Cybersecurity Terminology

ResourcesTerms & Definitions

OAuth (Open Authorization standard)
- an open-standard authorization protocol or framework that provides applications the ability for secure designated access
OffSec (Offensive Security)
- the proactive approach to securing networks and systems from attacks by actively seeking out vulnerabilities and weaknesses
OpenIOC (Open Indicators of Compromise)
- an extensible XML schema that enables you to describe the technical characteristics that identify a known threat, an attacker's methodology, or other evidence of compromise
operate & maintain
- A NICE Framework category consisting of specialty areas responsible for providing the support, administration, and maintenance necessary to ensure effective and efficient IT system performance and security.
operational exercise
- An action-based exercise where personnel rehearse reactions to an incident scenario, drawing on their understanding of plans and procedures, roles, and responsibilities.
operations technology
- The hardware and software systems used to operate industrial control devices.
outside( r) threat
- A person or group of persons external to an organization who are not authorized to access its assets and pose a potential risk to the organization and its assets.
Overfitting
- an undesirable machine learning behavior that occurs when the machine learning model gives accurate predictions for training data but not for new data
oversight & development
- A NICE Framework category consisting of specialty areas providing leadership, management, direction, and/or development and advocacy so that all individuals and the organization may effectively conduct cybersecurity work.
microsoft-logo
ibm-logo
dell-logo
hp-logo
sentinel-logo
vmware-logo
Skip to content