Browse Definitions :

Browse Definitions by Alphabet

SEC - SEL

  • secondary data - Secondary data is research data that has previously been gathered and can be accessed by researchers.
  • secondary storage - Secondary storage is storage for noncritical data that does not need to be frequently accessed.
  • SecOps (DevSecOps) - SecOps, also called DevSecOps, is a management approach that connects security and operations teams, similar to how DevOps unifies software developers and operations professionals.
  • secret key - A private (secret) key is an encryption key whose value should never be made public.
  • secret key algorithm - A secret key algorithm (sometimes called a symmetric algorithm) is a cryptographic algorithm that uses the same key to encrypt and decrypt data.
  • secret key algorithm (symmetric algorithm) - A secret key algorithm (sometimes called a symmetric algorithm) is a cryptographic algorithm that uses the same key to encrypt and decrypt data.
  • Section 508 - Section 508, an amendment to the United States Workforce Rehabilitation Act of 1973, is a federal law mandating that all electronic and information technology developed, procured, maintained, or used by the federal government be accessible to people with disabilities.
  • sector - On a computer diskette or hard disk, a sector is one of the "pie slices" the diskette or disk is divided into.
  • secure container - A secure container is a lightweight, executable software package that has been isolated from other software or processes running on the same virtual or physical host.
  • Secure Digital card - SD cards use flash memory to provide nonvolatile storage.
  • Secure Digital card (SD card) - SD cards use flash memory to provide nonvolatile storage.
  • Secure Digital Extended Capacity card (SDXC) - A Secure Digital Extended Capacity (SDXC) card is a very small flash memory card that resembles a SD (Secure Digital) card, but has far greater storage capacity.
  • Secure Electronic Transaction - Secure Electronic Transaction (SET) is a system for ensuring the security of financial transactions on the Internet.
  • Secure Electronic Transaction (SET) - Secure Electronic Transaction (SET) is a system for ensuring the security of financial transactions on the Internet.
  • Secure File Transfer Protocol (SSH File Transfer Protocol) - SFTP is a term that refers to either Secure File Transfer Protocol or SSH File Transfer Protocol, and is a computing network protocol for accessing and managing files on remote systems.
  • Secure HTTP - S-HTTP (Secure HTTP) is an extension to the Hypertext Transfer Protocol (HTTP) that allows the secure exchange of files on the World Wide Web.
  • Secure Multi Purpose Internet Mail Extensions - S/MIME (Secure Multi-Purpose Internet Mail Extensions) is a secure method of sending e-mail that uses the Rivest-Shamir-Adleman encryption system.
  • Secure Multi-Purpose Internet Mail Extensions - S/MIME (Secure Multi-Purpose Internet Mail Extensions) is a secure method of sending e-mail that uses the Rivest-Shamir-Adleman encryption system.
  • secure real time transport protocol - SRTP (Secure Real-Time Transport Protocol or Secure RTP) is an extension to RTP (Real-Time Transport Protocol) that incorporates enhanced security features.
  • Secure Real-Time Transport Protocol - SRTP (Secure Real-Time Transport Protocol or Secure RTP) is an extension to RTP (Real-Time Transport Protocol) that incorporates enhanced security features.
  • secure realtime transport protocol - SRTP (Secure Real-Time Transport Protocol or Secure RTP) is an extension to RTP (Real-Time Transport Protocol) that incorporates enhanced security features.
  • Secure RTP - SRTP (Secure Real-Time Transport Protocol or Secure RTP) is an extension to RTP (Real-Time Transport Protocol) that incorporates enhanced security features.
  • Secure Shell - SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system administrators, a secure way to access a computer over an unsecured network.
  • Secure Shell (SSH) - SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system administrators, a secure way to access a computer over an unsecured network.
  • Secure Shell Charter - The Secure Shell Charter (SSH Charter) is a set of papers produced by the Secure Shell Working Group (SSH Working Group), an organization dedicated to updating and standardizing the popular Unix-based interface and protocol known as Secure Shell (SSH or secsh).
  • Secure Shell Charter (SSH Charter) - The Secure Shell Charter (SSH Charter) is a set of papers produced by the Secure Shell Working Group (SSH Working Group), an organization dedicated to updating and standardizing the popular Unix-based interface and protocol known as Secure Shell (SSH or secsh).
  • Secure Socket Shell - SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system administrators, a secure way to access a computer over an unsecured network.
  • Secure Sockets Layer - Secure Sockets Layer (SSL) is a computer networking protocol for securing connections between network application clients and servers over an insecure network, such as the internet.
  • Secure Sockets Layer virtual private network - An SSL VPN is a type of virtual private network that uses the Secure Sockets Layer protocol -- or, more often, its successor, the Transport Layer Security (TLS) protocol -- in standard web browsers to provide secure, remote-access VPN capability.
  • Securing Knowledge Innovation and Leadership Act - The Securing Knowledge, Innovation and Leadership Act, also called the SKIL Bill, was introduced in 2006 by the United States (U.
  • Securing Knowledge, Innovation and Leadership Act - The Securing Knowledge, Innovation and Leadership Act, also called the SKIL Bill, was introduced in 2006 by the United States (U.
  • Securities and Exchange Act of 1934 (Exchange Act) - The Securities and Exchange Act of 1934 (Exchange Act) is a law that governs secondary trading and stock exchanges.
  • Securities and Exchange Commission - The Securities and Exchange Commission (SEC) is a U.
  • Securities and Exchange Commission (SEC) - The Securities and Exchange Commission (SEC) is a U.
  • security - Security, in information technology (IT), is the defense of digital information and IT assets against internal and external, malicious and accidental threats.
  • security (finance) - A security, in a financial context, is a certificate or other financial instrument that has monetary value and can be traded.
  • Security Accounts Manager - The Security Accounts Manager (SAM) is a database in the Windows operating system (OS) that contains user names and passwords.
  • Security Accounts Manager (SAM) - The Security Accounts Manager (SAM) is a database in the Windows operating system (OS) that contains user names and passwords.
  • Security as a Service - Security-as-a-service (SaaS) is an outsourcing model for security management.
  • Security as a Service (SaaS) - Security-as-a-service (SaaS) is an outsourcing model for security management.
  • Security Assertion Markup Language - The Security Assertion Markup Language (SAML) is an open standard for sharing security information about identity, authentication and authorization across different systems.
  • security audit - A security audit is a systematic evaluation of the security of a company's information system by measuring how well it conforms to a set of established criteria.
  • security awareness training - Security awareness training is a formal process for educating employees about corporate policies and procedures for working with information technology (IT).
  • security by design - Security by design is an approach to software and hardware development that seeks to make systems as free of vulnerabilities and impervious to attack as possible through such measures as continuous testing, authentication safeguards and adherence to best practices.
  • security certification - Certified Information Systems Security Professional (CISSP) is an information security certification developed by the International Information Systems Security Certification Consortium, also known as (ISC)².
  • security clearance - A security clearance is an authorization that allows access to information that would otherwise be forbidden.
  • security debt - Security debt is a variant of technical debt that occurs when organizations do not invest enough money or resources into security efforts upfront.
  • Security definitions - This is a WhatIs.
  • Security Descriptor Definition Language - Security Descriptor Definition Language (SDDL) is a formal way to specify Microsoft Windows security descriptors or text strings that describe who owns various objects such as files in the system.
  • Security Descriptor Definition Language (SDDL) - Security Descriptor Definition Language (SDDL) is a formal way to specify Microsoft Windows security descriptors or text strings that describe who owns various objects such as files in the system.
  • security event - A security event is a change in the everyday operations of a network or IT service, indicating that an security policy may have been violated or a security safeguard may have failed.
  • security ID - In Windows NT and 2000 operating systems, the security identifier (SID) is a unique alphanumeric character string that identifies each operating system and each user in a network of NT/2000 systems.
  • security identifier - In Windows NT and 2000 operating systems, the security identifier (SID) is a unique alphanumeric character string that identifies each operating system and each user in a network of NT/2000 systems.
  • security identifier (SID) - In Windows NT and 2000 operating systems, the security identifier (SID) is a unique alphanumeric character string that identifies each operating system and each user in a network of NT/2000 systems.
  • security incident - A security incident is an event that may indicate that an organization's systems or data have been compromised.
  • security information and event management (SIEM) - Security information and event management (SIEM) is an approach to security management that seeks to provide a holistic view of organization’s information technology (IT) security.
  • security information management - Security information management (SIM) is the practice of collecting, monitoring and analyzing security-related data from computer logs.
  • security information management (SIM) - Security information management (SIM) is the practice of collecting, monitoring and analyzing security-related data from computer logs.
  • security intelligence (SI) - Security intelligence (SI) is the information relevant to protecting an organization from external and inside threats as well as the processes, policies and tools designed to gather and analyze that information.
  • Security Learning Guides - We've gathered a collection of our learning guides and tutorials on security-related topics.
  • Security Operations Center (SOC) - A security operations center (SOC) is a command center facility for a team of IT professionals with expertise in information security that is responsible for monitoring, analyzing and protecting an organization from cyber attacks.
  • security policy - In business, a security policy is a document that states in writing how a company plans to protect the company's physical and information technology (IT) assets.
  • Security Quizzes - We've gathered a collection of our quizzes on security-related topics.
  • security theater - Security theater includes any measures taken by a company or security team to create an atmosphere of safety that may only achieve the appearance of heightened security.
  • security through minority - Security through minority is an approach that relies upon infrequently-used code for its effectiveness.
  • security through obscurity - Security through obscurity (STO) is reliance upon secrecy in software development to minimize the chance that weaknesses may be detected and targeted.
  • security through obsolescence - Security through obsolescence is the use of obsolete technologies whose vulnerabilities are no longer well known among the public.
  • security token - A security token (sometimes called an authentication token) is a small hardware device that the owner carries to authorize access to a network service.
  • security token (authentication token) - A security token (sometimes called an authentication token) is a small hardware device that the owner carries to authorize access to a network service.
  • Security Trust and Assurance Registry - The Security, Trust and Assurance Registry (STAR) is an online registry of cloud provider security controls.
  • Security, Trust and Assurance Registry (STAR) - The Security, Trust and Assurance Registry (STAR) is an online registry of cloud provider security controls.
  • SED - SED (surface-conduction electron-emitter display) is a flat-panel, high-resolution display developed by Canon and Toshiba that will compete with LCD and plasma displays.
  • SED TV - SED (surface-conduction electron-emitter display) is a flat-panel, high-resolution display developed by Canon and Toshiba that will compete with LCD and plasma displays.
  • SED TV (surface-conduction electron-emitter display television) - SED (surface-conduction electron-emitter display) is a flat-panel, high-resolution display developed by Canon and Toshiba that will compete with LCD and plasma displays.
  • Seebeck effect - The Seebeck effect describes the generation of electricity following the connection of two dissimilar electrical conductors or semiconductors that illustrates the thermoelectric effect.
  • SeeBeyond - SeeBeyond makes integration server software for enterprises and was a pioneer in marketing an enterprise application integration (EAI) product.
  • seed capital - Seed capital is the funding required to get a new business started.
  • segment - A segment is a defined portion or section of something larger such as a database, geometric object, or network.
  • segment routing - Segment routing is a computer networking process used by networking and traffic engineering professionals that organizes collections of information, or packets, to follow a linear set of instructions.
  • segmentation - In a packet-switched telecommunication network, segmentation and reassembly (SAR, sometimes just referred to as segmentation) is the process of breaking a packet into smaller units before transmission and reassembling them into the proper order at the receiving end of the communication.
  • segmentation and reassembly - In a packet-switched telecommunication network, segmentation and reassembly (SAR, sometimes just referred to as segmentation) is the process of breaking a packet into smaller units before transmission and reassembling them into the proper order at the receiving end of the communication.
  • segmentation and reassembly (SAR) - In a packet-switched telecommunication network, segmentation and reassembly (SAR, sometimes just referred to as segmentation) is the process of breaking a packet into smaller units before transmission and reassembling them into the proper order at the receiving end of the communication.
  • segmented memory - Segmented memory is a system of addressing computer memory, which may be physical or virtual and may be operating in real or protected mode.
  • segregation of duties (SoD) - Segregation of duties (SoD) is an internal control designed to prevent error and fraud by ensuring that at least two individuals are responsible for the separate parts of any task.
  • SEI - The Software Engineering Institute (SEI) is a research, development and training center involved in computer software and network security.
  • seize - To seize is to take or wrest control of something that you did not previously control.
  • selective outsourcing - Selective outsourcing is a targeted sourcing strategy that relies upon sending very specific functions and work off-premises while keeping other functions on-premises.
  • selenium - What is selenium?Selenium is a non-metallic element that is often used as a semiconductor material, as a rectifier or in xerography.
  • self directed work team - A self-directed work team (SDWT) is a group of people, usually employees in a company, who combine different skills and talents to work without the usual managerial supervision toward a common purpose or goal.
  • Self Monitoring Analysis & Reporting Technology - Self-Monitoring Analysis and Reporting Technology (S.
  • Self Scanned Amorphous Silicon Integrated Display - Self-Scanned Amorphous Silicon Integrated Display (SASID) is the trade name for an active-matrix liquid crystal display (AMLCD) technology developed by Sarnoff Corporation.
  • self service business intelligence - Self-service business intelligence (BI) is an approach to data analytics that enables business users to access and work with corporate data even if they do not have a background in statistical analysis, BI or data mining.
  • self-assembly - Self-assembly is a branch of nanotechnology in which objects, devices, and systems form structures without external prodding.
  • self-destructing email - Self-destructing email is electronic mail that vanishes or becomes unreadable after a certain length of time or upon the request of the sender.
  • self-directed work team - A self-directed work team (SDWT) is a group of people, usually employees in a company, who combine different skills and talents to work without the usual managerial supervision toward a common purpose or goal.
  • self-directed work team (SDWT) - A self-directed work team (SDWT) is a group of people, usually employees in a company, who combine different skills and talents to work without the usual managerial supervision toward a common purpose or goal.
  • self-driving car (autonomous car or driverless car) - A self-driving car (sometimes called an autonomous car or driverless car) is a vehicle that uses a combination of sensors, cameras, radar and artificial intelligence (AI) to travel between destinations without a human operator.
  • self-healing - In information technology, self-healing describes any device or system that has the ability to perceive that it is not operating correctly and, without human intervention, make the necessary adjustments to restore itself to normal operation.
  • Self-Monitoring Analysis & Reporting Technology - Self-Monitoring Analysis and Reporting Technology (S.
  • Self-Monitoring Analysis & Reporting Technology (S.M.A.R.T.) - Self-Monitoring Analysis and Reporting Technology (S.

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • spyware

    Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.

  • application whitelisting

    Application whitelisting is the practice of specifying an index of approved software applications or executable files that are ...

  • botnet

    A botnet is a collection of internet-connected devices, which may include PCs, servers, mobile devices and internet of things ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • DRAM (dynamic random access memory)

    Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

Close