightened security.
  • security through minority - Security through minority is an approach that relies upon infrequently-used code for its effectiveness.
  • security through obscurity - Security through obscurity (STO) is reliance upon secrecy in software development to minimize the chance that weaknesses may be detected and targeted.
  • security through obsolescence - Security through obsolescence is the use of obsolete technologies whose vulnerabilities are no longer well known among the public.
  • security token - A security token (sometimes called an authentication token) is a small hardware device that the owner carries to authorize access to a network service.
  • security token (authentication token) - A security token (sometimes called an authentication token) is a small hardware device that the owner carries to authorize access to a network service.
  • Security Trust and Assurance Registry - The Security, Trust and Assurance Registry (STAR) is an online registry of cloud provider security controls.
  • Security, Trust and Assurance Registry (STAR) - The Security, Trust and Assurance Registry (STAR) is an online registry of cloud provider security controls.
  • SED - SED (surface-conduction electron-emitter display) is a flat-panel, high-resolution display developed by Canon and Toshiba that will compete with LCD and plasma displays.
  • SED TV - SED (surface-conduction electron-emitter display) is a flat-panel, high-resolution display developed by Canon and Toshiba that will compete with LCD and plasma displays.
  • SED TV (surface-conduction electron-emitter display television) - SED (surface-conduction electron-emitter display) is a flat-panel, high-resolution display developed by Canon and Toshiba that will compete with LCD and plasma displays.
  • Seebeck effect - The Seebeck effect describes the generation of electricity following the connection of two dissimilar electrical conductors or semiconductors that illustrates the thermoelectric effect.
  • SeeBeyond - SeeBeyond makes integration server software for enterprises and was a pioneer in marketing an enterprise application integration (EAI) product.
  • seed capital - Seed capital is the funding required to get a new business started.
  • segment - A segment is a defined portion or section of something larger such as a database, geometric object, or network.
  • segment routing - Segment routing is a computer networking process used by networking and traffic engineering professionals that organizes collections of information, or packets, to follow a linear set of instructions.
  • segmentation - In a packet-switched telecommunication network, segmentation and reassembly (SAR, sometimes just referred to as segmentation) is the process of breaking a packet into smaller units before transmission and reassembling them into the proper order at the receiving end of the communication.
  • segmentation and reassembly - In a packet-switched telecommunication network, segmentation and reassembly (SAR, sometimes just referred to as segmentation) is the process of breaking a packet into smaller units before transmission and reassembling them into the proper order at the receiving end of the communication.
  • segmentation and reassembly (SAR) - In a packet-switched telecommunication network, segmentation and reassembly (SAR, sometimes just referred to as segmentation) is the process of breaking a packet into smaller units before transmission and reassembling them into the proper order at the receiving end of the communication.
  • segmented memory - Segmented memory is a system of addressing computer memory, which may be physical or virtual and may be operating in real or protected mode.
  • segregation of duties (SoD) - Segregation of duties (SoD) is an internal control designed to prevent error and fraud by ensuring that at least two individuals are responsible for the separate parts of any task.
  • SEI - The Software Engineering Institute (SEI) is a research, development and training center involved in computer software and network security.
  • selective outsourcing - Selective outsourcing is a targeted sourcing strategy that relies upon sending very specific functions and work off-premises while keeping other functions on-premises.
  • selenium - What is selenium?Selenium is a non-metallic element that is often used as a semiconductor material, as a rectifier or in xerography.
  • self directed work team - A self-directed work team (SDWT) is a group of people, usually employees in a company, who combine different skills and talents to work without the usual managerial supervision toward a common purpose or goal.
  • Self Monitoring Analysis & Reporting Technology - Self-Monitoring Analysis and Reporting Technology (S.
  • self service business intelligence - Self-service business intelligence (BI) is an approach to data analytics that enables business users to access and work with corporate data even if they do not have a background in statistical analysis, BI or data mining.
  • self-assembly - Self-assembly is a branch of nanotechnology in which objects, devices, and systems form structures without external prodding.
  • self-destructing email - Self-destructing email is electronic mail that vanishes or becomes unreadable after a certain length of time or upon the request of the sender.
  • self-directed work team - A self-directed work team (SDWT) is a group of people, usually employees in a company, who combine different skills and talents to work without the usual managerial supervision toward a common purpose or goal.
  • self-directed work team (SDWT) - A self-directed work team (SDWT) is a group of people, usually employees in a company, who combine different skills and talents to work without the usual managerial supervision toward a common purpose or goal.
  • self-driving car (autonomous car or driverless car) - A self-driving car (sometimes called an autonomous car or driverless car) is a vehicle that uses a combination of sensors, cameras, radar and artificial intelligence (AI) to travel between destinations without a human operator.
  • self-healing - In information technology, self-healing describes any device or system that has the ability to perceive that it is not operating correctly and, without human intervention, make the necessary adjustments to restore itself to normal operation.
  • Self-Monitoring Analysis & Reporting Technology - Self-Monitoring Analysis and Reporting Technology (S.
  • Self-Monitoring Analysis & Reporting Technology (S.M.A.R.T.) - Self-Monitoring Analysis and Reporting Technology (S.
  • self-replication - In nanotechnology, self-replication is a process in which devices whose diameters are of atomic scale, on the order of nanometers, create copies of themselves.
  • self-scanning checkout (self-checkout) - Self-scanning checkout, also called "self-checkout" is an automated process that enables shoppers to scan, bag, and pay for their purchases without human assistance.
  • self-sending spam - Self-sending spam is unsolicited e-mail that looks like you sent it to yourself: your name appears on the "from" line as well as the "to" line.
  • self-service analytics - Self-service analytics is an approach to advanced analytics that gives the ability to conduct analyses to business users, rather than data scientists.
  • self-service business intelligence - Self-service business intelligence (BI) is an approach to data analytics that enables business users to access and work with corporate data even if they do not have a background in statistical analysis, BI or data mining.
  • self-service business intelligence (BI) - Self-service business intelligence (BI) is an approach to data analytics that enables business users to access and work with corporate data even if they don't have a background in BI, statistical analysis or data mining.
  • self-service cloud computing - Self-service cloud computing is a form of private cloud service where the customer provisions storage and launches applications without going through an external cloud service provider.
  • self-service rate (self-service bounce rate) - Self-service rate, also known as self-service completion rate, is a key performance indicator (KPI) used to analyze the effectiveness of a help desk or support team by measuring the percentage of issues that users are able to troubleshoot on their own.
  • self-sovereign identity - Self-sovereign identity (SSI) is a model for managing digital identities in which an individual or business has sole ownership over the ability to control their accounts and personal data.
  • selfie - A selfie is a self-portrait, typically a photograph, that is posted online.
  • selfie pay authentication - Selfie pay is a form of biometric authentication for financial transactions that confirms a person's identity by using facial recognition technology.

SearchCompliance

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

SearchHealthIT

SearchDisasterRecovery

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

  • cloud disaster recovery (cloud DR)

    Cloud disaster recovery (cloud DR) is a combination of strategies and services intended to back up data, applications and other ...

SearchStorage

  • RAM (Random Access Memory)

    RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data ...

  • business impact analysis (BIA)

    Business impact analysis (BIA) is a systematic process to determine and evaluate the potential effects of an interruption to ...

  • M.2 SSD

    An M.2 SSD is a solid-state drive that is used in internally mounted storage expansion cards of a small form factor.

Close