Glossary for TI
absolute frequency
Absolute frequency refers to the number of times a particular value or category appears in a set of data. The formula for absolute frequency is simply the number of occurrences of a particular value or category in a dataset.
Related courses
This concept is introduced in CCCS 620.
absolute value
The magnitude of a quantity, ignoring the sign. The absolute value of a negative number is the matching positive number. The mathematical notation for taking the absolute value is placing vertical bars on both sides of the affected expression. For example, \(|-3| = 3\).
Abstract class
Abstract classes permit providing a partial set of default implementations of methods in a class. Since they're incomplete, they can't be instantiated and used as they stand, but they can be subclassed to add the missing details in a way that's specific to that particular implementations, and those subclasses can be instantiated.
Related courses
This concept is introduced in CCCS 301.
Acceptable Use Policy
Rules set by the owner, creator or administrator of a network, website, or service that restrict the ways in which the network, website or system may be used.
Access Control List
A list of permissions attached to an object that specifies which users are granted access and what operations are allowed.
ACL
Access Control List
Active Directory
A directory service developed by Microsoft for Windows domain networks. It is included in most Windows Server operating systems as a set of processes and services.
AD
Active Directory
Address Resolution Protocol
A protocol used to map an IP address to a physical address on an Ethernet network.
adjacency list
The list of the neighbors of a vertex.
Related courses
This concept is introduced in CCCS 610.
adjacency matrix
A matrix where both the rows and the columns correspond to the vertices of a graph. An element \(a_{ij}\) is set to one if the vertex of row \(i\) is a neighbor of the vertex of column \(j\) and to zero if not.
Related courses
This concept is introduced in CCCS 610.
adjacent
A vertex being a neighbor of another vertex.
Related courses
This concept is introduced in CCCS 610.
Advanced Persistent Threat
A prolonged, aimed attack on a specific target with the intention to compromise their system and gain information from or about that target.
aerial imagery
Digital photographs taken from an airplane, a helicopter, or an unmanned drone.
Related courses
This concept is introduced in CCCS 610.
African Network Information Centre
The regional Internet registry (RIR) for Africa, responsible for the distribution and management of Internet number resources.
AfriNIC
African Network Information Centre
AIS
Automated Indicator Sharing
algorithm
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
alpha
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610 CCCS 620.
alternative investments
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
American Registry for Internet Numbers
The regional Internet registry for Canada, the United States, and many Caribbean and North Atlantic islands.
angle
An angle is a measure of the amount of rotation between two lines or planes that share a common point. Angles are typically measured in degrees or radians.
Related courses
This concept is introduced in CCCS 610.
Anti-Phishing Working Group
An international consortium that brings together businesses affected by phishing attacks, security products and services companies, law enforcement agencies, government agencies, trade associations, regional international treaty organizations, and communications companies.
antialiasing
The process of removing undesired artifacts resulting from the way that a signal is represented when sampled.
aperiodic
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
API
Application Programming Interface
APIPA
Automatic Private IP Addressing
APNIC
Asia Pacific Network Information Centre
Application Programming Interface
A set of routines, protocols, and tools for building software and applications.
approximate
A solution that is not exact but is, for some formal reason, expected to be near the exact solution in some sense.
Related courses
This concept is introduced in CCCS 610.
approximation
The act of computing an approximate solution.
Related courses
This concept is introduced in CCCS 610.
approximation algorithm
A method that does not provide an exact solution but a solution the quality of which differs from the exact one by at most a known amount.
Related courses
This concept is introduced in CCCS 610.
APT
Advanced Persistent Threat
APWG
Anti-Phishing Working Group
ARIN
American Registry for Internet Numbers
ARP
Address Resolution Protocol
array
A sequence of numerical values stored together in the memory of a computational system in a way that each element can be accessed efficiently when its index (position) is known.We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610 CCCS 620.
arrival process
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
artificial intelligence
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
ascending
An ordering in which smaller values come before larger ones. For example: 1, 4, 13, 23, 30.
Related courses
This concept is introduced in CCCS 610.
ASCII
One of many possible ways to map characters into numbers so that they may be stored in computer memory as bits.
Suggested links
- https://www.asciitable.com/
Related courses
This concept is introduced in CCCS 610.
Asia Pacific Network Information Centre
The regional Internet registry for the Asia Pacific region, which provides number resource allocation and registration services.
asset pricing model
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
assignment
An assignment is giving a variable a value e.g. \(x = 2\).
Related courses
This concept is introduced in CCCS 610.
attribute
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
AUP
Acceptable Use Policy
autocorrelation
Correlation between a data sequence at a shifted version of that same data sequence.We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
Automated Indicator Sharing
A system enabling the exchange of cyber threat indicators between the US government and the private sector at machine speed.
Automatic Private IP Addressing
A feature of Windows-based operating systems (included in Windows 98, ME, 2000, and XP) for automatically configuring a unique IP address and subnet mask when a DHCP server isn't available.
autoregression
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
autoregressive
A regression model built for a data sequence and a shifted version of that same data sequence.
average
Average (also known as mean) is the measure of the central value of a set of numbers when arranged in a sequence. It is calculated by adding all of the numbers in the set together and then dividing by the number of items in the set. For example, the average of \((1,2,3)\( is \(\frac{(1+2+3)}{3} = 2\).
Related courses
This concept is introduced in CCCS 620.
BA graph
Barabasi-Albert graph
bar chart
A data visualization in which quantities are expressed with pillars. The chart can be accomodated vertically or horizontally. The bar thickness is often constant while the length represents the quantity of interest, although also the thickness of the bar could be associated to some attribute of interest. The (fill) color of the bar (or the color of its border) can also provide information, as well as any patterns (like dashed borders or pattern fills).
Barabasi-Albert graph
A small initial seed graph with \(n_0\) vertices is created. Then, new vertices are added one at at time until the graph order reaches a desired value \(n > n_0\). Each arriving vertex gets \(d \geq n_0\) outgoing edges, the target vertices of which are chosen at random, preferentially to the current in-degrees of the existing vertices.
Related courses
This concept is introduced in CCCS 610.
bars
A single set of bars like \(|f(x)|\) usually refers to the absolute value, whereas double bars like \(\| \mathbf{x} \|\) refer to the norm.
BCP
Business Continuity Plan
betweenness centrality
A centrality measure for graphs that quantifies the centrality of a vertex or an edge in terms of its betweenness value.
Related courses
This concept is introduced in CCCS 610.
BFS
breadth-first search
bi-objective
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
BIA
Business Impact Analysis
binary
Having two possible values. Usually zero and one, often referred to as false and true, respectively.
binomial
Having to parts.
Blue Team
In cybersecurity, the group responsible for defending an enterprise's use of information systems by maintaining its security posture against a group of mock attackers (the "Red Team").
blur
Diffusing of a signal in a local manner.
Related courses
This concept is introduced in CCCS 610.
bond
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
boolean
A boolean is a data type that can have one of two values: true or false
Related courses
This concept is introduced in CCCS 610.
bottleneck
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
bounding box
The rectangular portion of an image or a screen that contains an object or area of interest. Usually expressed in terms of the coordinates of its top-left corner combined with either the width and the height of the box or the coordinates of the lower-right corner.
Related courses
This concept is introduced in CCCS 610.
branching process
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
breadth-first search
A traversal method that first visits all direct neighbors of the start vertex, then the neighbors of the neighbors that have not yet been visited, then the neighbors of the neighbors of the neighbors, and so forth.
Related courses
This concept is introduced in CCCS 610.
brightness
The level of light in an image.
Related courses
This concept is introduced in CCCS 610.
Business Continuity Plan
A plan that outlines the procedures and instructions an organization must follow in the face of such disasters; it covers business processes, assets, human resources, business partners and more.
business cycle
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Business Impact Analysis
A process that identifies and evaluates the potential effects (financial, life/safety, regulatory, legal/contractual, reputational and so forth) of natural and man-made events on business operations.
CA
Certificate Authority
camelcase
Text formatted in a way in which capital letters are used to indicate the start of a new word, often used in programming. For example, coolNameForSubroutine.
Related courses
This concept is introduced in CCCS 610.
Campus Area Network
A network of multiple interconnected local area networks (LANs) in a limited geographical area.
CAN
Campus Area Network
capacity
For edges of graphs, the capacity refers to the maximum quantity that can pass through that edge.The maximum allowed load, in some specific sense, that a component (such as an edge of a graph) could be assigned to hold.
Related courses
This concept is introduced in CCCS 610.
Central Processing Unit
The primary component of a computer that performs most of the processing inside the computer.
centrality
In a graph, a measure of some kind that indicates the nearness of a vertex to the center of the graph.
Related courses
This concept is introduced in CCCS 610.
Certificate Authority
A trusted entity that issues digital certificates, which are data files used to cryptographically link an entity with a public key.
Certificate Revocation List
A list of digital certificates that have been revoked by the issuing certificate authority before their scheduled expiration date.
Challenge Handshake Authentication Protocol
An authentication protocol used by Point to Point Protocol (PPP) servers to validate the identity of remote clients.
CHAP
Challenge Handshake Authentication Protocol
characteristic
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
chromatic number
The chromatic number of a graph is the minimum amount of colors needed to produce a valid coloring for that graph.
Related courses
This concept is introduced in CCCS 620.
churn
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
CIDR
Classless Inter-Domain Routing
CISA
Cybersecurity and Infrastructure Security Agency
classification
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
Classless Inter-Domain Routing
A method for allocating IP addresses and IP routing.
closing price
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
clustering
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
color
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
color channel
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
coloring
The process of assigning colors to the vertices of a graph in such a way that no two neighbors share the same color.A coloring of a graph is an assignment of colors (often represented by integers) to all of the vertices of the graph in such a manner that no vertex shares a color with any of its neighbors.
Related courses
This concept is introduced in CCCS 610 CCCS 620.
combinatorial optimization
A branch of optimization that focuses on problems that arise in combinatorics.
Related courses
This concept is introduced in CCCS 610.
combinatorics
A branch of discrete mathematics that focuses on how combinations of elements can be formed and counted.We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
command
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
commodities
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Common Body of Knowledge (CBK)
A comprehensive framework of all the relevant subjects a security professional should be familiar with, including skills, techniques and best practices.
Common Internet File System (CIFS)
A protocol that allows programs to make requests for files and services on remote computers on the Internet.
Common UNIX Printing System (CUPS)
A modular printing system for Unix-like computer operating systems that allows a computer to act as a print server.
Common Vulnerabilities and Exposures (CVE)
A list of publicly disclosed information security vulnerabilities and exposures.
component
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
Computer Security Incident Response Team (CSIRT)
A concrete organizational entity that is assigned the responsibility for coordinating and supporting the response to a computer security event or incident.
condition
A condition is a statement that compares two values, variables, or expressions and returns a Boolean value of true or false such as \(xWe have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610 CCCS 620.
conjecture
A supposition that someone thinks likely to be true but that is not verified.A possible "rule" someone thinks might be valid but nobody has been able to prove just yet.
Related courses
This concept is introduced in CCCS 610.
conjunction
A conjunction is a logical connective that is used to join two or more propositions together and is considered to be true if and only if all of the propositions that it connects are true. It is represented by the symbol \(\vee\).
Related courses
This concept is introduced in CCCS 610.
connected component
A subgraph in which all vertices that belong to that subgraph have at least one path to all other vertices of that subgraph.
Related courses
This concept is introduced in CCCS 610.
connected graph
A graph that has one single connected component.
Related courses
This concept is introduced in CCCS 610.
connection
In a graph, a connection between two vertices is commonly called an edge.
Related courses
This concept is introduced in CCCS 610.
constraint
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
contrast
The level of separation between the lightest and the darkest colors in an image.
Related courses
This concept is introduced in CCCS 610.
convergence
The process in which a phenomenon reduces variability over time to settle at (or infinitely approach) a fixed state.
Related courses
This concept is employed in CCCS 620.
coordinate
A value that indicates the position of an element of interest within some specified range. For example, along an axis.
Related courses
This concept is introduced in CCCS 610.
correlation
A linear relationship between two quantities over a set of measurements.
cost analysis
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
coupling
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
coverage
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
CPU
Central Processing Unit
CRL
Certificate Revocation List
crop
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
Cross-site request forgery
An attack that tricks the victim into submitting a malicious request, exploiting the trust that a website has in a user's browser.
Cross-site Scripting
A type of security vulnerability typically found in web applications that enables attackers to inject malicious scripts into webpages viewed by other users. Abbreviates as XSS.
CSRF
Cross-site request forgery
CSV
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
cumulative
Cumulative refers to data being combined over a range of values.
Related courses
This concept is introduced in CCCS 620.
cumulative distribution
Instead of focusing the probability of a specific value (a regular distribution), a cumulative distribution describes the probability of obtaining a specific value or lower, effectively combining the likelihood of all values up until the point of interest.
Related courses
This concept is introduced in CCCS 620.
curve fitting
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
Cybersecurity and Infrastructure Security Agency
An agency of the U.S. Department of Homeland Security that focuses on enhancing the security and resilience of the nation's physical and cyber infrastructure.
cycle
In programming, a cycle is a repetition of a sequence of steps while a condition to continue is met. Examples of cycles in programming include the for loop, the while loop, and the do-while.In graph theory, a cycle is a path in which the start and the end vertex are the same but no other vertices along the path are repeated.
Related courses
This concept is introduced in CCCS 610 CCCS 620.
DACS
Graduate Certificate in Data Analysis for Complex Systems
Suggested links
- https://www.mcgill.ca/continuingstudies/areas-study/data-analysis-complex-systems
data
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
data collection
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
data frame
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
Data loss prevention
A strategy for making sure that end users do not send sensitive or critical information outside of the corporate network.
data structure
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
DDDM
Graduate Certificate in Data-Driven Decision Making
Suggested links
- https://www.mcgill.ca/continuingstudies/areas-study/scs-data-driven-decision-making
decimal
A quantity that is not whole, for example \(0.3\). All fractions have a decimal representation, although not always finite.When used in reference to a whole number, it refers to the number base of the representation being 10.
Related courses
This concept is introduced in CCCS 610.
decision making
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
decision support
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
Deep Packet Inspection
A type of data processing that inspects in detail the data being sent over a computer network, and usually takes action by blocking, re-routing, or logging it accordingly.
Defense-in-Depth
A strategy that uses a series of defensive mechanisms in case one fails. In the context of computer security, it's also known as layered security.
degree
A degree is a unit of measurement for angles used to indicate the size of an angle in relation to a full rotation. One full rotation is 360 degrees. It has the symbol \(^{\circ} \).In graph theory, the degree of a vertex is the amount of neighbors it has.
Related courses
This concept is introduced in CCCS 610.
Delaunay triangulation
Delaunay triangulation is when you put a vertex (a node) inside each cell of a Voronoi diagram and then you make two vertices be neighbors (connect them by an edge) whenever the cells corresponding to those vertices share a border (touch one another).
Related courses
This concept is introduced in CCCS 610.
Demilitarized Zone
A physical or logical subnetwork that contains and exposes an organization's external-facing services to a larger and untrusted network, usually the Internet.
Denial-of-service
An attack in which multiple compromised computers are used to target a single system causing a denial of service (DoS) attack.
density
In graphs, the ratio of edges present to the maximum possible number of edges if the graph were complete.
Related courses
This concept is introduced in CCCS 610.
depth-first search
A traversal method that progresses from the current vertex to an unvisited neighbor whenever possible, and backtracks until it becomes possible again when all the neighbors of the current vertex have already been visited. The traversal ends when it returns to the start vertex and no more unvisited neighbors exist.
Related courses
This concept is introduced in CCCS 610.
derivatives
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
descending
An ordering in which larger values come before the smaller ones. For example: 98, 34, 21, 3.
Related courses
This concept is introduced in CCCS 610.
DFS
depth-first search
Related courses
This concept is introduced in CCCS 610.
DHCP
Dynamic Host Configuration Protocol
Differentiated Services
A computer networking architecture that specifies a simple and scalable mechanism for classifying and managing network traffic and providing quality of service (QoS) on modern IP networks.
Differentiated Services Code Point
A field in an IP packet that enables different levels of service to be assigned to network traffic.
DiffServ
Differentiated Services
digit
A single numeric character, 0-9 in the decimal system, but for example in the hexadecima system, there are more possible digits, whereas in the binary system there are fewer.
Related courses
This concept is introduced in CCCS 610.
Digital Signature Algorithm
A Federal Information Processing Standard for digital signatures, based on the mathematical concept of modular exponentiation and the discrete logarithm problem.
dimension
Dimension is the number of coordinates or variables needed to describe a space or object in one direction e.g a line is a one dimensional object as it is described with length, a rectangle is a two dimensional object as it can be described by its length and width etc.
Related courses
This concept is introduced in CCCS 620.This concept is employed in CCCS 640.
dimensionality
Dimensionality is the number of dimensions that describes a space or object e.g if a space/object has two dimensions, then it can be described using two coordinates \((x, y )\) or three dimension can be described using thee coordiantes \((x,y,z)\).
Related courses
This concept is introduced in CCCS 620.
directed
In graphs, an edge is directed if it is denotes a connection that is one-directional, only from the source vertex towards the target vertex (line a one-way street). A graph is directed if (at least some of) its edges are directed.We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
Disaster Recovery Plan
A documented, structured approach with instructions for responding to unplanned incidents.
disconnected
The opposite of connected.
Related courses
This concept is introduced in CCCS 610.
discounted cash flow
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
discrete
Opposite of continuous. Refers to a quantity that can only take one of specific levels. The number of levels may be finite (like when choosing from a set of options) or infinite (such as whole numbers).
discrete mathematics
A branch of mathematics that focuses on problems involving discrete quantities.
disjunction
A disjunction is a logical connective that is used to join two or more propositions together and is considered to be true if at least one of the propositions that it connects is true It is represented by the symbol '\(\wedge \('
Related courses
This concept is introduced in CCCS 610.
distance
A measure of how separate or different certain entities of interest are. For points in space, the Euclidean distance is often used. For binary strings, the Hamming distance is common. For discrete data, the Manhattan distance can work well.
In a graph, the distance between two vertices is the length of the shortest path that connects them.
Related courses
This concept is introduced in CCCS 620.
distance matrix
For graphs, like the adjacency matrix but instead of ones and zeroes, the values of the elements indicate the distance between the two vertices in question.
Related courses
This concept is introduced in CCCS 610.
distribution
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
divergence
The lack of convergence.
Related courses
This concept is employed in CCCS 620.
division by zero
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
DLL
Dynamic Link Library
DLP
Data loss prevention
DMZ
Demilitarized Zone
DNS
Domain Name System
do-while
A loop that executes once and then, after each exceution, evaluates a condition to determine whether it should execute again.
Domain Name System
The system for translating Internet domain names into IP addresses.
dominant
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
DoS
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Dots per inch
The precision at which an image is printed (related to its resolution).
DPI
Deep Packet InspectionDots per inch
dragon curve
A nonintersecting curve that is recursively defined.
Suggested links
- https://mathworld.wolfram.com/DragonCurve.html
Related courses
This concept is employed in CCCS 620.
drone
An unmanned flying vehicle, often small. Usually equipped with cameras and/or other sensors. May be operated remotely or be controlled by some computational intelligence.
Related courses
This concept is introduced in CCCS 610.
DRP
Disaster Recovery Plan
DSA
Digital Signature Algorithm
DSCP
Differentiated Services Code Point
Dynamic Host Configuration Protocol
A network protocol that enables a server to automatically assign an IP address to a computer from a defined range of numbers configured for a given network.
Dynamic Link Library
A collection of small programs, any of which can be called when needed by a larger program that is running in the computer.
dynamics
The way in which the elements of a system (are able to) behave over time, possibly responding to stimuli or reacting to its environment.
e
By itself, usually a reference to a constant called the Neperian number as well as Euler's constant, \(e \approx 2.71\).A curved e-like symbol \(\in\) is the inclusion operator in set theory, meaning that a specific element forms part of a specific set. The usual way to read \(x \in A\) is "\(x\) in \(A\)" or "\(x\) belongs to set \(A\)".
Suggested links
- https://www.mathsisfun.com/numbers/e-eulers-number.html
Related courses
This concept is introduced in CCCS 630.
ECDSA
Elliptic Curve Digital Signature Algorithm
ECN
Explicit Congestion Notification
economics
A field of science that studies economic phenomena.
edge
A connection between two vertices. When vertex \(v\( is connected to vertex \(w\), we write \((v, w) \in E\) to indicate that this edge is present in the set of edges \(E\).We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610 CCCS 620.
EDR
Endpoint detection and response
EIGRP
Enhanced Interior Gateway Routing Protocol
Electromagnetic Interference
Disturbance generated by an external source that affects an electrical circuit by electromagnetic induction, electrostatic coupling, or conduction.
Elliptic Curve Digital Signature Algorithm
A cryptographic algorithm used by Bitcoin to ensure that funds can only be spent by their rightful owners.
Email Spoofing
The creation of email messages with a forged sender address, with the purpose of tricking the recipient into believing that the message is from a different sender.
emergent
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
EMI
Electromagnetic Interference
emulation
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
End-of-life
Refers to the point in time when a product is no longer supported or maintained by the creator.
Endpoint detection and response
A type of security software that actively monitors endpoints (devices) for suspicious activities and responds by taking automatic action to prevent, alert, and report potential threats.
Endpoint Security
The process of securing endpoints or entry points of end-user devices such as desktops, laptops, and mobile devices from being exploited by malicious actors and campaigns.
Enhanced Interior Gateway Routing Protocol
A Cisco-proprietary, advanced distance-vector routing protocol used on a computer network for automating routing decisions and configuration.
ENISA
European Union Agency for Cybersecurity
EOL
End-of-life
epidemic
A phenomenon in which a contagion of some type spreads (rather widely) though a population.
Related courses
This concept is introduced in CCCS 610.
equation
A mathematical expression that expresses one quantity in terms of others (possibly involving constant quantities as well). For example, \(y = 2x + 3\).
equilateral
An equilateral triangle is a type of triangle in which all three sides have the same length.
Related courses
This concept is introduced in CCCS 610.
equilibrium
A state in which a phenomenon no longer varies. In finance, a price is at an equilibrium when the supply matches the demand.
error
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
EU
European Union
Euclidean distance
Distance measured in a space as the squareroot of the sum of the differences of the coordinates of two points. For a two-dimensional space, if we denote the dimensions as \(x\) and \(y\) and the points as \(p_1 = (x_1, y_1)\) and \(p_2 = (x_2, y_2)\), the differences will be \(\Delta x = x_1 - x_2\) and \(\Delta y = y_1 - y_2\), so the squareroot of the sum becomes \(\sqrt{\Delta x^2 + \Delta y^2}\).
Related courses
This concept is introduced in CCCS 610.
Euler's number
An irrational constant \( e \approx 2.7182 \)
Suggested links
- https://www.investopedia.com/terms/e/eulers-constant.asp
European Union
A political and economic union of 27 member states that are located primarily in Europe.
European Union Agency for Cybersecurity
A center of network and information security expertise for the EU, its member states, the private sector, and Europe's citizens.
evaluation
Evaluation is the process of determining the value or the result of an expression, an equation, or an algorithm
Related courses
This concept is introduced in CCCS 610.
event
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
Explicit Congestion Notification
An extension to the Internet Protocol and to the Transmission Control Protocol and is defined in RFC 3168.
exponential
A concept or phenomenon that can be modelled in some way in terms of the exponential function \( f(x) = e ^ x \) where \( e\) is Euler's number
exponential distribution
A probability distribution that is memoryless and continuous.
Suggested links
- https://byjus.com/maths/exponential-distribution/
Extensible Authentication Protocol (EAP)
An authentication framework frequently used in wireless networks and point-to-point connections.
Extensible Markup Language
A markup language that defines a set of rules for encoding documents in a format that is both human-readable and machine-readable.
Extension Headers
Additional IP packet headers added to IPv6 packets to provide additional network service.
extrapolate
The act of performing an extrapolation.
extrapolation
Building a model based on a set of known data and then assuming that this model is valid for values outside the range of the observations included in the set of known data.
face coloring
Similar to vertex coloring, in the sense that the Delaunay triangulation is dual to a Voronoi diagram. Colors are being assigned to regions and no neighboring pair of regions may share a color.
factor
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
FDE
Full Disk Encryption
feature
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
Field-Programmable Gate Array (FPGA)
An integrated circuit designed to be configured by a customer or a designer after manufacturing.
File Transfer Protocol (FTP)
A standard internet protocol provided by TCP/IP used for transmitting files from one host to another.
filter
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
financial analysis
Applying analytical techniques to financial problems.
Suggested links
- https://www.investopedia.com/terms/f/financial-analysis.asp
Firewall Rule Base
A set of rules that determine whether to permit or deny network traffic based on IP addresses, protocols, ports, and other factors.
fiscal policy
Government decisions related to taxation.
Suggested links
- https://www.imf.org/en/Publications/fandd/issues/Series/Back-to-Basics/Fiscal-Policy
flow
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
Floyd-Warshall algorithm
A method for efficiently calculating the distance matrix of a graph.
Suggested links
- https://www.baeldung.com/cs/floyd-warshall-shortest-path
Related courses
This concept is introduced in CCCS 610.
for loop
A for loop is a type of control flow statement in programming that allows a specific block of code to be executed repeatedly for a fixed number of times.
Related courses
This concept is introduced in CCCS 620.
forecast
The output of the process of forecasting.
Related courses
This concept is introduced in CCCS 620.
forecasting
The process of building a model of past observations and using that model to make assumptions of the future. In a sense, a form of extrapolation.
FQDN
Fully Qualified Domain Names
fractal
A self-replicating pattern.We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Suggested links
- https://fractalfoundation.org/resources/what-are-fractals/
Related courses
This concept is introduced in CCCS 610 CCCS 620.
fraction
A fraction is way of expressing a number as a ratio of two integers, known as a numerator and denominator. For example, \(6/13\).
Related courses
This concept is introduced in CCCS 620.
frequency
Frequency is a measure of how often an event occurs.In physics, this is expressed within a given time unit and is measure in Hertz (Hz). For an oscillator, it would represent the speed at which it goes back and forth.
In statistics, frequency is calculated as the number of observations that fulfill an event of interest. This could be normalized to be easily comparable between different sample sizes.
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610 CCCS 620.
full circle
360 degrees or \(2 \pi\) radians
Full Disk Encryption
A technology which protects information by converting it into unreadable code that cannot be deciphered easily by unauthorized people.
Fully Qualified Domain Names
The complete domain name for a specific computer or host on the internet.
function
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
gaussian
When referrring to a distribution: normal.
Related courses
This concept is introduced in CCCS 610.
geometric distribution
The probability distribution describing the number of attempts needed to achieve one success in a Bernoulli trial.
Suggested links
- https://www.cuemath.com/geometric-distribution-formula/
Related courses
This concept is introduced in CCCS 610.
GIF
Graphics Interchange Format
Suggested links
- https://en.wikipedia.org/wiki/GIF
Related courses
This concept is introduced in CCCS 610.
graph
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
greedy
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
greek letters
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
growth rate
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
Hash-Based Message Authentication (HMAC)
A specific type of message authentication code involving a cryptographic hash function and a secret cryptographic key.
heuristic
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
hexadecimal
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
high price
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
honeycomb
A pattern formed by hexagons glued together with no empty space in between
Related courses
This concept is introduced in CCCS 610.
Host Intrusion Prevention Systems (HIPS)
An installed software package which monitors a single host for suspicious activity by analyzing events occurring within that host.
Host-based IDS (HIDS)
An intrusion detection system that monitors and analyzes the internals of a computing system as well as the network packets on its network interfaces.
hub
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
Hypertext Transfer Protocol (HTTP)
The protocol used for transmitting hypertext via the internet.
hypothenuse
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Identity and Access Management (IAM)
Frameworks for business processes that facilitate the management of electronic or digital identities.
IDLE
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
if statement
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
import
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
in-degree
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Indicator of Compromise
A piece of forensic data, such as data found in system log entries or files, that identifies potentially malicious activity on a system or network.
Indicators of Attack (IoA)
Observable activities that indicate an attempt to exploit a known vulnerability or weaknesses in a system or network.
inequality
An inequality is a statement that compares the values of two expressions e.g \(2 < 10, 6 \leq 8 \).
Related courses
This concept is introduced in CCCS 620.
infected
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
Infrastructure as a Service (IaaS)
A form of cloud computing that provides virtualized computing resources over the internet.
Initialization Vector (IV)
An arbitrary number that can be used along with a secret key for data encryption.
Institute of Electrical and Electronics Engineers (IEEE)
A professional association for electronic engineering and electrical engineering with its corporate office in New York City.
instruction
An instruction is a command to be executed by a processor.
Related courses
This concept is introduced in CCCS 610.
integer
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
Intellectual Property (IP)
Creations of the mind, such as inventions, literary and artistic works, designs, symbols, names, and images, that are protected by law.
intercept
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Interface class
An interface is a sketch that is useful to implement a class. The methods used in the interface are all abstract methods. The interface does not have any concrete method.
Related courses
This concept is introduced in CCCS 301.
interference (in physics)
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
Interior Gateway Routing Protocol (IGRP)
A proprietary routing protocol developed by Cisco Systems to overcome the limitations of RIP.
internal node
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
International Organization for Standardization (ISO)
An international standard-setting body composed of representatives from various national standards organizations.
International Telecommunication Union (ITU)
A specialized agency of the United Nations that is responsible for issues that relate to information and communication technologies.
Internet Assigned Number Authority (IANA)
A department of ICANN responsible for coordinating some of the key elements that keep the Internet running smoothly.
Internet Content Filter
A software that restricts or controls the content an Internet user can access, especially when utilized to restrict material delivered over the internet via the Web, e-mail, or other means.
Internet Control Message Protocol (ICMP)
One of the main protocols of the Internet protocol suite. It is used by network devices, including routers183. Address Resolution Protocol (ARP)
Internet Group Management Protocol (IGMP)
A communications protocol used by hosts and adjacent routers on IPv4 networks to establish multicast group memberships.
Internet Printing Protocol (IPP)
A protocol for remote printing and printer management.
Internet Protocol (IP)
Principal communications protocol in the Internet protocol suite for relaying datagrams across network boundaries.
interpolate
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
interpolation
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Intrusion Detection System (IDS)
A device or software application that monitors a network or systems for malicious activity or policy violations.
Intrusion Detection Systems (IDS)
A device or software application that monitors a network or systems for malicious activity or policy violations.
Intrusion Prevention System (IPS)
A network security/threat prevention technology that examines network traffic flows to detect and prevent vulnerability exploits.
Intrusion Prevention Systems (IPS)
A system that can detect an intrusive activity and can also attempt to stop the activity, ideally before it reaches its target.
investment return
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
IoC
Indicator of Compromise
iteration
Iteration refers to the process of repeatedly executing a block of code until a given condition exists or nolonger exitis
Related courses
This concept is introduced in CCCS 620.
JPG
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
Julia set
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is employed in CCCS 620.
Kerberos
A computer network authentication protocol that works on the basis of tickets to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner.
kernel
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
Knowledge-Based Authentication (KBA)
A method of identity verification that uses a knowledge of private information of the claimed identity to prove the identity of an entity.
Koch curve
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
Koch snowflake
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
L2 norm
The Euclidean norm, also known as the L2 norm, is defined as the square root of the sum of the squares of the elements of the vector. It is commonly used to calculate the length of a vector in Euclidean or multi dimensional space
Related courses
This concept is introduced in CCCS 620.
label
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
labelled data
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
lambda
A greek letter, often used in lowercase \( \lambda \) to denote the rate in exponential and Poisson distributions, whereas the uppercase \( \Lambda \) is often used to denote the neighborhood of a vertex.
LaTeX
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
layout (graph)
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
leaf
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
leg (triangle)
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
lemma
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
lemmatize (in NLP)
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
library
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
Lightweight Directory Access Protocol (LDAP)
An open, vendor-neutral, industry-standard application protocol for accessing and maintaining distributed directory information services over an IP network.
line
A line is the one dimensional object that extends in two opposite directions. A line has the equation \(y=mx+c\) where \(b\) is the is the point where \(y\) crosses the the vertical (\(y\() axis (\(y\( intercept), and \(m\) is the slope of the line.The proper mathematical term to describe people standing in line is a queue.
Related courses
This concept is introduced in CCCS 620.
linear
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
linear programming
Linear Programming is a problem solving approach based on mathematical modeling of a business problem.
Related courses
This concept is introduced in CCCS 640.
list
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610 CCCS 620.
Local Area Network (LAN)
A computer network that interconnects computers within a limited area such as a residence, school, laboratory, university campus or office building.
location
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
log file
A log file is a record containing all the events related to a system.
Related courses
This concept is introduced in CCCS 620.
log scale
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
log-log plot
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
logarithmic scale
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
logic
Logic refers to the principles and methods used to design and implement algorithms and programs that can make decisions, solve problems, and process data.
Related courses
This concept is introduced in CCCS 610.
loop
A loop is another term to refer to a cycle in programming.
Related courses
This concept is introduced in CCCS 610.
low price
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
lowercase
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
machine learning
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
Man-in-the-Middle (MitM)
A type of eavesdropping attack where communication between two users is monitored and modified by an unauthorized party.
Man-in-the-Mobile (MitMo)
A form of attack that allows an attacker to intercept and manipulate mobile communications.
managing portfolio risk
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Mandelbrot set
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is employed in CCCS 620.
map coloring
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
mapping
A mapping between two sets is a relation that assigns an element of one set to element(s) of the other set. Often a one-to-one mapping is desired in which as many elements of the source set as possible are assigned a distinct element of the target set.
Related courses
This concept is introduced in CCCS 620.This concept is employed in CCCS 630.
market data
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
mask
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
matching
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
mathematical mean
The mean is the average of a data set consisting of numbers. It is calculated by adding all of the numbers together and then dividing by the total number of items. It is essentially a normalized sum.
Related courses
This concept is introduced in CCCS 620.
maximization
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
maximum flow
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
mean
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
Mean Time Between Failures (MTBF)
The predicted elapsed time between inherent failures of a mechanical or electronic system, during normal system operation.
Mean Time to Repair (MTTR)
The average time required to troubleshoot and repair failed equipment and return it to normal operating conditions.
measure
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
measurement
A measurement describes the size, amount, degree or quantity of an object
Related courses
This concept is introduced in CCCS 620.
measuring
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Media Access Control (MAC)
A unique identifier assigned to a network interface controller for use as a network address in communications within a network segment.
median
Median is the middle value of a sequence of numbers. In other words, the median is the measure of central tendency of a data set organized in ascending or dscending order.We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610 CCCS 620.
memory
Memory refers to the storage space in a computer where data is held temporarily or permanently.We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
metaheuristic
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
metric
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
minimization
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
minimum
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
minimum cut
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
minimum spanning tree
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610 CCCS 620.
Mobile Device Management (MDM)
A type of security software used by an IT department to monitor, manage, and secure employees' mobile devices.
model
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
monetary policy
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
MST
minimum spanning tree
Related courses
This concept is introduced in CCCS 610.
multi-agent
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
multi-factorial
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
multi-objective
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
n-dimensional space
\(n\)-dimensional space means that \(n\) could take any value. A zero-dimensional space is a point. A one-dimensional space is a line. A two-dimensional space is a plane (an infinite, flat surface). A three-dimensional space is what you see around you. So \(n\)-dimensional just means that \(n\) could be 0, 1, 2, 3 or some larger number.
Related courses
This concept is introduced in CCCS 610.
Napierian number
Another name for Euler's number, after John Napier.
National Cyber Security Alliance (NCSA)
A nonprofit public-private partnership that promotes cybersecurity and privacy education and awareness.
National Institute of Standards and Technology (NIST)
A physical sciences laboratory and a non-regulatory agency of the United States Department of Commerce.
National Support Center for Systems Security and Information Assurance (NSCSSIA)
I couldn't find a specific reference for this, it seems like a hypothetical center for supporting cybersecurity and information assurance.
natural language processing
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
Near-field Communication (NFC)
A set of communication protocols for communication between two electronic devices over a distance of 4 cm or less.
nearest neighbor
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
negation
Negation is a logical operation that is used to flip the truth value of a proposition e.g a true proposition becomes false and a false proposition becomes true.
Related courses
This concept is introduced in CCCS 610.
neighbor
The US spelling of neighbour.
Related courses
This concept is introduced in CCCS 630.
neighborhood
US spelling for neighbourhood.
neighbour
Two vertices \(v\) and \(u\) in a graph are neighbors if there is an edge \( (v, u) \) that connects them in the edge set of that graph.
Related courses
This concept is introduced in CCCS 620.
neighbourhood
In graph theory, the neighborhood of a vertex is the set of vertices that are its neighbors.
network
A network is a graph composed of source and destination nodes which are connected by arcs.
Related courses
This concept is introduced in CCCS 610.This concept is employed in CCCS 640.
Network Address Translation (NAT)
A method of remapping one IP address space into another by modifying network address information in the IP header of packets while they are in transit across a traffic routing device.
Network Interface Controller (NIC) or Individual Address Part (IAP)
A computer hardware component that connects a computer to a computer network.
Network-Attached Storage (NAS)
Dedicated file storage that provides multiple users and heterogeneous client devices with data access to a centralized disk capacity.
Network-based Intrusion-detection Systems (NIDS)
An IDS that monitors and analyzes network traffic for potential intrusions and reacts to thwart them.
Next-generation Firewall (NGFW)
A part of the third generation of firewall technology, combining a traditional firewall with other network device filtering functionalities.
NLP
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
node
An element of a graph or a network or a tree structure.
Related courses
This concept is introduced in CCCS 610.
norm
The norm of a vector is a scalar value that represents the length or magnitude of the vector. It is often represented by the symbol \(||\(
Related courses
This concept is introduced in CCCS 620.
normalization
Normalization is a process of adjusting the values of a set of data so that they conform to a specific scale or range.
Related courses
This concept is introduced in CCCS 620.
normalized
A normalized number is a number that has been adjusted to conform to a specific scale or range.
Related courses
This concept is introduced in CCCS 620.
numpy
A Python library for scientfic calculations.
Related courses
This concept is introduced in CCCS 610.
OAuth
An open standard for access delegation, commonly used as a way for Internet users to grant websites or applications access to their information on other websites but without giving them the passwords.
objective
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
octal
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Online Certificate Status Protocol (OCSP)
An Internet protocol used for obtaining the revocation status of an X.509 digital certificate.
opacity
The lask of transparency in a color.
Related courses
This concept is introduced in CCCS 610.
open data
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
Open Shortest Path First (OSPF)
A routing protocol for Internet Protocol (IP) networks that uses a link state routing algorithm.
Open Source Intelligence (OSINT)
Information collected from publicly available sources to be used in an intelligence context.
Open Systems Interconnection (OSI)
A conceptual model that characterizes and standardizes the communication functions of a telecommunication or computing system without regard to its underlying internal structure and technology.
OpenID Connect (OIDC)
A simple identity layer on top of the OAuth 2.0 protocol, which allows computing clients to verify the identity of an end-user based on the authentication performed by an authorization server, as well as to obtain basic profile information about the end-user.
opening price
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
operand
Operators are used to manipulate values or expressions in equations or expressions. For example, in the expression 3 + 4, 3 and 4 are the operands and + is the operator
Related courses
This concept is introduced in CCCS 610.
operator
An operator is a mathematicals symbols used to manipulate values or expressions in equations or expressions. Arithmetic operators: \((+ , - , / , \times )\).
Comparison operators: \((>,<,\leq,\geq,==,!=)\).
Logical oparators: \(( &&, ||, !)\).
Related courses
This concept is introduced in CCCS 610.
optimal
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
optimization
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
optimum
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
order
In a graph, the order refers to the number of vertices the graph has.
Related courses
This concept is introduced in CCCS 610.
Organization Unique Identifier (OUI)
A 24-bit number that uniquely identifies a vendor or manufacturer.
orthomosaic
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
out-degree
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Overloading
A type of polymorphism that there are Two or more methods with different signatures
Related courses
This concept is introduced in CCCS 301.
Overriding
A type of polymorphism that an inherited method is replace with another having the same signature
Related courses
This concept is introduced in CCCS 301.
pandas
A Python library for handling spreadsheet-like data.
Related courses
This concept is introduced in CCCS 610.
parallel
Two lines are parallel if they have the same slope. This means that the closest distance between the two lines remains constant.In graph theory, two edges are parallel if they share both endpoints.
Pareto front
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
Password Authentication Protocol (PAP)
A very basic two-way process where a user provides a password that is then compared with a previously agreed-upon password.
path
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
Penetration Testing (Pen Testing)
An authorized simulated attack on a computer system, performed to evaluate the security of the system.
percent
Percent is a way to express a number as a fraction of 100.
Related courses
This concept is introduced in CCCS 620.
percentile
A percentile is a measure used in statistics indicating the value below which a given percentage of observations in a group of observations falls. For example, if an individual received a mark of 95% on a math test and that mark was greater than or equal to the marks of 88% of students then that mark would place that individual in the 88th percentile. It can be used to give a rough idea of the distribution of data.
Related courses
This concept is introduced in CCCS 620.
percolation
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
periodic
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
Personal Area Network (PAN)
A network for interconnecting devices centered around an individual person's workspace.
Personally Identifiable Information (PII)
Any information that can be used to identify an individual, such as name, social security number, and birth date.
phase (of an oscillator)
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Phishing
A type of cyber attack that uses email or a malicious website to infect your machine with malware or collect your sensitive information.
pi
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
pie chart
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
pip
A tool for adding packages that provide libraries into a python installation.
Related courses
This concept is introduced in CCCS 610.
pixel
The smallest unit of a digital image.
Related courses
This concept is introduced in CCCS 610.
planar
A graph is planar if it can be drawn on a plane (a flat two-dimensional surface) in such a manner that no edge crosses over another edge in the drawing.
Related courses
This concept is introduced in CCCS 620.
Platform as a Service (PaaS)
A category of cloud computing services that provides a platform allowing customers to develop, run, and manage applications without the complexity of building and maintaining the infrastructure.
PNG
Portable Network Graphics
Suggested links
- https://en.wikipedia.org/wiki/PNG
Related courses
This concept is introduced in CCCS 610.
point
A point is a location in space
Related courses
This concept is introduced in CCCS 620.
Poisson process
A process in which arrivals occur at exponentially distributed intervals.
Related courses
This concept is introduced in CCCS 620.
polar coordinate
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
Polymorphism
In Java, polymorphism refers to the fact that you can have multiple methods with the same name in the same class
Related courses
This concept is introduced in CCCS 301.
Port Address Translation (PAT)
A function that allows multiple users within a private network to make use of a minimal number of IP addresses.
portfolio risk
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
power
Power is mathematical operation in which a number called a base can be multiplied by itself a certain number of times by an exponent to give a result e.g \(3^3 = 3\times3\times3=27\).
Related courses
This concept is introduced in CCCS 620.
power-law distribution
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
precedence
Precedence refers to the order in which operations are performed. It determines the priority of different operations, and which operation should be performed first.
Related courses
This concept is introduced in CCCS 610.
prediction
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
preferential attachment
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
preprocessing
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
Preventive, Detective and Corrective Controls
Preventive controls are designed to discourage security incidents, detective controls are designed to identify incidents, and corrective controls are designed to remediate incidents.
private equity
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Product Security Incident Response Team
A global CISCO team to manage the receipt, investigation, and public reporting of information about security vulnerabilities and issues related to Cisco products and networks.
proper
Usually, proper refers to something being correct. For example, in combinatorial optimization, a proper solution is one that is feasible, meaning that it does not violate any restrictions, although it may not be optimal. For example, a proper vertex coloring is one in which no two neighbors share a color.
proportion
Propotion descrides the relationship between two or more quantities that are equal e.g \(\frac{2}{3} =\frac{4}{6}\).We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
Protected Health Information (PHI)
Any information in the medical record or designated record set that can be used to identify an individual and that was created, used, or disclosed in the course of providing a health care service such as diagnosis or treatment.
Protocol Data Unit (PDU)
Information delivered as a unit among peer entities of networks, containing both control information and data.
Proxy Server
A server application or appliance that acts as an intermediary for requests from clients seeking resources from servers that provide those resources.
pseudo-random
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
PSIRT
Product Security Incident Response Team
Public Key Infrastructure (PKI)
A set of roles, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption.
Purple Team
In cybersecurity, a team that is composed of both red team and blue team members with the goal of maximizing both teams' effectiveness by working together.
pyomo
An optimization library for Python
Related courses
This concept is introduced in CCCS 640.
Pythagorean theorem
A mathematical theorem that states that the sum of the squares of the sides of a right triangle equals the square of the length of its hypothenuse.
Suggested links
- https://www.britannica.com/science/Pythagorean-theorem
python
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
qualitative
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
quality
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
quality of fit
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
quantile
A quantile is a value that separates a specific proportion of the data from the rest of the data. Quantiles are often represented as Qx where x represents the proportion of the data that lies below the quantile e.g if we have a dataset {1, 2, 3, 4, 5, 6, 7, 8, 9, 10} then Q0.25 is 3 and Q0.5 is 5 and Q0.75 is 8.
Related courses
This concept is introduced in CCCS 620.
quantitative
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
quartile
A quatile is the measure of the spread of a sorted dataset that divides the data into four equal parts where the first quartile Q1 is known as the lower quartile, Q2 is known ad the median and Q3 is known as the upper quatile.
Related courses
This concept is introduced in CCCS 620.
queue
A system of elements waiting for a service of some kind.
Related courses
This concept is introduced in CCCS 620.This concept is employed in CCCS 640.
radian
A radian is a unit of measurement for angles in which the measured angle is formed by two radii of a circle when the arc between them is equal to the radius. One radian is approximately 57.3 degrees, and it can be calculated by dividing the length of the arc by the radius of the circle.
Related courses
This concept is introduced in CCCS 610.
Radio Frequency Interference (RFI)
Disturbance that affects an electrical circuit due to either electromagnetic induction or electromagnetic radiation emitted from an external source.
Radio-frequency Identification (RFID)
The use of radio waves to read and capture information stored on a tag attached to an object.
random
An attack that exploits a potentially serious software security weakness that the vendor or developer may be unaware of.
Related courses
This concept is introduced in CCCS 620.
random variable
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
Ransomware
A type of malicious software that encrypts a victim's files. The attacker then demands a ransom from the victim to restore access to the data upon payment.
reachable
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
real estate
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Real-Time Operating System (RTOS)
An operating system intended to serve real-time application process data as it comes in, typically without buffering delays.
recovered
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
Recovery Point Objectives (RPO)
The age of files that must be recovered from backup storage for normal operations to resume if a computer system or network failure occurs.
Recovery Time Objectives (RTO)
The targeted duration of time and a service level within which a business process must be restored after a disaster in order to avoid unacceptable consequences associated with a break in continuity.
recursion
A self-repeating mechanism. A system with recursion
Related courses
This concept is introduced in CCCS 620.
recursive
A function that calls itself.
Related courses
This concept is introduced in CCCS 620.
Red Team
In cybersecurity, a group authorized and organized to emulate a potential adversary's attack or exploitation capabilities against an enterprise's security posture.
Regional Latin- American and Caribbean IP Address Registry (LACNIC)
The Internet address registry for Latin America and the Caribbean.
regression
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
regular expression
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
relative frequency
Relative frequency is a measure of how often an event or category occurs in relation to the total number of observations or trials. It is the normalized version of the absolute frequency.
Related courses
This concept is introduced in CCCS 620.
Remote Administrative Tool (RAT)
Software that allows a remote operator to control a system as if they have physical access to that system.
Remote Authentication Dial-In User Service (RADIUS)
A networking protocol, operating on port 1812, that provides centralized Authentication, Authorization, and Accounting (AAA) management for users who connect and use a network service.
replica
A replica is an exact copy the original item
repository
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.This concept is employed in CCCS 620.
resampling
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Reseaux IP Europeens Network Coordination Centre (RIPE NCC)
The regional Internet registry for Europe, the Middle East, and parts of Central Asia.
resilience
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
resolution
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610 CCCS 620.
restriction
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.This concept is employed in CCCS 620.
RGB
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
RGBA
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
ring (graph)
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
risk
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
risk analysis
Risk analysis is the process of predicting the outcome of a decision in the face of uncertainty.
Related courses
This concept is introduced in CCCS 640.
Rivest-Shamir-Adleman (RSA)
A public-key cryptosystem that is widely used for secure data transmission.
robustness
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
root
In mathematics, given a number \(x\), the root of \(x\) is number that when multiplied by itself a certain number of times gives\(x\). For example, the square root of 9 is 3 and the cube root of 27 is 3.In data structures, the root of a tree is the first node to be added into the structure.
Related courses
This concept is introduced in CCCS 620.
Routing Information Protocol (RIP)
One of the oldest distance-vector routing protocols which employ the hop count as a routing metric.
saturation
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
scalar
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
scale-free graph
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
scatter plot
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
scheduling
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
scipy
A Python library for scientific calculations.
Related courses
This concept is introduced in CCCS 610.
scope
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
seasonality
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
Secure File Transfer Protocol (SFTP)
A secure version of File Transfer Protocol (FTP), which facilitates data access and data transfer over a Secure Shell (SSH) data stream.
Secure Shell (SSH)
A cryptographic network protocol for operating network services securely over an unsecured network.
Security Assertion Markup Language (SAML)
An open standard for exchanging authentication and authorization data between parties, in particular, between an identity provider and a service provider.
Security Event Manager (SEM)
Tools designed to help organizations identify and respond to security incidents. SEMs collect security log events from various system entities and store them in a centralized location.
Security Information and Event Management (SIEM)
A technology that provides real-time analysis of security alerts generated by applications and network hardware.
Security Operations Center (SOC)
A centralized unit that deals with security issues on an organizational and technical level.
Security Orchestration, Automation, and Response (SOAR)
A term for software products that allow an organization to gather data about security threats, and respond to low-level security events without human assistance.
segmentation (in NLP)
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
self-similar
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
sensitivity analysis
Sensitivity analysis is the study of how changes in the coefficients of a linear programming problem affect the optimal solution.
Related courses
This concept is introduced in CCCS 640.
sequence
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is employed in CCCS 620.
Server Message Block (SMB)
A protocol for sharing files, printers, serial ports, and other resources on a network.
service time
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620 CCCS 630.
sharpness
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
Short Message Service Phishing (Smishing)
A type of scam that involves sending fraudulent SMS texts to extract personal or financial data from a target.
shortest path
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
Sierpinski triangle
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is employed in CCCS 620.
signature
In any programming language, a signature is what distinguishes one function or method from another
Related courses
This concept is introduced in CCCS 301.
similarity
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
Simple Mail Transfer Protocol (SMTP)
The standard protocol for sending emails across the Internet.
Simple Network Management Protocol (SNMP)
A standard internet protocol for managing devices on IP networks.
simple path
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
simulation
A simulation is an artificial reproduction of an operation of a real-world system or process through the use of a computer program or model.
Related courses
This concept is introduced in CCCS 620.This concept is revisited in more depth in CCCS 630.
SIR
Susceptible, Infected, Recovered.
Related courses
This concept is introduced in CCCS 610.
size
For a graph, its size is the number of edges it contains.
Related courses
This concept is introduced in CCCS 610.
slack
Slack is the unused resource as part of a resource constraint in linear programming.
Related courses
This concept is introduced in CCCS 640.
sliding window
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
slope
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Small Form Factor (SFF)
Refers to any of several physically compact connector designs that have been developed for use in fiber optic systems.
small-world network
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
Software as a Service (SaaS)
A software distribution model in which a third-party provider hosts applications and makes them available to customers over the Internet.
sojourn
length of stay (total waiting and service time of a client); mathematicians like using French words to sound more sophisticated
Related courses
This concept is introduced in CCCS 620.
sorting
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
space
Space is the measure
Related courses
This concept is introduced in CCCS 620.
space-filling curve
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is employed in CCCS 620.
spanning tree
A subgraph that contains exactly one path between every pair of vertices included in it.
Related courses
This concept is introduced in CCCS 610.
Spear Phishing
A more targeted version of the phishing attack that involves well-researched targets while posing as a trusted sender.
spring layout
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
square
Taking the square refers to multiplying a number by itself e.g the square of 5 is 25
Related courses
This concept is introduced in CCCS 620.
square root
Given a number x, the square root of x is a number that when multiplied by itself twice gives x e.g the square root of 9 is 3.
Related courses
This concept is introduced in CCCS 620.
statement
In mathematics, a statement is a declarative sentence that can be either true or false. For example, "3 + 2 = 5" is a statement. In computer programming, a statement is a single instruction that is executed by the computer.
Related courses
This concept is introduced in CCCS 610.
statistics
Statistics is a way of collecting , analyzing, interpreting and presenting data.
Related courses
This concept is introduced in CCCS 620.This concept is employed in CCCS 640.
stemming
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
stochastic
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
stock (finance)
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
stock price
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
stop word
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
Storage Area Network (SAN)
A network which provides access to consolidated, block-level data storage.
string
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
string encoding
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
structural optimization
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
structural property
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
structure
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
Structured Query Language (SQL)
A standard language for managing and manipulating databases.
Structured Threat Information Expression (STIX)
A language and serialization format used to exchange cyber threat intelligence.
Subject Alternative Name (SAN)
An extension to X.509 that allows various values to be associated with a security certificate using a subjectAltName field.
suboptimal
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
subroutine
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
supply and demand analysis
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
surplus
Surplus is the amount by which minimum requirement of a constraint is exceeded in linear programing.
Related courses
This concept is introduced in CCCS 640.
susceptible
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
synchronization
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
system
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
System on Chip (SoC)
An integrated circuit that integrates all components of a computer or other system into a single chip.
tag cloud
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
Terminal Access Controller Access-Control System (TACACS)
A remote authentication protocol that is used to communicate with an authentication server commonly used in UNIX networks.
territory
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
territory design
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
test data
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
theorem
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
threshold
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
Time of Check, Time of Use (TOCTOU)
A software bug caused by changes in a system between the checking of a condition and the use of the results of that check.
time series
A time series is a set of observations of a variable measured over successive periods of time. The forecasting procedure where past values of a variable are used to predict its future values is called a time series method.
Related courses
This concept is introduced in CCCS 640.
Time To Live (TTL)
A mechanism that limits the lifespan or lifetime of data in a computer or network, often used in the context of network data like IP packets.
tokenizing (in NLP)
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
topology (graph)
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
training data
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
transaction
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
Transmission Control Protocol (TCP)
One of the main protocols in the Internet protocol suite, it enables two hosts to establish a connection and exchange streams of data.
Transmission Control Protocol/Internet Protocol (TCP/IP)
A suite of communication protocols used to interconnect network devices on the internet.
transparency
A property in an image that allows another image to be visible behind (parts of) it.
Related courses
This concept is introduced in CCCS 610.
traveling salesperson problem
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
tree
A graph that contains no cycles. Also, a commonly employed recursive data structure for efficient handling of ordered data.
Related courses
This concept is introduced in CCCS 610.
trend
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
triangle
A triangle is a three-sided polygon where the three sides are connected by 3 angles
Related courses
This concept is introduced in CCCS 620.
triangle inequality
The triangle inequality states that the sum of the lengths of any two sides of a triangle must be larger than the length of the third side.
Related courses
This concept is introduced in CCCS 620.
Trivial File Transfer Protocol (TFTP)
A simple, lock-step FTP that allows a client to get a file from or put a file onto a remote host.
Trusted Automated Exchange of Intelligence Information (TAXII)
A protocol used to exchange cyber threat intelligence over HTTPS.
Trusted Platform Module (TPM)
A specialized chip on an endpoint device that stores RSA encryption keys specific to the host system for hardware authentication.
truth value
A truth value is a value that is assigned to a statement or proposition to indicate whether it is true or false.
Related courses
This concept is introduced in CCCS 610.
TSP
Travelling Salesperson Problem
Related courses
This concept is introduced in CCCS 610.
tuple
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
turtle
A Python library for simple drawing on a screen.
Related courses
This concept is introduced in CCCS 610.
Two-factor Authentication (2FA)
An extra layer of security that requires not only a password and username but also something that only that user has on them, i.e., a piece of information only they should know or have immediately on hand - such as a physical token.
Type of Service (ToS)
A field in the IPv4 header which is used for quality of service (QoS) by specifying precedence value.
undirected graph
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
Unified Extensible Firmware Interface (UEFI)
A specification for a software program that connects a computer's firmware to its operating system.
Unified Threat Management (UTM)
An information security term that refers to a single security solution, and usually a single security appliance, that provides multiple security functions at a single point on the network.
uniform distribution
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
Uniform Resource Locator (URL)
The address of a World Wide Web page.
unit circle
The unit circle is a circle with a radius of 1 that is centered at the origin of a coordinate plane.
Related courses
This concept is introduced in CCCS 610.
United States Computer Emergency Readiness Team (US-CERT)
A partnership between the Department of Homeland Security and the public and private sectors established to protect the nation's internet infrastructure.
uppercase
The version of a letter that comes out when capslock is on. For example, ABC are uppercase whereas abc are lowercase.
Related courses
This concept is introduced in CCCS 610.
uppercase Greek letter sigma
\(\sum\) is essentially the same symbol as \(\Sigma\). It refers to summation over elements. Subindices can be used to indicate over which slements the sum is computed, such as \(\sum_{i = 0}^4 2i = 0 + 2 + 4 + 6 + 8\) since \(i\) goes from zero to four and the elements add together are twice the value of \(i\), each.
Related courses
This concept is introduced in CCCS 630.
User Datagram Protocol (UDP)
UDP is a connectionless protocol often used in applications like games or voice and video streaming that require speed and efficiency over guaranteed delivery, sending small-sized data quickly without establishing or maintaining a connection.
utilization
The degree, level, or proportion to which some resource is being used.
variable
A variable is a symbol ,etter or word that represents a a value or a set of values in math or computer programming.
Related courses
This concept is introduced in CCCS 610.
vector
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
vertex
An element (also called a node) in a graph.
Related courses
This concept is introduced in CCCS 610.
Virtual Local Area Network (VLAN)
A logical group of workstations, servers, and network devices that appear to be on the same LAN despite their geographical distribution.
Virtual Private Network (VPN)
A service that allows you to connect to the Internet via an encrypted tunnel to ensure your online privacy and protect your sensitive data.
Virtual Private Network (VPN) Gateway
A type of networking device that connects virtual networks to other virtual networks or to on-premises networks.
visualization
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
Voronoi cell
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
Voronoi diagram
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
waiting time
The time between the arrival of a task (or a customer) and the start of the service (processing) of that task/customer.
Related courses
This concept is introduced in CCCS 630.
Watts-Strogatz graph
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
Web Application Firewall (WAF)
A firewall that monitors, filters and blocks data packets as they travel to and from a website or web application.
weight
In graph theory, the edge weight can represent some attribute such as distance or cost of the underlying phenomenon that the graph represents.
Related courses
This concept is introduced in CCCS 610.
weighted graph
A graph in which the edges each have an associated weight.
Related courses
This concept is introduced in CCCS 610.
Whaling
A specific kind of malicious hacking within the more general category of phishing, which involves sophisticated attacks on high-profile targets such as C-level executives.
while loop
A while loop is a type of control flow statement in programming that allows a specific block of code to be executed repeatedly as long as a certain condition is true.
Related courses
This concept is introduced in CCCS 610.
whitespace
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
Wi-Fi Protected Access (WPA)
A security protocol designed to secure wireless (Wi-Fi) networks.
window
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 620.
Windows Encrypting File System (EFS)
A feature of Windows that you can use to store information on your hard disk in an encrypted format.
Wired Equivalent Privacy (WEP)
A security algorithm for IEEE 802.11 wireless networks, now largely deprecated due to known vulnerabilities.
Wireless Local Area Network (WLAN)
A wireless distribution method for two or more devices that use high-frequency radio waves and often include an access point to the internet.
word cloud
An illustration of words in which the size of each word is proportional to some measure of importance such as its frequency.
Related courses
This concept is introduced in CCCS 610.
WordNet
We have not had a chance to write a definition yet, sorry for the inconvenience. Please submit the feedback form if you would like us to prioritize writing this one in particular.
Related courses
This concept is introduced in CCCS 610.
WS graph
Watts-Strogatz graph
XML
Extensible Markup Language
XSS
Cross-site Scripting
Zero Day Attack
An attack that exploits a potentially serious software security weakness that the vendor or developer may be unaware of.