Browse Definitions :

Browse Definitions by Alphabet

SEC - SEQ

  • security analytics - Security analytics is an approach to cybersecurity that uses data collection, data aggregation and analysis tools for threat detection and security monitoring.
  • Security as a Service - Security-as-a-service (SaaS) is an outsourcing model for security management.
  • Security as a Service (SaaS) - Security-as-a-service (SaaS) is an outsourcing model for security management.
  • Security Assertion Markup Language - The Security Assertion Markup Language (SAML) is an open standard for sharing security information about identity, authentication and authorization across different systems.
  • security audit - A security audit is a systematic evaluation of the security of a company's information system by measuring how well it conforms to an established set of criteria.
  • security awareness training - Security awareness training is a formal process for educating employees about corporate policies and procedures for working with information technology (IT).
  • security by design - Security by design is an approach to software and hardware development that seeks to make systems as free of vulnerabilities and impervious to attack as possible through such measures as continuous testing, authentication safeguards and adherence to best practices.
  • security certification - Certified Information Systems Security Professional (CISSP) is an information security certification developed by the International Information Systems Security Certification Consortium, also known as (ISC)².
  • security clearance - A security clearance is an authorization that allows access to information that would otherwise be forbidden.
  • security debt - Security debt is a variant of technical debt that occurs when organizations do not invest enough money or resources into security efforts upfront.
  • Security Descriptor Definition Language - Security Descriptor Definition Language (SDDL) is a formal way to specify Microsoft Windows security descriptors or text strings that describe who owns various objects such as files in the system.
  • Security Descriptor Definition Language (SDDL) - Security Descriptor Definition Language (SDDL) is a formal way to specify Microsoft Windows security descriptors or text strings that describe who owns various objects such as files in the system.
  • security event - A security event is a change in the everyday operations of a network or IT service, indicating that an security policy may have been violated or a security safeguard may have failed.
  • security ID - In Windows NT and 2000 operating systems, the security identifier (SID) is a unique alphanumeric character string that identifies each operating system and each user in a network of NT/2000 systems.
  • security identifier - In Windows NT and 2000 operating systems, the security identifier (SID) is a unique alphanumeric character string that identifies each operating system and each user in a network of NT/2000 systems.
  • security identifier (SID) - In Windows NT and 2000 operating systems, the security identifier (SID) is a unique alphanumeric character string that identifies each operating system and each user in a network of NT/2000 systems.
  • security incident - A security incident is an event that may indicate that an organization's systems or data have been compromised or that measures put in place to protect them have failed.
  • security information and event management (SIEM) - Security information and event management (SIEM) is an approach to security management that combines SIM (security information management) and SEM (security event management) functions into one security management system.
  • security information management - Security information management (SIM) is the practice of collecting, monitoring and analyzing security-related data from computer logs.
  • security information management (SIM) - Security information management (SIM) is the practice of collecting, monitoring and analyzing security-related data from computer logs.
  • security intelligence (SI) - Security intelligence (SI) is the information relevant to protecting an organization from external and inside threats as well as the processes, policies and tools designed to gather and analyze that information.
  • security operations center (SOC) - A security operations center (SOC) is a command center facility for a team of IT professionals with expertise in information security who monitors, analyzes and protects an organization from cyber attacks.
  • security policy - In business, a security policy is a document that states in writing how a company plans to protect the company's physical and information technology (IT) assets.
  • security posture - Security posture refers to an organization's overall cybersecurity strength and how well it can predict, prevent and respond to ever-changing cyberthreats.
  • Security Quizzes - We've gathered a collection of our quizzes on security-related topics.
  • security theater - Security theater includes any measures taken by a company or security team to create an atmosphere of safety that may only achieve the appearance of heightened security.
  • security through minority - Security through minority is an approach that relies upon infrequently-used code for its effectiveness.
  • security through obscurity - Security through obscurity (STO) is reliance upon secrecy in software development to minimize the chance that weaknesses may be detected and targeted.
  • security through obsolescence - Security through obsolescence is the use of obsolete technologies whose vulnerabilities are no longer well known among the public.
  • security token - A security token (sometimes called an authentication token) is a small hardware device that the owner carries to authorize access to a network service.
  • security token (authentication token) - A security token (sometimes called an authentication token) is a small hardware device that the owner carries to authorize access to a network service.
  • Security Trust and Assurance Registry - The Security, Trust and Assurance Registry (STAR) is an online registry of cloud provider security controls.
  • Security, Trust and Assurance Registry (STAR) - The Security, Trust and Assurance Registry (STAR) is an online registry of cloud provider security controls.
  • SED - SED (surface-conduction electron-emitter display) is a flat-panel, high-resolution display developed by Canon and Toshiba that will compete with LCD and plasma displays.
  • SED TV - SED (surface-conduction electron-emitter display) is a flat-panel, high-resolution display developed by Canon and Toshiba that will compete with LCD and plasma displays.
  • SED TV (surface-conduction electron-emitter display television) - SED (surface-conduction electron-emitter display) is a flat-panel, high-resolution display developed by Canon and Toshiba that will compete with LCD and plasma displays.
  • Seebeck effect - The Seebeck effect describes the generation of electricity following the connection of two dissimilar electrical conductors or semiconductors that illustrates the thermoelectric effect.
  • SeeBeyond - SeeBeyond makes integration server software for enterprises and was a pioneer in marketing an enterprise application integration (EAI) product.
  • seed capital - Seed capital is the funding required to get a new business started.
  • segment - A segment is a defined portion or section of something larger such as a database, geometric object, or network.
  • segment routing - Segment routing is a computer networking process used by networking and traffic engineering professionals that organizes collections of information, or packets, to follow a linear set of instructions.
  • segmentation - In a packet-switched telecommunication network, segmentation and reassembly (SAR, sometimes just referred to as segmentation) is the process of breaking a packet into smaller units before transmission and reassembling them into the proper order at the receiving end of the communication.
  • segmentation and reassembly - In a packet-switched telecommunication network, segmentation and reassembly (SAR, sometimes just referred to as segmentation) is the process of breaking a packet into smaller units before transmission and reassembling them into the proper order at the receiving end of the communication.
  • segmented memory - Segmented memory is a system of addressing computer memory, which may be physical or virtual and may be operating in real or protected mode.
  • segregation of duties (SoD) - Segregation of duties (SoD) is an internal control designed to prevent error and fraud by ensuring that at least two individuals are responsible for the separate parts of any task.
  • SEI - The Software Engineering Institute (SEI) is a research, development and training center involved in computer software and network security.
  • selective outsourcing - Selective outsourcing is a targeted sourcing strategy that relies upon sending very specific functions and work off-premises while keeping other functions on-premises.
  • selenium - What is selenium?Selenium is a non-metallic element that is often used as a semiconductor material, as a rectifier or in xerography.
  • self checkout - Self-scanning checkout, also called "self-checkout" is an automated process that enables shoppers to scan, bag, and pay for their purchases without human assistance.
  • self directed work team - A self-directed work team (SDWT) is a group of people, usually employees in a company, who combine different skills and talents to work without the usual managerial supervision toward a common purpose or goal.
  • Self Monitoring Analysis & Reporting Technology - Self-Monitoring Analysis and Reporting Technology (S.
  • self scanning checkout - Self-scanning checkout, also called "self-checkout" is an automated process that enables shoppers to scan, bag, and pay for their purchases without human assistance.
  • self service business intelligence - Self-service business intelligence (BI) is an approach to data analytics that enables business users to access and explore data sets even if they don't have a background in BI or related functions like data mining and statistical analysis.
  • self-checkout - Self-scanning checkout, also called "self-checkout" is an automated process that enables shoppers to scan, bag, and pay for their purchases without human assistance.
  • self-directed work team - A self-directed work team (SDWT) is a group of people, usually employees in a company, who combine different skills and talents to work without the usual managerial supervision toward a common purpose or goal.
  • self-driving car (autonomous car or driverless car) - A self-driving car (sometimes called an autonomous car or driverless car) is a vehicle that uses a combination of sensors, cameras, radar and artificial intelligence (AI) to travel between destinations without a human operator.
  • Self-Monitoring Analysis & Reporting Technology - Self-Monitoring Analysis and Reporting Technology (S.
  • self-scanning - Self-scanning checkout, also called "self-checkout" is an automated process that enables shoppers to scan, bag, and pay for their purchases without human assistance.
  • self-scanning checkout - Self-scanning checkout, also called "self-checkout" is an automated process that enables shoppers to scan, bag, and pay for their purchases without human assistance.
  • self-service analytics - Self-service analytics is an approach to advanced analytics that gives the ability to conduct analyses to business users, rather than data scientists.
  • self-service business intelligence - Self-service business intelligence (BI) is an approach to data analytics that enables business users to access and explore data sets even if they don't have a background in BI or related functions like data mining and statistical analysis.
  • self-service business intelligence (self-service BI) - Self-service business intelligence (BI) is an approach to data analytics that enables business users to access and explore data sets even if they don't have a background in BI or related functions like data mining and statistical analysis.
  • self-service cloud computing - Self-service cloud computing is a form of private cloud service where the customer provisions storage and launches applications without going through an external cloud service provider.
  • self-service rate (self-service bounce rate) - Self-service rate, also known as self-service completion rate, is a key performance indicator (KPI) used to analyze the effectiveness of a help desk or support team by measuring the percentage of issues that users are able to troubleshoot on their own.
  • self-sovereign identity - Self-sovereign identity (SSI) is a model for managing digital identities in which an individual or business has sole ownership over the ability to control their accounts and personal data.
  • selfie - A selfie is a self-portrait, typically a photograph, that is posted online.
  • selfie pay authentication - Selfie pay is a form of biometric authentication for financial transactions that confirms a person's identity by using facial recognition technology.
  • SELinux (Security-Enhanced Linux) - SELinux, or Security-Enhanced Linux, is a part of the Linux security kernel that acts as a protective agent on servers.
  • SEM - Single-electron memory (SEM) refers to experimental hardware technologies in which the position or presence of a single charge carrier, usually an electron, makes the difference between the logical low (0) and high (1) states in a digital system.
  • semantic network (knowledge graph) - A semantic network is a knowledge structure that illustrates how concepts are related to one another and how they interconnect.
  • semantic search - Semantic search is an approach to locating information on the internet in which programming predicts context for a query.
  • semantic technology - Semantic technology is a set of methods and tools that provide advanced means for categorizing and processing data, as well as for discovering relationships within varied data sets.
  • semaphore - In programming, especially in Unix systems, semaphores are a technique for coordinating or synchronizing activities in which multiple processes compete for the same operating system resources.
  • semi-structured data - Semi-structured data is data that has not been organized into a specialized format, such as a table, a record, an array or a tree but that nevertheless has associated information, such as metadata, that makes it more amenable to processing than raw data.
  • semiconductor - A semiconductor is a substance, usually a solid chemical element or compound, that can conduct electricity under some conditions but not others, making it a good medium for the control of electrical current.
  • semiconductor fab - A semiconductor fab is a manufacturing plant in which raw silicon wafers are turned into integrated circuits.
  • Semios mesh network - Semios mesh network is the communications backbone of the Semios orchard farming automation platform.
  • semiotics - Semiotics is the study of the use of symbolic communication.
  • Senate Judiciary Committee (SJC) - The U.S.
  • sender pays - E-mail postage (sometimes referred to as sender pays) is a proposed system that would involve charging senders a very small amount of money (sometimes called a micropayment) for the delivery of each e-mail message sent.
  • sender permitted from - Sender Policy Framework (SPF) is an anti-spam approach in which the Internet domain of an e-mail sender can be authenticated for that sender, thereby discouraging spam mailers, who routinely disguise the origin of their e-mail, a practice known as e-mail spoofing.
  • Sender Policy Framework - Sender Policy Framework (SPF) is an anti-spam approach in which the Internet domain of an e-mail sender can be authenticated for that sender, thereby discouraging spam mailers, who routinely disguise the origin of their e-mail, a practice known as e-mail spoofing.
  • Sender Policy Framework (SPF) - Sender Policy Framework (SPF) is an anti-spam approach in which the Internet domain of an e-mail sender can be authenticated for that sender, thereby discouraging spam mailers, who routinely disguise the origin of their e-mail, a practice known as e-mail spoofing.
  • Sensex (BSE Sensex) - The Bombay Stock Exchange's Sensitive Index, called 'Sensex' or 'BSE Sensex' for short, is one of the leading stock market benchmark indices in India.
  • sensitive information - Sensitive information is data that must be protected from unauthorized access to safeguard the privacy or security of an individual or organization.
  • Sensitive Personal Data - Consumer privacy, also known as customer privacy, involves the handling and protection of the sensitive personal information provided by customers in the course of everyday transactions.
  • sensor - A sensor is a device that detects and responds to some type of input from the physical environment.
  • sensor analytics - Sensor analytics is the statistical analysis of data that’s created by wired or wireless sensors.
  • sensor data - Sensor data is the output of a device that detects and responds to some type of input from the physical environment.
  • sensor fusion - Sensor fusion is the combined use of multiple types of sensor data for a more complete picture of the sensor’s subject or environment.
  • sensor hub - A sensor hub is a connection point for multiple sensors that uses a multipoint control unit (MCU), coprocessor or digital signal processor (DSP) to compile and process data gathered from those sensors.
  • sentiment analysis (opinion mining) - Sentiment analysis, also referred to as opinion mining, is an approach to natural language processing (NLP) that identifies the emotional tone behind a body of text.
  • SEO - Search engine optimization (SEO) is an area of website development that seeks to improve the way content is ranked by search engines.
  • SEO poisoning (search poisoning) - Search poisoning, also known as search engine poisoning, is an attack involving malicious websites that are designed to show up prominently in search results.
  • Sequenced Packet Exchange - SPX (Sequenced Packet Exchange) is the protocol for handling packet sequencing in a Novell NetWare network.
  • SequenceFile - A SequenceFile is a flat, binary file type that serves as a container for data to be used in Hadoop distributed compute projects.
  • sequencer - In digital audio recording, a sequencer is a program in a computer or stand-alone keyboard unit that puts together a sound sequence from a series (or sequence) of Musical Instrument Digital Interface (MIDI) events (operations).
  • Sequential Couleur avec Memoire - SECAM (Sequential Couleur avec Memoire) is the television display technology that is standard in France, the countries of the former Soviet Union, and certain other countries.
  • Sequential Couleur avec Memoire (SECAM) - SECAM (Sequential Couleur avec Memoire) is the television display technology that is standard in France, the countries of the former Soviet Union, and certain other countries.
  • sequential logic - Sequential logic is a form of binary circuit design that employs one or more inputs and one or more outputs, whose states are related by defined rules that depend, in part, on previous states.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • biometric verification

    Biometric verification is any means by which a person can be uniquely identified by evaluating one or more distinguishing ...

  • password

    A password is a string of characters used to verify the identity of a user during the authentication process.

  • biometrics

    Biometrics is the measurement and statistical analysis of people's unique physical and behavioral characteristics.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • VRAM (video RAM)

    VRAM (video RAM) refers to any type of random access memory (RAM) specifically used to store image data for a computer display.

  • virtual memory

    Virtual memory is a memory management technique where secondary memory can be used as if it were a part of the main memory.

Close