Browse Definitions :
197 results for:

URL

URL (Uniform Resource Locator)

Definition | searchNetworking

A URL (Uniform Resource Locator) is a unique identifier used to locate a resource on the internet. It is also referred to as a web address.

Bitly

Definition | WhatIs.com

Bitly is a URL shortener service that enables users to truncate webpage links.

open redirect

Definition | WhatIs.com

Open redirect is a security flaw in an app or a web page that causes it to fail to properly authenticate URLs.  When apps and web pages have ...

address bar

Definition | WhatIs.com

The address bar is the familiar text field at the top of a web browser’s graphical user interface (GUI) that displays the name or the URL (uniform ...

fully qualified domain name (FQDN)

Definition | WhatIs.com

A fully-qualified domain name (FQDN) is that portion of an Internet Uniform Resource Locator (URL) that fully identifies the server program that an ...

arachnotaxis

Definition | WhatIs.com

Arachnotaxis is the use of a table or structured list of URLs for Web sites (or words that hyperlink to Web sites) in order to help locate them.

absolute link

Definition | WhatIs.com

An absolute link is a hyperlink containing a full URL, which includes all the information needed to find a particular site, page or document or other...

top-level domain (TLD)

Definition | SearchAppArchitecture

A top-level domain (TLD) identifies the most general part of the domain name in an Internet address. The TLD always follows the last dot in a URL. (...

typosquatting

Definition | WhatIs.com

Typosquatting is a form of Internet cybersquatting, based on the probability that a certain number of Internet users will mistype the name of a Web ...

second-level domain (SLD)

Definition | WhatIs.com

A second-level domain (SLD) is the portion of a Uniform Resource Locator (URL) that identifies the specific and unique administrative owner ...

URI (Uniform Resource Identifier)

Definition | WhatIs.com

A URI (Uniform Resource Identifier) is a sequence of characters that identifies a logical or physical resource on a network. There are two types of ...

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • encryption

    Encryption is the method by which information is converted into secret code that hides the information's true meaning. The ...

  • cybersecurity

    Cybersecurity is the protection of internet-connected systems -- including hardware, software and data -- from cyberattacks.

  • computer worm

    A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

Close