Security management Definitions

  • C

    chief trust officer

    A chief trust officer in the IT industry is an executive job title given to the person responsible for building confidence around the use of customer information and how it is protected.

  • D

    distributed ledger technology (DLT)

    Distributed ledger technology (DLT) is a digital system for recording the transaction of assets in which the transactions and their details are recorded in multiple places at the same time.

  • F

    field-level encryption

    Field-level encryption is the ability to encrypt data based on entire fields.

  • H

    Honey Encryption

    Honey Encryption is a security tool that makes it difficult for an attacker who is carrying out a brute force attack to know if he has correctly guessed a password or encryption key.

  • S

    Sarbanes-Oxley Act (SOX)

    The Sarbanes-Oxley Act of 2002 is a federal law that established sweeping auditing and financial regulations for public companies.

  • T

    threat hunter (cybersecurity threat analyst)

    A threat hunter, also called a cybersecurity threat analyst, is a security professional or managed service provider (MSP) that proactively uses manual or machine-assisted techniques to detect security incidents that may elude the grasp of automated systems.

-ADS BY GOOGLE

SearchCompliance

SearchHealthIT

SearchCloudComputing

SearchMobileComputing

SearchDataCenter

Close