Browse Definitions :

Browse Definitions by Alphabet

This Content Component encountered an error
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • two-factor authentication (2FA)

    Two-factor authentication (2FA), sometimes referred to as two-step verification or dual-factor authentication, is a security ...

  • What is steganography?

    Steganography (pronounced STEHG-uh-NAH-gruhf-ee, from Greek steganos, or "covered," and graphie, or "writing") is the hiding of a...

  • domain generation algorithm (DGA)

    A domain generation algorithm (DGA) is a program that generates a large list of domain names. DGA provides malware with new ...

SearchHealthIT
SearchDisasterRecovery
  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

SearchStorage
  • Serial ATA (Serial Advanced Technology Attachment or SATA)

    Serial ATA (Serial Advanced Technology Attachment or SATA) is a command and transport protocol that defines how data is ...

  • M.2 SSD

    An M.2 SSD is a small form factor solid-state drive (SSD) that is used in internally mounted storage expansion cards.

  • What is failover?

    Failover is a backup operational mode in which the functions of a system component (such as a processor, server, network, or ...

Close