Glossary

A glossary is a list of terms, abbreviations, or expressions in a particular context or field of knowledge with their respective definitions.

Anomaly Detection

Contexts

A fundamental process in cybersecurity, used to identify events or patterns that deviate from expected behavior within systems, networks, or datasets and that could indicate a security threat, such as a network intrusion, malware, or unauthorized access.

Color Theory

Contexts

The study of how colors interact with each other and how they can influence people’s emotions and perceptions.

Data Anonymization

Contexts

The process of removing Personally Identifiable Information from a dataset in an irreversible and permanent manner. This can serve as a mechanism of privacy protection. In the context of data governance, anonymized data is no longer considered Personally Identifiable Information according to the current regulatory interpretation.

Data Breach

Contexts

Incident involving copying, transmitting, viewing, or processing sensitive, protected, or confidential information by unauthorized individuals or for unauthorized purposes.

Identity and Access Management

Contexts

Identity and access management is a framework of policies, technologies, and business processes aimed at facilitating the management of digital identities and their access.

Out of the box

Contexts

Native or built-in feature or functionality of a product, included by default and that works immediately after first setup.

Real Time

Contexts

Reported at the same time something takes place or delivered in a short time.

Real-Time Computing

Contexts

Used to describe a computer system that guarantee to process events and perform tasks within a specific time constraints.

Segregation of Duties

Contexts

Mechanism designed to prevent errors and fraud by dividing the actions required to complete a task among different employees.

Single Source of Truth

Contexts

Practice of centralizing all of an organization’s data related to a given subject in a single, reliable location, ensuring that every person and every system operates with the same up-to-date information.

SSL-Bridging

Contexts

The load balancer decrypts the incoming encrypted traffic (same as in SSL-Termination) and re-encrypts it when sending to the destination (e.g. backend instances).

SSL-Passthrough

Contexts

The load balancer passes the encrypted traffic to the destination (e.g. backend instances) without decrypting it.

Because the load balancer only sees encrypted traffic, it is not possible to perform layer 7 (OSI model) actions.

SSL-Termination

Contexts

The load balancer decrypts the incoming encrypted traffic and sends it to the destination (e.g. backend instances) unencrypted.

Subject Matter Expert

Contexts

A professional with in-depth, specialized knowledge in a particular field, process, or technology who acts as a trusted advisor, guiding teams, validating information, and solving complex problems to ensure accuracy, efficiency, and successful project outcomes.

Zero Trust

Contexts

Security framework that requires all users, devices, and systems, whether inside or outside the organization’s network, to be continuously authenticated, authorized, and validated before gaining access to applications and data.