5,374 Results for:

  • Sort by: 

passive attack

A passive attack is a network attack in which a system is monitored and sometimes scanned for open ports and vulnerabilities. Read Full Definition

Associated Glossaries

snooping

Snooping, in a security context, is unauthorized access to another person's or company's data. Read Full Definition

requirements analysis (requirements engineering)

Requirements analysis (requirements engineering) is the process of determining user expectations for a new or modified product. Read Full Definition

public data

Public data is information that can be shared, used, reused and redistributed without restriction. Read Full Definition

Associated Glossaries

SIPOC (suppliers, inputs, process, outputs, customers) diagram

A SIPOC (suppliers, inputs, process, outputs, customers) diagram is a visual tool for documenting a business process from beginning to end prior to implementation. Read Full Definition

SMB (small and medium-sized business or small and midsize business)

SMB is an abbreviation for a small and medium-sized business, sometimes called a small and midsize business. Read Full Definition

transformer model

A transformer model is a neural network architecture that can automatically transform one type of input into another type of output. Read Full Definition

Associated Glossaries

uplink and downlink

In satellite telecommunication, a downlink is the link from a satellite down to one or more ground stations or receivers, and an uplink is the link from a ground station up to a satellite. Read Full Definition

Associated Glossaries

Nessus

Nessus is a platform developed by Tenable that scans for security vulnerabilities in devices, applications, operating systems, cloud services and other network resources. Read Full Definition

logical network

A logical network is a software-defined network topology or routing that is often different than the physical network. Read Full Definition