Additions
Cybersecurity terms to add
to the first edition of the
Cybersecurity Hyperglossary
These are draft 'plain English' definitions
without the quoted reference sources and hyperlinked cross-references. Additions, comments and corrections are welcome.
51% attack
Hostile takeover of a cryptocurrency network that typically involves several miners collaborating or being recruited to compromise a Proof-of-Work or Proof-of-Stake blockchain by wielding or controlling most (more than 50%) of the network‘s validating power, unilaterally changing the blockchain.
Acceptable downtime
Maximum downtime for which a system, network, service etc. can be out of action without materially impacting the business.
Acceptable risk
The nature and quantity of risk that management is willing to endure, hopefully without compromising the organisation’s overall business strategy and mission or key objectives – a subjective, dynamic and contextual concept.
Account disabling
Rate-limiting logon control.
Activation
Enablement, initiation, triggering or executionof a planned activity such as the responseto an incident, emergency, crisis or disaster.
Active attack
Deliberate attack on a system, network, application, function, location, person etc., as opposed to, say, passive monitoring or accidental damage.
Advanced in AI Audit (AAIA)
ISACA’s qualification for experienced technology auditors auditing Artificial Intelligence systems.
Agenda
a) Topics for discussion and consideration, often at a meeting.
b) See Qilin.
Aisuru
Botnet-for-hire, active in 2025. Reportedly capable of mounting a ~30 terabits-per-second Distributed Denial of Service onslaught against unfortunate targets and intermediaries (networkand Cloud Service Providers) for its illicit clients.
Algorithmic bias
Systematic bias created within Artificial Intelligence models by training them (usually inadvertently) on biased data sets or making biased fine-tuning adjustments to their internal weightings.
Alias
See pseudonym.
Allege
To claim.
Altamides
Illicit surveillance software from Indonesian company First Wrap, exploits vulnerabilities in the Signalling System № 7 datacommunications protocol to track cellphones across the globe, intercept SMS/TXT messaging and undermine encrypted messaging.
Antithesis
Contradictory statements. See disambiguation.
Application management
Management of one or more computer applications.
Application recovery
a) Automatic error-detection and recovery capability within an application e.g. resending a message that was corrupted in transit.
b) Process to restore an application’s operational capability following an outage e.g. by rebuilding an application system from backups after a failed change.
Artifical Intelligence Bill Of Materials (AIBOM)
Bill Of Materials for the parts employed in building an Artificial Intelligence system, agent, device or service, such as the models, training data, internal and external components.
Artificial Intelligence Large Language Model (AI/LLM)
See Large Language Model.
Artificial Intelligence Large Language Model (AI/LLM) signature
A set of indicators or characteristics that, collectively, suggest the Artificial Intelligence Large Language Model (non-human) origins of a piece of writing or other creative output.
Artificial Intelligence Risk Management Framework (AI RMF)
NIST’s framework or approach, intended “to improve the ability to incorporate trustworthiness considerations into the design, development, use, and evaluation of AI products, services, and systems.”
Artificial Intelligence aging
See model drift.
Artificial Intelligence model
Core conceptual model around which an Artificial Intelligence system, agent, device or service is built.
Assume breach
Defensive security strategy, challenging the presumption that defences are entirely effective.
Audit client
Customer or governing body who (usually) scopes and specifies, commissions, authorises and pays for an audit.
Audit conclusion
a) Auditor’s definitive high-level statement of the overall outcome of an audit, summing up the key messages for stakeholders – particularly senior managers.
b) End of an audit engagement.
Audit criteria
Expectations, requirements or obligations of the auditee being assessed by the auditor.
Automated monitoring
Monitoring involving automation.
Automatic Call Distribution or Despatch (ACD)
Call centre telephone system that automatically distributes incoming calls to the relevant people.
Barrier
Obstacle or impediment to progress or communication, generally tangible (e.g. crash-barrier or guardrail, wall, door, moat) but sometimes intangible (e.g. low self-esteem, language difficulties).
Basel Accord
Series of strategic agreements whereby banks maintain sufficient capital reserves, liquidity and transparency to remain resilient, mitigating systemic risks to the global financial system and international economy.
Basic testing
See black box testing.
Batch job
Package of work to be processed on a mainframe or other computer, typically consisting of an application with any non-default runtime parameters and data files.
Baudot code
Early text-encoding scheme invented by Émile Baudot in the 1870s.
Behavioural biometrics
Biometrics derived from observable and measurable patterns of behaviour or activity e.g. the characteristic way a particular person types, uses the mouse, scrolls, swipes or walks (their gait).
Big game hunter
Cybercriminal or spooky gang brazenly targeting powerful victims using ransomware and other means.
Biohazard
Biological materials (e.g. natural toxins, infected blood) or organisms (e.g. pathogenic bacteria or viruses, parasites, toxic plants and fungi) that threaten the health and survival of living organisms which come into contact with, ingest or inhale them.
Blast radius
Metaphorical measure of the extent or scope of damage caused by an incident, both immediate impacts to those directly affected and indirect/downstream consequences.
Blind testing
See black box testing.
Bose Chaudhuri Hocquenghem (BCH) codes
Popular family of datacommunications error-correction codes created independently by Alexis Hocquenghem in 1959 and by Raj Chandra Bose and D. K. Ray-Chaudhuri in 1960.
Brain Computer Interface (BCI)
Innovative telepathic technologies such as brain implants and non-invasive monitors allowing users to send commands controlling prosthetic devices via neural signals, and receive information from sensors and smart systems directly back into their brains.
Broken Object Level Authorisation (BOLA)
Type of Application Programming Interface vulnerabilities allowing unauthenticated users to manipulate resource IDentities in API calls and exploit unauthorised access to internal data.
Business As Usual (BAU)
Organisational normality i.e. routine business operations.
Business continuity management program
Coherent governance approach for Business Continuity Management.
Business interruption insurance
Insurance to offset the costs of incidents that interrupt the business, according to the coverage defined in policy terms and conditions.
Business operations
Routine operations or activities within a business.
Call tree
Structured (cascading) emergency communications arrangement whereby each person is expected to contact certain others (such as peers or members of their teams), efficiently notifying those who need to know.
Call tree test
Process to maintain and gain assurance re the integrity of a call tree arrangement.
Camenisch-Lysyanskaya (CL) credentials
Cryptographically-secured credentials for a person, provided by a trusted IDentity Provider, enabling selected third parties to verify details about the person (such as their age or age-range) without compromising the subject’s privacy – an applicationof Zero-Knowledge Proof.
Can, cannot
Keywords in ISO standards formally express possibility (e.g. ‘smoking can cause cancer’) or capability (e.g. ‘controls can mitigate but cannot eliminate risks’).
Causative, cause-and-effect
Directly linked, such that a particular change (or stasis) in one part always causes a specific, predictable change (or stasis) in another.
Cause
a) The situation, change, factor, activity, etc. that prompts, initiates, leads to or drives effects in a causative relationship.
b) Motivating principle, factor or core aim for a pressure group, such as climate change, vivisection or nuclear proliferation.
Cellular telephone (cellphone)
Mobile telephone that connects wirelessly to global networks via local cells, each typically covering a few square kilometres.
Central Bank Digital Currency (CBDC)
Electronic money scheme operated by central bank institutions on behalf of government authorities.
Central Security Service (CSS)
Spooky US government function (part of the National Security Agency) responsible for coordinating and supporting military uses of cryptography.
Certificate of Cloud Security Knowledge (CCSK)
Cloud Security Alliance’s credential for cloud security professionals.
Certificate of Competence in Zero Trust (CCZT)
Cloud Security Alliance’s credential for Zero Trust professionals.
Certified Red Team Operator (CRTO), Lead (CRTL) or Expert (CRTE)
Qualifications from a number of training bodies intended for red team professionals, typically covering the principles, Tactics, Techniques and Procedures used in penetration testing.
Change freeze
Busy period during which changes are only permitted under exceptional circumstances due to the risk of disrupting critical business activities.
Change owner
Person or function that notionally ‘owns’ and is responsible for the success of a planned change, typically appointing and overseeing a change or project manager.
Change window
Designated period during which planned and approved changes are to be scheduled, coordinated and implemented.
Chatbot
Commonplace application of Artificial Intelligence Large Language Models to interact through online chat (conversation) in a natural, casual style with users seeking information, sales, technical or emotional support etc.
Circuit-switched
Particular communications paths (circuits or routes) through a network are established and used between end points for the duration of each session or call.
Civil emergency
Natural disaster (e.g. earthquake), environmental incident (e.g. chemical spill) or manmade crisis (e.g. terrorist incident) that threatens public safety, property or infrastructure.
Cloud Native Application Protection Platform (CNAPP)
Multifunctional tool to secure cloud services, workflows and environments from development through to production.
Cloud Service Broker (CSB)
Intermediary or match-maker between Cloud Service Providers and Cloud Service Customers, assisting with the formation of productive relationships and the design, provision, integration and management of cloud services.
Cloud Service Customer (CSC)
Organisation or individual consumer/client using cloud services provided by one or more Cloud Service Providers.
Cloud auditor
Technology auditor with the knowledge, skills and competence to audit cloud services.
Cloud native [computing]
Development, integration, testing, deployment and production for cloud services using application microservices communicatingvia Application Programming Interfaces, plus containers, orchestration, DevOps and Continuous Integration/Continuous Delivery approaches.
Cloud service
Information service based on cloud computing, typically delivered through the Internet.
Coalition for Content Provenance and Authenticity (C2PA)
Organisation within the Linux Foundation responsible for the content credential scheme.
Cognitive
Relating to cognition (‘thinking’) i.e. natural mental activities in the brain.
Cognitive bias
Systematic error of rational cognitive function e.g. confirmation bias, Dunning-Kruger effect, anchoring.
Cognitive distortions
Persistent exaggerated/unbalanced or irrational thoughts such as fatalism, perfectionism and all-or-nothing thinking.
Cognitive system
See Artificial Intelligence system.
Combined audit
Simultaneous audit of multiple management systems e.g. ISO/IEC 27001 and ISO/IEC 22301.
Command centre
‘Nerve centre’ or hub through which responses to serious incidents or disasters are managed.
Common Channel Signalling (CCS)
Historic architectural design for telephonic networks used a dedicated (out-of-band) packet-switched channel to pass control signals and commands (e.g. call setup, routing and billing information) for groups of circuit-switched data channels carrying analogue or digital traffic.
Complex system
System whose complex adaptive structure and many interacting parts make modelling intrinsically difficult, leaving its behaviour somewhat uncertain and unpredictable in practice.
Compute
[Verb] To calculate, analyse, determine or decide, rationally.
[Adjective or noun] Computing capacity or power.
Computer forensics
Forensics involving the examination of computers/digital devices and digital evidence.
Conditional
Something that depends on something else such as a conditional construct in a software programming language (e.g. if-then-else) or a conditional element.
Confirmation bias
Biased human tendency to seek and over-emphasise information that supports pre-existing beliefs or suspicions, while discounting, downplaying or simply ignoring contradictory evidence and contrary positions.
Confused deputy
Situation in which a vulnerable system, software, agent or person (the deputy) with legitimate authority, access rights or privileges is tricked by another (its client) into inappropriately doing something the client is not permitted to do themself.
Connected vehicle
Vehicle with a mobile network communications capability.
Constraint
Practical limitation, limiting factor or requirement.
Consultant
Organisation or person contracted to provide professional advice for a substantial fee.
Context window
Capacity of a generative Artificial Intelligence system to process information, measured by the maximum number of tokens it can handle simultaneously.
Contingent Business Interruption (CBI) insurance
Insurance against operational interruptions caused by external supply chain issues such as delayed or non-delivery of essential products from a supplier following a ransomware or hacking incident.
Continuity Of OPerations (COOP) plan
See Business Continuity Plan.
Continuity plan
See Business Continuity Plan.
Continuous Delivery (CD)
Rapid Application Development method involving automated packaging of compiled software followed by Production Acceptance Testing.
Continuous Deployment (CD)
Rapid Application Development method involving automated packaging of compiled software followed by automated Production Acceptance Testing and (if it passes) automated deployment into production, without manual intervention.
Continuous Integration (CI)
Rapid Application Development method involving frequent small deliveries of newly developed or changed code into a shared repository.
Continuous Integration/ Continuous Delivery [or Deployment] (CI/CD)
Rapid Application Development approach where Continuous Integration extends into Continuous Delivery and perhaps as far as Continuous Deployment.
Continuous assessment
See monitor.
Continuous operations
Nonstop business activities.
Control Overlays for Securing Ai Systems (COSAiS)
Series of draft NIST guidelines on securing Artificial Intelligence systems.
Copyedit
Process of checking and revising the content of a draft document (the ‘copy’) such as a book, article, policy or contract in order to improve the quality, grammar, spelling, readability etc. of the final product.
Core business
Essential operational processes, systems and activities, the continuity, reliability, security and productivity of which an organisation relies upon to achieve its objectives or mission.
Corporate, corporation, body corporate
Typically refers to a large ‘company’ (a ‘commercial business’), ‘enterprise’ or ‘group’.
Crisis fatigue
Emotional and physical exhaustion or burnout resulting from chronic or severe stress.
Critical operations
Business operations which actually are, or are thought to be, critical to the organisation.
Critical third parties
Third parties such as suppliers, partners, customers, investors, financiers and creditors which actually are, or are thought to be, critical to the organisation.
Crypter
Leet term for a tool or service to obfuscate or encrypt malware code to resist, delay, frustrate or prevent its detection and analysis.
Custom attribute
Attribute of special interest, concern or value to a particular organisation or situation, as opposed to something generic or standard.
Custom control
Control specified, designed and developed for a particular organisation, situation or control objective, as opposed to something generic or standard.
Cybersecurity assurance
Assurance regarding cybersecurity.
CybersecurityControl
Security control intended to mitigate unacceptable cyber risks.
CybersecurityWorkforce
Cybersecurity specialists and other workers with cybersecurity responsibilities.
Damage
Harmful reduction of utility, value or health.
Damage assessment
Post-event assessment and evaluation of the damage caused by a storm, fire, cyber incident or some other disaster, with a view to planning the next steps.
Data [at] risk
Risk (uncertain possibility) of vulnerable data being exposed and compromised by threats, causing adverse impacts.
Data mirroring
Duplication or replication of critical data in near real time across two or more computer systems, servers, data storage devicesor data centres, increasing resilience against hardware failures and some other incidents, but greater complexity, dependencies and costs.
Data recovery or restoration
a) Returning data from backup or archival (standby, secondary or supplemental storage media, often offline) to operational (primary) systems to resume normal processing following an incident.
b) Specialist forensic techniques, tools and technologies to recover usable data (in whole or in part) from damaged storage media or systems, or following deliberate concealment.
Data sovereignty
Expectation, requirement or right of a data owner to insist that their data remain within a given jurisdiction – generally, a zone, state, country or continent – within which they believe it will be adequately protected under privacy or other laws, regulations and controls.
Decision
Something decided, determined or resolved.
Declaration
Statement, proclamation or announcement formally declaring something significant.
Decommission
Take out of service.
Define
To craft, compose or compile a definition.
Deserialisation
Expansion of ‘serialized’ (coded, compressed) data formats in order to utilise the data.
Deterministic
Predictable as a result of direct causative relationships - a feature of simple processes, mechanisms, systems and machines.
Devolution
See delegated authority.
Diameter
Authentication, Authorisation and Accounting protocol destined to replace RADIUS.
Diffusion model
Artificial Intelligence technique that sequentially adds noise data to a known starting point (such as a training image or musical piece), then systematically reverses the process to remove the noise, learning the effects of the changes at each stage.
Digital Euro scheme rulebook
DRAFT document about the proposed ‘digital Euro’ Central Bank Digital Currency scheme currently being debated thrashed-out by the European Central Bank and European Council.
Digital legacy
When we die, almost everyone leaves behind a number of local and online accounts and digital assets protected by authentication credentials and access controls. Don’t take your passwords to the grave!
Digital twin testing
a) Use of digital twins to test (explore, analyse and evaluate) complex systems safely, without threatening or impacting live operations,
b) Testing and refining digital twins e.g. by comparing the behaviour of replicas or models against the real systems.
Direct Memory Access (DMA)
Facility allowing physically-attached peripherals such as video cameras and external disk drives to read and write datain a computer’s Random Access Memory directly.
Direct Memory Access (DMA) attack
Hacking technique that exploits physical access to a vulnerable FireWire port to read or modify Random Access Memory contents directly.
Direct, directing
a) [Verb] To instruct, command or mandate e.g. using a directive.
b) [Adjective] Closely-integrated, tied-to or associated-with, immediate, proximal, obvious or self-evident.
Direction
a) Instruction or mandate from an authority e.g. a manager.
b) Future path, heading, trend or orientation.
Disambiguation, negative-positive restatement, antithesis
Linguistic terms for contrasting constructs of the form “not this, but that”, one of several AI LLM signatures over-used by Artificial Intelligence Large Language Models.
Disaster management
Processes involved in monitoring, directing, controlling, testing and systematically improving the organisation’s planning, preparedness, identification of and responses to disasters.
Disaster recovery exercise
Process to practice or rehearse the declaration, invocation and execution of a Disaster Recovery Plan (typically by emulatinga disaster scenario), gaining competence, confidence and assurance in arrangements likely to be critical following an actual disaster.
Disaster recovery planning
Process of preparing, managing, exercising and maintaining a workable Disaster Recovery Plan.
Disaster risk
Uncertain nature and timing of serious and potentially disastrous incidents, emergencies or crises.
Double-blind testing
Testing, assessment or audit method in which the tester has no prior knowledge of the target aside from publicly-available information. Additionally, the target's administrators are not pre-warned about the test.
Downtime
a) Time off, time out, a welcome break or outage.
b) Measure of the length or proportion of time during which a service, system, network, worker etc. is unavailable or falls short of its specified, required, agreed or expected performance.
Drift
Artificial Intelligence systems may depart gradually from their original training due to the accumulation of internal changes to model weights etc.
Dynamic
Changing or changeable over time. Often implies proactive responsiveness to rapid, complex and unpredictable variations.
Dynamic packet filtering
See stateful firewall.
Electronic money
Digital representation of conventional currency issued by a country’s central bank.
Electronic waste
Redundant/surplus electronic equipment to be disposed of.
Emergency change (or patch)
Critically-important high-priority change or patch whose deployment and implementation is urgently required to mitigate risk or recover from an incident.
Emergency plan
a) Contingency plan made in anticipation of a future emergency or crisis of some sort.
b) Plan made urgently in the course of dealing with an actual or impending emergency.
Emergency preparedness
Contingency preparations in readiness for a future emergency or crisis of some sort.
Emergency relocation group (ERG)
a) Team responsible for planning, preparing and assisting with the shift of critical operations to an alternative location in the event of a physical disaster preventing workers accessing the primary or normal site.
b) Specific workers anticipated to relocate to alternative facilities (e.g. a hot, warm or cold site) in order to sustain or recover critical business activities if their normal facilities are out of action.
Emergency response
a) a) Pre-planned activities in response to an emergency, crisis or disaster, designed to protect (surviving) assets and maintain or recover critical operations.
b) The actual reaction and response to an emergency, in practice.
Emergency response plan
Contingency plan to respond effectively to a future emergency, crisis or disaster of some sort.
Emergency response team (ERT)
Team responsible for executing the planned response to a future emergency, crisis or disaster of some sort.
Escalation
Increasing the level, quantity, significance or severity of something e.g. privileges, access rights, incidents, alarms and alerts, risks, threats, impacts, management engagement, priorities, tensions, stakes, rates or charges.
Essential service
Critical or vital service involving significant information risks, therefore deserving strong information security, resilience, safety etc.
Event Query Language (EQL)
Flexible computer language for the Elasticsearch platform, used by cybersecurity incident analysts to query event logs, real-time alerts etc., responding accordingly.
Executive/management succession plan
Succession plan for managers.
Extra expense insurance
“Insurance covering the additional cost to maintain operations or get back in operation more quickly following property loss.” (DRI glossary).
FIDO security key
User authentication device like a USB memory stick with a fingerprint reader.
Failure notification policy
Policy concerning timely notification of relevant parties unplanned service outages or security incidents resulting from the failure (or absence!) of effective preventive controls.
Fallacy
Credible yet false and misleading belief, reasoning or argument resulting from logical errors or flaws.
Fallback site
Alternate site.
Fancy bear, APT28
Russian government-backed group of cyber-spooks active since the mid-2000s, attributed with cyber-attacks on political targets.
Federated learning
Distributed (cloud-based, decentralised, collaborative, client-server) training of a shared Artificial Intelligence Machine Learning model.
First line (of defence)
a) In the first World War, the front-line trenches bordering no man’s land were the first and most vital defensive lines.
b) In The Institute of Internal Auditors’ three lines model, the first line (management) owns Enterprise Risk Management as a whole, supported by the second and third lines.
Foundation model
Artificial Intelligence Machine Learning or Deep Learning system trained on big data, giving it a broad if shallow understanding, forming the basis for further in-depth training in more specialised areas and capabilities.
Fractional Chief Information Security Officer (CISO)
Part-time Chief Information Security Officer service, typically provided remotely on contract by a specialist cybersecurity company (a Managed Security Service Supplier) to several smaller organisations without the resources or need for a permanent in-house on-site CISO.
Fragile
Tends to fracture, break, snap or fail suddenly when stressed.
Full-stack development
Development of client-server applications, covering both client (front-end user interface) and server (back-end database and logic) components plus their integration into complete systems.
GIAC AI Security Automation Engineer (GASAE)
GIAC’s qualification for security engineers using Artificial Intelligence to build, scale and defend complex enterprise environments.
GIAC Offensive AI Analyst (GOAA)
GIAC’s qualification for penetration testers using Artificial Intelligence tools and techniques.
Gaslighting
Social engineering technique, manipulating a situation and using disinformation in an attempt to convince the target that they are mistaken.
Generative Artificial Intelligence (genAI) system
Computer system providing generative Artificial Intelligence services.
Geographic dispersion
Deliberate resilience and business continuity strategy to mitigate information, environmental, political, financial and other risks arising from concentrating business assets(including workers) and activities (particularly business-critical ones) in a single physical location.
Glass box testing
See white box testing.
Goodhart's law
“When a measure becomes a target, it ceases to become a good measure.”
Hashcat
Open-source password recovery utility for Linux, Windows and macOS systems.
High availability
Design criterion, objective or requirement for information systems, services, resources etc. supporting important business processes, safety functions etc.
Host Based Capability (HBC)
Some sort of technical capability or functionality provided on or by a networked computer system.
Human threat
a) Threat presented by or involving malicious humans, such as a hack, ransom demand, fraud, carelessness and incompetence, or dangerous activities.
b) Threat or hazard to the wellbeing, health and safety or survival of human beings, such as disease, accident, poverty or chronic stress.
IPI
Abbrev: Indirect Prompt Injectionor Ignore Previous Instructions, depending on context.
Impact tolerance
Tolerable range of impacts
Important Business Service (IBS)
See core business.
In-context learning (ICL)
Where a Large Language Model uses examples or other information provided by users with their prompts, interpreting and applying the guidance within the context of those prompts, supplementing its pre-trained knowledge.
Incident command
Focal point of incident management, providing command (clear authority, oversight and overall direction of the incident response), control (of the scene and activities), plus coordination, communication and collaboration between those involved.
Incident command system
System and management framework for incident command.
Incident management plan
Plan for incident management.
Incident manager
Person managing an incident.
Independent attitude
State of mind that is free of undue influence or constraint, remaining objective and impartial, such as an auditor or judge.
Indirect
Circuitous, tenuous, circumstantial, weakly-connected, not straightforward and direct.
Indirect Prompt Injection (IPI)
Form of prompt injection using hidden text on a web page to compromise Artificial Intelligence systems and AI agents that parse the page.
Indirect connection
a) Communications link or path that is indirect e.g. routed via intermediate systems and networks rather than taking a direct, obvious, point-to-point route.
b) Obscure, loose or tenuous linkage or association between observations, concepts, factors, people, organisations etc.
Indirection
a) Software programming reference to an identifier, name, tag or labelfor something (e.g. a memory location) rather than the thing itself (the instruction or data at that location).
b) Use of allusion, simile, vague, obscure and potentially misleading references as opposed to direct statements.
Information Technology Service Continuity Management (ITSCM)
Proactive management, monitoring and maintenance of information services and the associated infrastructure to deliver specified levels of availability.
Infrastructure-as-Code (IaC)
Automated provisioning and configuration of data centre Information Technology resources (servers, virtual machines, databases, applications and networks) using coded (machine-readable) definitions.
Insecure Direct Object Reference (IDOR)
See Broken Object Level Authorisation.
Insurance assessment
Fraught process following an incident and insurance claim to evaluate (quantify) the damage (impacts) and recovery costs, determine which aspects or elements and what proportion was covered, and negotiate a settlement.
Insurance policy
Contract for insurance services.
Interdependent
Organisations, processes, systems, people etc. bound together e.g. by operational or supply chain linkages, common factors, partnerships or shared objectives.
Intrusion Detection and Prevention System (IDPS)
Security system capable of both detecting and respondingto network intrusions or other attacks.
e-money
Abbrev: electronic money.
e-waste
Abbrev: electronic waste.
eXplainable Artificial Intelligence (XAI)
Artificial Intelligence reasoning and decision-making that is sufficiently transparent and straightforward to be interpreted and understood by a competent person.
eXtendable-Output Function (XOF)
Hash function (algorithm) such as SHAKE128 or 256 that generates a fixed-length hash value (e.g. a cryptographic key or password hash) from an input string of arbitrary length.
eXtended Validation (EV)
Certification authorities may conduct additional checks on applicants for their digital certificates, typically offering the resulting ‘EV’ certificates at a higher price reflecting the additional costs and trustworthiness.
eXtensible Markup Language (XML)
Data markup language uses named fields (defined in an XML schema) of variable lengths (defined in the field name tags), facilitating the exchange of data records between application systems.

