Browse Definitions :
246 results for:

hacker

hacker

Definition | SearchSecurity

A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.

ethical hacker

Definition | SearchSecurity

An ethical hacker is a computer and networking expert who systematically attempts to penetrate a computer system or network on behalf of its owners ...

growth hacker

Definition | WhatIs.com

A growth hacker is a marketing professional with high-level IT skills. Depending on the particular company, growth hacking may include software ...

Jargon File (New Hacker's Dictionary)

Definition | WhatIs.com

The Jargon File is a compilation of computer-related slang that was first developed in 1975 by Raphael Finkel at Stanford University from sources ...

ooblick

Definition | WhatIs.com

According to Eric Raymond, compiler of The New Hacker's Dictionary, "ooblick" derives from the Dr.

black hat

Definition | SearchSecurity

Black hat refers to a hacker who breaks into a computer system or network with malicious intent. A black hat hacker may exploit security ...

white hat

Definition | SearchSecurity

A white hat hacker is an individual who uses hacking skills to identify security vulnerabilities in hardware, software or networks.

bot herder

Definition | WhatIs.com

A bot herder is a hacker that seeks out vulnerable computers and infects them so that they can be controlled as a botnet.

doxing

Definition | WhatIs.com

Doxing is the act of gathering information about a target individual or organization and making it public. The term is hacker-speak for documenting.

directory traversal

Definition | SearchSecurity

Directory traversal is a form of HTTP exploit in which a hacker uses the software on a Web server to access data in a directory other than the ...

-ADS BY GOOGLE

SearchCompliance

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

SearchSecurity

SearchHealthIT

  • Health IT (health information technology)

    Health IT (health information technology) is the area of IT involving the design, development, creation, use and maintenance of ...

  • fee-for-service (FFS)

    Fee-for-service (FFS) is a payment model in which doctors, hospitals, and medical practices charge separately for each service ...

  • biomedical informatics

    Biomedical informatics is the branch of health informatics that uses data to help clinicians, researchers and scientists improve ...

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

  • ransomware recovery

    Ransomware recovery is the process of resuming options following a cyberattack that demands payment in exchange for unlocking ...

  • natural disaster recovery

    Natural disaster recovery is the process of recovering data and resuming business operations following a natural disaster.

SearchStorage

  • RAID 5

    RAID 5 is a redundant array of independent disks configuration that uses disk striping with parity.

  • non-volatile storage (NVS)

    Non-volatile storage (NVS) is a broad collection of technologies and devices that do not require a continuous power supply to ...

  • petabyte

    A petabyte is a measure of memory or data storage capacity that is equal to 2 to the 50th power of bytes.

Close