A | B | C | D | E | F | G | H
I | J | K | L | M | N | O | P
Q | R | S | T | U | V | W
X | Y | Z
I | J | K | L | M | N | O | P
Q | R | S | T | U | V | W
X | Y | Z
- A
- Active Directory: Active Directory is a Microsoft service that stores information about network resources and enables users to access and manage these resources securely. Also see Azure Active Directory.
- Agentic AI: Agentic AI refers to artificial intelligence systems that can act autonomously and make decisions based on their programming and learning capabilities.
- Application Programming Interface (API): A set of structured functions, rules and protocols that allow applications to communicate with each other even across different application types.
- Attack Surface: The attack surface of a system or environment refers to all the points presented where an unauthorized user or cyber threat could potentially exploit vulnerabilities to gain access to the system.
- Attest Examination: An attest engagement is one in which a CPA in public practice examines and reports on data or conditions that are the responsibility of another party (usually management). SOC 1 and SOC 2 reporting are attest examinations.
- Authentication / Multi-factor Authentication (MFA): The action of verifying the identity of a user ("prove you who you say you are") and their eligibility to access information ("what permissions do you have?"). Multifactor authentication uses a combination of more than one authentication method, such as token and password (or personal identification number [PIN]) or token and biometric device.
- Azure Active Directory: Azure Active Directory is a Microsoft service that stores information about network resources and enables users to access and manage these resources securely.
- B
- Back-End: The part of an application typically made up of databases and integration assets where the information and data are stored and manipulated before being presented to a user.
- Bitcoin: A type of cryptocurrency in which a record of transactions is maintained and new units of currency are generated by the computation of mathematical problems, and which operates independently of a central bank. Bitcoin was the first successful cryptocurrency, all of which use blockchain technology. Conceived in 2008 by the pseudonymous Satoshi Nakamoto.
- Bitcoin Mining: The process by which Bitcoin transactions are validated digitally on the Bitcoin network and added to the distributed ledger.
- Blockchain: A system in which a record of transactions is maintained across computers that are linked in a peer-to-peer network; also known as distributed ledger technology.
- Business Intelligence: The use of data aggregation and analytics across datasets to identify thematic or performance indicators, represent trends and results graphically, and use the results for better decision-making.
- C
- Certification: A certification the provision by an independent certifying body of written assurance that the product, service or system in question meets specific requirements. Examples include ISO, PCI and HIPAA.
- ChatGPT: A well-known generative AI platform introduced to the public in late 2022.
- Cloud: "The cloud" or "cloud-based" is a metaphorical term used to describe a global network of remote servers, hooked together to operate collectively. Cloud resources can be used to serve up applications, store data, or provide other functions, depending on the nature of the business and/or data to be exchanged.
- Continuous Integration/Continuous Delivery (CI/CD) Pipeline: The CI/CD pipeline is a set of practices and tools used by software development teams to continuously add features to production applications and deploy them through governed automations to reduce failure risk.
- Cryptocurrency: Digital currency in which transactions are verified and records maintained by a decentralized system using cryptography, usually on a blockchain, rather than by a centralized authority or government.
- Cyber Frameworks: Cyber frameworks are structured guidelines and best practices designed to help organizations establish and maintain effective cybersecurity programs.
- Cyber Resilience Review (CRR) The Department of Homeland Security’s (DHS) CRR is a voluntary assessment designed to evaluate an organization's cybersecurity resilience and readiness against cyber threats. It is often used as starting point for managing security.
- Cyber Risk Assessment: Evaluation of potential threats and vulnerabilities to an organization's digital assets, systems, and data. It helps identify weak points and prioritize cybersecurity safeguards to mitigate and manage risks in alignment with organizational goals and objectives.
- Cybersecurity: The professional practice of protecting systems, networks, and data from digital attacks, unauthorized access, or damage.
- Cybersecurity Maturity Model Certification (CMMC): CMMC is a framework developed by the Department of Defense (DoD) to assess and enhance the cybersecurity posture of defense contractors in the supply chain.
- D
- Data Governance: The function or process of managing data to assure accuracy and tracking of changes. Data governance involves the development of policies and processes that assign accountability to critical data fields to ensure changes are adequately approved, impacts to reporting and downstream events are assessed, and integrity through the data lineage is maintained.
- Data Lake: A centralized repository to store both structured (e.g., tabular) data as well as unstructured data (e.g., PDFs or images), whether or not related, in one storage area. A Data Lake involves less curation and management than a Data Warehouse.
- Data Lakehouse: A hybrid concept where certain tables and data sets within the overall dataset are curated and governed in a model similar to a Data Warehouse, while the rest of the data operates under the less controlled Data Lake model.
- Data Lineage: The path a data record takes from the point of origin through transactional processing to reporting.
- Data Warehouse: A location that aggregates data from multiple related applications or data storage locations to provide one source where all data related to transactional records can be saved and accessed.
- Data Wrangling: The process of identifying, aggregating and cleansing data to put it into a consistent and analyzable format.
- Database: A collection of data stored and managed by a computer; the information can be either tabular or unstructured.
- Digital Assets: Any digital representation of value that is recorded on a cryptographically secured distributed ledger or any similar technology.
- Distributed Ledger: A database that is consensually shared and synchronized across multiple sites, institutions, or geographies, accessible by multiple people. Also known as blockchain.
- Domain Name System (DNS): DNS is a system that translates domain names into IP addresses, enabling users to access websites and other online resources using human-readable names.
- E
- Edge Computing: Edge computing refers to the practice of processing data closer to the source of utilization, reducing latency and enhancing efficiency in data processing and analysis.
- Encryption: Encryption is the process of converting data into a code to prevent unauthorized access, ensuring data confidentiality and security during transmission and storage.
- Endpoint: An endpoint refers to a device or node in a network, such as a computer or mobile device, which communicates with other devices and services. While the term often represents a physical device it can also reference a logical representation of a device or compute structure.
- Enterprise-grade: Enterprise-grade refers to products, services or solutions that are designed and optimized for use in large-scale business environments, offering robust features, scalability and security.
- Enterprise Resource Planning (ERP): ERP is a software system that integrates and manages core business processes, such as finance, HR, inventory and supply chain, within an organization.
- Ethereum: A decentralized, open-source blockchain network with smart contract functionality. Ether is the native cryptocurrency of the platform. Ethereum was conceived in 2013 by Vitalik Buterin.
- Extract Transform Load (ETL): ETL is a process used to extract data from various sources, transform it into a consistent format and load it into a data warehouse for analysis and reporting.
- F
- Firewall: A firewall is a network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules, protecting the network from unauthorized access and cyber threats.
- Firmware: Firmware is a type of software embedded in hardware devices that provides low-level control and functionality, such as booting the device and managing hardware components.
- Flash Memory: Flash memory is a type of nonvolatile memory that retains data even when power is turned off, commonly used in USB drives, SSDs and memory cards.
- File Transfer Protocol (FTP): FTP is a standard network protocol used for transferring files between a client and a server on a computer network.
- Front-End: The part of an application or software that is interacted with by the users to add, edit or view information.
- G
- Generative AI: Models that respond to natural language questions by synthesizing large quantities of data through a "large language model" (LLM) to provide a response in a near-human answer format.
- Git: GitHub is a web-based platform owned by Microsoft that provides hosting for Git repositories, enabling developers to collaborate, manage and track changes in code repositories.
- GitHub: Git is a lightweight distributed version control system that tracks changes in source code during software development, enabling collaboration among developers and maintaining version history.
- GitLab: GitLab is a web-based DevOps platform that provides Git repository management, CI/CD pipelines, issue tracking and collaboration tools for software development teams.
- Graphic User Interface (GUI): GUI is a visual interface that allows users to interact with electronic devices through graphical icons, buttons, menus and windows.
- H
- Hadoop: Hadoop is an open-source framework used for distributed storage and processing of large datasets across clusters of computers, enabling big data analytics and processing.
- HTTP/HTTPS: HTTP is a protocol used for transmitting data over the internet, while HTTPS is a secure version of HTTP that encrypts data for secure communication.
- I
- Integrated Development Environment (IDE): IDE is a software application that provides comprehensive tools for software development, including code editing, debugging and project management.
- Integration Methodology: Integration methodology refers to the structured approach and processes used to integrate different systems, applications or technologies to enable seamless data exchange and interoperability.
- Internet Message Access Protocol (IMAP): IMAP is an email protocol used to retrieve emails from a mail server, enabling users to access and manage their emails across multiple devices.
- Internet of Things (IoT): IoT refers to a network of interconnected devices that can collect, exchange and analyze data, enabling automation, monitoring and control in various industries.
- Internet Protocol (IP) Address: An IP address is a unique numerical label assigned to each device connected to a computer network, enabling communication and identification of devices on the internet.
- Internet Service Provider (ISP): An ISP is a company that provides access to the internet and related services to individuals, businesses and organizations.
- ISO Standards: ISO standards, such as ISO 27001 for information security management and ISO 42001 for AI, are internationally recognized guidelines and best practices for ensuring quality, security and compliance in various domains.
- IT Risk: The potential for an unexpected negative business outcome involving the failure or misuse of IT, including but not limited to cybersecurity breaches.
- J
- K
- Kubernetes (k8s): Kubernetes, often abbreviated as k8s, is an open-source container orchestration platform used to automate deployment, scaling and management of containerized applications.
- L
- Large Language Models (LLM): LLMs are advanced AI models that use deep learning techniques to process and generate human-like text and language patterns.
- Lightweight Directory Access Protocol (LDAP): LDAP is a protocol used to access and manage directory information services such as user accounts and permissions in a network.
- Linux: Linux is an open-source operating system kernel used in various distributions (distros) and platforms, providing a stable, secure and customizable environment for computing.
- Load Balancer: A load balancer is a network appliance or software that distributes incoming network traffic across multiple servers or resources, optimizing performance, availability and reliability.
- Local Area Network (LAN): A LAN is a network that connects devices within a limited geographical area, such as a home, office or campus, enabling data sharing and communication.
- Logical Access: Logical access refers to the authorization and control of user access to digital systems, applications and data based on user credentials and security policies.
- Low-Code: A system designed with reduced requirements for technical or programming language to create technological solutions or modify system capabilities. Low-code systems often use icons that represent a programmatic function and can be chained or linked to other icons to perform tasks.
- M
- Machine Learning: The use of an analysis model with multiple layers of probability calculations based on criteria and historical data to determine the outcome. These models often include a component of "retraining" the probability calculations based on continuous feedback of incoming transactions.
- Malware: Malware is malicious software designed to disrupt, damage or gain unauthorized access to computer systems and data, posing security threats to individuals and organizations.
- MD5: MD5 is a widely used hashing algorithm that generates a unique fixed-size hash value from input data, commonly used for data integrity verification and password storage.
- Metadata: Metadata is data that provides information about other data, such as file attributes, tags and timestamps, enabling efficient data organization, search and retrieval.
- Middleware: Middleware is software that acts as an intermediary between different applications, enabling communication, data exchange and integration between disparate systems.
- MySQL: MySQL is an open-source relational database management system that uses structured query language (SQL) for querying, managing and manipulating data in databases.
- N
- National Institute of Standards and Technology (NIST) 800-53: NIST Special Publication 800-53 provides a catalog of security controls and guidelines issued by the National Institute of Standards and Technology (NIST) intended for federal information systems and organizations but widely leveraged as a definitive security control set with three prioritization categories (low, moderate and high) based on the required level of trust.
- National Institute of Standards and Technology (NIST) CSF: NIST Cybersecurity Framework (CSF) is a voluntary framework designed to help organizations manage and improve their cybersecurity risk management processes and practices.
- Near Field Communication (NFC): NFC is a short-range wireless technology that enables contactless data exchange between devices, such as smartphones, payment terminals and smart cards.
- Neural Network: A neural network is a type of artificial intelligence model inspired by the human brain's neural structure, used for pattern recognition, machine learning and decision-making tasks.
- Not Only SQL (NoSQL): NoSQL databases are non-relational databases that provide flexible data models and scalability for handling large volumes of unstructured or semi-structured data.
- O
- Open Authorization (OAuth): OAuth is an open standard protocol that allows secure authorization and access delegation between applications, enabling users to grant permissions for data sharing and access.
- Open Source: Open source refers to software or technology that is freely available with a variety of limited licensing requirements on usage, allowing users to view, modify and distribute the source code, fostering collaboration and innovation.
- Optical Character Recognition (OCR): OCR is a technology that converts scanned images or text into machine-readable text, enabling automated data extraction, document processing and text recognition.
- Over-the-Air (OTA) Update: OTA update is a wireless method used to remotely update software, firmware or configurations on devices, such as smartphones, IoT devices and vehicles, without physical connections.
- P
- Patch Management: Patch management refers to the process of managing and overseeing obtaining updates from vendor software companies, testing them and applying them within your environment ensuring security and compliance.
- Penetration Test (Pentest): A simulated cyber attack performed to identify weaknesses in a system's security, using tools and tactics similar to those used by malicious hackers. Often performed as part of a larger security assessment and/or cyber risk assessment.
- PowerShell: PowerShell is a command-line shell and scripting language developed by Microsoft for automating system tasks, managing configurations and administering Windows systems.
- Process Mining: The process of analyzing process log data from each step in a transactional process (e.g. initiation, review, corrections, approvals, etc.) to identify process bottlenecks and potential efficiencies.
- Protocol: A protocol is a set of rules and standards that govern data communication and exchange between devices, ensuring interoperability, security and reliability in networked environments.
- Python: A highly portable interpreted language commonly used in data analytics and data science. It is open-source with a large community developing pre-built "packages" that can be incorporated to quickly build complex functionality.
- Q
- Quick Response (QR) Code: A QR code is a two-dimensional barcode that stores information, such as URLs, text or contact details, enabling quick scanning and access using smartphones and other devices.
- Query: A query is a request for information or data retrieval from a database or system, enabling users to search, filter and extract specific information based on predefined criteria.
- R
- Radio Frequency Identification (RFID): RFID is a technology that uses radio waves to identify and track objects, enabling automatic data capture, inventory management and asset tracking in various industries.
- Ransomware: Ransomware is a type of malware that encrypts or blocks access to data and demands a ransom for decryption, posing significant cybersecurity threats to individuals and organizations.
- Redundant Array of Independent Disks (RAID): RAID is a data storage technology that combines multiple disk drives into a single logical unit to enhance data protection, performance and redundancy in storage systems.
- Regression Testing: Regression testing is a software testing technique that verifies the unchanged functionality of an application after modifications, updates or system changes to ensure consistency and quality.
- Repository: A repository is a central storage location that usually houses code, files and version history, enabling developers to collaborate, track changes and manage software projects.
- Representational State Transfer (REST): REST is an architectural style for designing networked applications that use HTTP for communication, enabling stateless interactions and resource manipulation in web services.
- Robotic Process Automation (RPA): Technology using "low-code" solutions to automate common business tasks without requiring significant coding or IT professional assistance. These tasks are commonly performed at the application layer or involve interactions between common user applications.
- S
- Secure Hash Algorithms (SHA): SHA is a family of cryptographic hashing algorithms, such as SHA-256 and SHA-512, used for data integrity verification, digital signatures and password hashing.
- Server: A device or service that acts as a "hub" for providing data and services to client programs or devices.
- SHA-256: Stands for Secure Hash Algorithm 256, a cryptographic hashing algorithm used for message, file and data integrity verification. SHA-256 is part of the SHA-2 family of hash functions. It uses a 256-bit key to convert a piece of data into a new, unrecognizable data string of a fixed length. This string of random characters and numbers, called a hash value, is also 256 bits.
- Simple Mail Transfer Protocol (SMTP): SMTP is a standard protocol used for sending and receiving email messages between email servers, enabling email communication over the internet.
- Smart Contract: A computer program or a transaction protocol that is intended to automatically execute, control or document events and actions according to the terms of a contract or an agreement.
- Software as a Service (SaaS): Applications that run on cloud infrastructure. The applications are accessible from various client devices through a thin-client interface such as a web browser (e.g., web-based e-mail).
- Software Bill of Materials (SBOM): A detailed list of the components or building blocks used to create a software system or application, forming a nested inventory. The SBOM is key to foundational inventory practices and IT supply chain risk management.
- Software Development Kit (SDK): An SDK is a set of tools, libraries and documentation that developers use to build software applications for specific platforms, frameworks or APIs.
- Software-Defined Perimeter (SDP): A network perimeter based on software attributes instead of hardware components. SDP is used to restrict internet-connected infrastructure based on identity and context, whether in the cloud or on-premises, to protect it from hackers and unauthorized users.
- SQL Server Integration Services (SSIS): SSIS is a Microsoft platform used for building data integration and ETL solutions for extracting, transforming and loading data.
- SSID (Service Set Identifier): SSID is a unique name that identifies a wireless network, enabling devices to connect to the network and access internet services.
- Stablecoin: A type of cryptocurrency where the value of the digital asset is pegged to a reference asset, either fiat money or another cryptocurrency.
- Structured Data: Data that is tabular and easily machine readable, with a defined and consistent structure that establishes defined data attributes.
- System Administrator: The person or group responsible for implementing, monitoring and enforcing rules established and authorized by management. Security administrators focus on security rules and protocols, database administrators focus on database security and information classification, etc.
- T
- Telnet: Telnet is a network protocol used to establish remote terminal connections to devices, enabling users to access and manage devices over a network. It is commonly known to transmit in clear (unencrypted) text formats by default.
- Thick-Client: An interface that performs a degree of local processing based on input from a user but also leverages a back-end processing function for high capacity requirements.
- Thin-Client: A user interface that provides for all processing and data resource activities to be performed in a server, rather than on the local machine.
- Tokenization: The process whereby ownership rights of an asset are represented as digital tokens and stored on a blockchain.
- Two-factor Authentication: See Authentication / Multi-factor Authentication.
- U
- Uniform Resource Locator (URL): A URL is the address used to locate resources, such as web pages, files or services on the internet, enabling users to access specific content using a web browser.
- Unit Testing: Unit testing is a software testing method that validates individual units or components of an application to ensure they function correctly and meet specified requirements.
- Unstructured Data: Data that is not in a tabular format to make it easily machine-readable; examples include images, scanned documents, PDF files or physical documents.
- User Access: User access refers to the permissions and rights granted to users to access and interact with systems, applications and data based on their roles and responsibilities.
- User Experience (UX): UX refers to the overall experience and satisfaction users have when interacting with products, websites or applications, focusing on usability, accessibility and engagement.
- V
- Virtual Agent: Artificial intelligent "bots" that use defined processing rules or algorithmic models to provide answers from a defined data set based on a text question. For example, a virtual agent may be asked "What is our holiday policy?" and it would respond with a link to the current organizational holiday policy.
- Virtual Desktop Infrastructure (VDI): VDI is a technology that enables users to access virtualized desktop environments remotely, providing flexibility, scalability and centralized management. This usually shifts the compute workload to a centralized resource pool.
- Virtual Local Area Network (VLAN): A VLAN is a logical network segment created within a network to isolate and group devices based on criteria, such as departments, functions or security requirements.
- Virtual Private Network (VPN): A VPN is a secure network connection that encrypts and protects data transmitted over the network connection, commonly enabling users to access private networks securely from remote locations.
- Virtualization: Virtualization is a technology that creates virtual instances of computing resources, such as servers, storage or networks, enabling efficient resource utilization and scalability.
- Voice over Internet Protocol (VoIP): VoIP is a technology that enables voice communication over the internet, converting analog voice signals into digital data packets for transmission over IP networks.
- Vulnerability Assessment: A systematic examination of IT systems and infrastructure to identify security weaknesses and determine the effectiveness of protections in place. A vulnerability assessment may include manual and automated procedures with additional anaylsis informed by adjacent processes. It is narrower than a cyber risk assessment, which also examines organizational risks.
- W
- Web Content Accessibility Guidelines: A series of guidelines provided by the W3 organization to ensure online content is accessible to a broad range of individuals, regardless of physical or mental accessibility needs. For example, is a site compatible with screen readers? Does it include text descriptions of image content? Is there adequate visual contrast between text and background?
- Windows New Technology LAN Manager (NTLM): NTLM (NT Hash) is a proprietary authentication protocol used by Windows operating systems for secure authentication and access control in network environments.
- Wireless Assessment/Wireless Penetration Testing (Pentest): Wireless assessment and wireless penetration testing are security assessments conducted to evaluate the security of wireless networks, identifying vulnerabilities and recommending security measures.
- Wireless Network/Wireless Local Area Network (WLAN): A WLAN is a network that uses wireless communication technologies to connect devices and enable data exchange without physical connections.
- X
- Y
- Z
- Zero Trust Architecture (ZTA): An IT security concept based on treating every access request as if it's coming from an outside attacker, as opposed to traditional security that assumes users inside the organization can be trusted.