Glossary

A glossary is a list of terms, abbreviations, or expressions in a particular context or field of knowledge with their respective definitions.

Account Takeover

Contexts

  • Cyber Security
  • IAM

Gaining unauthorized access to users accounts.

Best Effort

Contexts

  • Tech
  • Networking

Reasonable effort to satisfy a request but without guaranteeing success.

Color Theory

Contexts

  • Graphic Design

The study of how colors interact with each other and how they can influence people’s emotions and perceptions.

Color Wheel

Contexts

  • Graphic Design

A circular diagram used to show the relationships between colors.

Identity and Access Management

Contexts

  • Tech
  • Cyber Security
  • IAM

Identity and access management is a framework of policies, technologies, and business processes aimed at facilitating the management of digital identities and their access.

Identity Threat Detection & Response

Contexts

  • Cyber Security

Cybersecurity discipline that includes tools and best practices for protecting user identities and identity systems from cyber threats.

Information Technology

Contexts

  • Tech

The study or use of hardware and software to manage, store, retrieve, and deliver data.

Out of the box

Contexts

  • Tech

Native or built-in feature or functionality of a product, included by default and that works immediately after first setup.

Principle of Least Privilege

Contexts

  • Cyber Security
  • IAM

Security concept whereby a user or service is granted the minimum levels of access and authorization necessary to perform the requested task.

Real Time

Contexts

  • Generic

Reported at the same time something takes place or delivered in a short time.

Real-Time Computing

Contexts

  • Tech

Used to describe a computer system that guarantee to process events and perform tasks within a specific time constraints.

Recovery Point Objective

Contexts

  • Tech
  • GRC

Targeted duration of time between the event of failure and the point where operations resume.

Recovery Time Objective

Contexts

  • Tech
  • GRC

Agreed maximum time, based on risk analysis, between the failure event and the restoration of operations.

Software Bill of Materials

Contexts

  • Tech
  • Cyber Security
  • GRC

A comprehensive inventory of all the components used in a software.

SSL-Bridging

Contexts

  • Tech
  • Networking

The load balancer decrypts the incoming encrypted traffic (same as in SSL-Termination) and re-encrypts it when sending to the destination (e.g. backend instances).

SSL-Passthrough

Contexts

  • Tech
  • Networking

The load balancer passes the encrypted traffic to the destination (e.g. backend instances) without decrypting it.

Because the load balancer only sees encrypted traffic, it is not possible to perform layer 7 (OSI model) actions.

SSL-Termination

Contexts

  • Tech
  • Networking

The load balancer decrypts the incoming encrypted traffic and sends it to the destination (e.g. backend instances) unencrypted.