Glossary Context

Cyber Security

A glossary is a list of terms, abbreviations, or expressions in a particular context or field of knowledge with their respective definitions.

Anomaly Detection

Contexts

A fundamental process in cybersecurity, used to identify events or patterns that deviate from expected behavior within systems, networks, or datasets and that could indicate a security threat, such as a network intrusion, malware, or unauthorized access.

Data Anonymization

Contexts

The process of removing Personally Identifiable Information from a dataset in an irreversible and permanent manner. This can serve as a mechanism of privacy protection. In the context of data governance, anonymized data is no longer considered Personally Identifiable Information according to the current regulatory interpretation.

Data Breach

Contexts

Incident involving copying, transmitting, viewing, or processing sensitive, protected, or confidential information by unauthorized individuals or for unauthorized purposes.

Identity and Access Management

Contexts

Identity and access management is a framework of policies, technologies, and business processes aimed at facilitating the management of digital identities and their access.

Single Source of Truth

Contexts

Practice of centralizing all of an organization’s data related to a given subject in a single, reliable location, ensuring that every person and every system operates with the same up-to-date information.

Subject Matter Expert

Contexts

A professional with in-depth, specialized knowledge in a particular field, process, or technology who acts as a trusted advisor, guiding teams, validating information, and solving complex problems to ensure accuracy, efficiency, and successful project outcomes.

Zero Trust

Contexts

Security framework that requires all users, devices, and systems, whether inside or outside the organization’s network, to be continuously authenticated, authorized, and validated before gaining access to applications and data.