Glossary of Terms
A comprehensive approach to securing information from corruption, compromise, or loss, ensuring its confidentiality, integrity, and availability.
The different forms data can be in. Data at Rest is stored data, Data in Transit is data moving across a network, and Data in Use is data being processed by an application.
The process of converting data into a coded format (ciphertext) that can only be read with a specific key. Symmetric encryption uses one key for both encryption and decryption, while Asymmetric encryption uses a public key to encrypt and a private key to decrypt.
A one-way process that transforms data into a fixed-size string of characters. It's used to verify data integrity and store passwords securely.
The process of replacing sensitive data with a non-sensitive equivalent, referred to as a "token," that has no extrinsic or exploitable meaning or value.
The concept that digital data is subject to the laws of the country in which it is physically located.
The ability to anticipate, withstand, recover from, and adapt to adverse cyber events and disruptions.
A system design approach that ensures a high level of operational performance, usually uptime, for a higher than normal period. It relies on redundancy to eliminate single points of failure.
Distributing network or application traffic across multiple servers to ensure no single server becomes a bottleneck, improving responsiveness and availability.
A group of servers that work together as a single system to provide high availability. If one server fails, another in the cluster takes over its workload.
The process of creating a copy of data that can be recovered in the event of a primary data failure. Types include Full, Incremental, and Differential.
A documented, structured approach with instructions for responding to unplanned incidents. It focuses on restoring IT systems and data.
The maximum acceptable length of time that a system can be down after a failure or disaster occurs. It answers the question: "How quickly do we need to be back up?"
The maximum acceptable amount of data loss an organization can tolerate. It answers the question: "How much data can we afford to lose?"
A data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement, or both.