Recently updated
Published entries ordered by most recent updates.
- 0xabJan 05, 2026
Hexadecimal notation that is used to define a byte (i.e., eight bits) of information, where a and b each specify four bits of information and have values from the range {0, 1, 2,…F}. For example, 0xc6 is used to represent 11000110, where c is 1100, and 6 is 0110.
- accrediting authorityJan 05, 2026
A senior (federal) official or executive with the authority to formally assume responsibility for operating an information system at an acceptable level of risk to organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, and the Nation.
- Access Point (AP)Jan 05, 2026
A device that logically connects wireless client devices operating in infrastructure to one another and provides access to a distribution system, if connected, which is typically an organization’s enterprise wired network.
- (n, e)Jan 05, 2026
RSA public key.
- {a1, ...ai}Jan 05, 2026
The internal state of the DRBG at a point in time. The types and number of the ai values depends on the specific DRBG mechanism.
- (p, q, d)Jan 05, 2026
RSA private key in the prime factor format.
- AccountJan 05, 2026
An entity in a blockchain that is identified with an address and can send transactions to the blockchain.
- Additional inputJan 05, 2026
Information known by two parties that is cryptographically bound to the secret keying material being protected using the encryption operation.
- absolute errorJan 05, 2026
The absolute difference between the noisy and unaltered versions of a query’s output.
- |x|Jan 05, 2026
The length (in bits) of the bit string x. For example, |01100100| = 8.
- +Jan 05, 2026
Addition. For example, 5 + 4 = 9.
- Access Control ModelJan 05, 2026
Formal presentations of the security policies enforced by AC systems, and are useful for proving theoretical limitations of systems. AC models bridge the gap in abstraction between policy and mechanism.
- account recoveryJan 05, 2026
The ability to regain ownership of a subscriber account and its associated information and privileges.
- [a, b]Jan 05, 2026
The set of integers x such that a ≤ x ≤ b.
- 0x0XJan 05, 2026
8 bit binary representation of the hexadecimal number X, for example, 0x02 = 00000010.
- Access ManagementJan 05, 2026
Access Management is the set of practices that enables only those permitted the ability to perform an action on a particular resource. The three most common Access Management services you encounter every day perhaps without realizing it are: Policy Administration, Authentication, and Authorization.
- (n, e, d, p, q, dP, dQ, qInv)Jan 05, 2026
RSA private key in the Chinese Remainder Theorem (CRT) format.
- Ad Hoc NetworkJan 05, 2026
A wireless network that allows easy connection establishment between wireless client devices in the same physical area without the use of an infrastructure device, such as an access point or a base station.
- adj-RIB-OutJan 05, 2026
Routes that the BGP router will advertise, based on its local policy, to its peers.
- actuatorJan 05, 2026
A device for moving or controlling a mechanism or system. It is operated by a source of energy, typically electric current, hydraulic fluid pressure, or pneumatic pressure, and converts that energy into motion. An actuator is the mechanism by which a control system acts upon an environment. The control system can be simple (a fixed mechanical or electronic system), software based (e.g., a printer driver, robot control system), or a human or other agent.
- ActorJan 05, 2026
See threat actor.
- (n, d)Jan 05, 2026
RSA private key in the basic format.
- acceptable use agreementJan 05, 2026
See user agreement.
- Actuating CapabilityJan 05, 2026
The ability to change something in the physical world.
- Access VectorJan 05, 2026
reflects the access required to exploit the vulnerability.
- {x, y}Jan 05, 2026
A set containing the integers x and y.
- 0xJan 05, 2026
A string of x zero bits. For example, 05 = 00000.
- (KEM) ciphertextJan 05, 2026
A bit string that is produced by encapsulation and used as an input to decapsulation.
- Administrative domainJan 05, 2026
A logical collection of hosts and network resources (e.g., department, building, company, organization) governed by common policies.
- addressableJan 05, 2026
To meet the addressable implementation specifications, a covered entity or business associate must (i) assess whether each implementation specification is a reasonable and appropriate safeguard in its environment, when analyzed with reference to the likely contribution to protecting the electronic protected health information; and (ii) as applicable to the covered entity or business associate (A) Implement the implementation specification if reasonable and appropriate; or (B) if implementing the implementation specification is not reasonable and appropriate—(1) document why it would not be reasonable and appropriate to implement the implementation specification; and (2) implement an equivalent alternative measure if reasonable and appropriate.
- abstractionJan 05, 2026
View of an object that focuses on the information relevant to a particular purpose and ignores the remainder of the information.
- (n,k) ruleJan 05, 2026
A cell is regarded as confidential, if the n largest units contribute more than k % to the cell total, e.g., n=2 and k=85 means that a cell is defined as risky if the two largest units contribute more than 85 % to the cell total. The n and k are given by the statistical authority. In some NSOs [national statistical office] the values of n and k are confidential.
- account linkingJan 05, 2026
The association of multiple federated identifiers with a single RP subscriber account or the management of those associations.
- acquisitionJan 05, 2026
Process of obtaining a system, product, or service.
- accounting numberJan 05, 2026
A number assigned to an individual item of COMSEC material at its point of origin to facilitate its handling and accounting.
- ⎿x⏌Jan 05, 2026
The floor of a non negative number a: the greatest integer that is smaller than or equal to a. For example,⎣5⎦ = 5, and⎣5.9⎦ = 5.
- access authorityJan 05, 2026
An entity responsible for monitoring and granting access privileges for other authorized entities.
- activationJan 05, 2026
The process of inputting an activation factor into a multi factor authenticator to enable its use for authentication.
- \(\in\)Jan 05, 2026
For an element s and a set S, s \(\in\)
- accuracyJan 05, 2026
Closeness of computations or estimates to the exact or true values that the statistics were intended to measure.
- activation factorJan 05, 2026
An additional authentication factor that is used to enable successful authentication with a multi factor authenticator.
- access agreementJan 05, 2026
See user agreement.
- [x]mJan 05, 2026
The binary representation of the non negative integer x, in m bits, where x<2m.
- ActivitiesJan 05, 2026
An assessment object that includes specific protection related pursuits or actions supporting an information system that involve people (e.g., conducting system backup operations, monitoring network traffic).
- ⎾x⏋Jan 05, 2026
The ceiling of x; the smallest integer ≥ x. For example,⎾5⏋= 5 and⎾5.2⏋= 6.
- accuracy (absolute)Jan 05, 2026
The degree of conformity of a measured or calculated value to the true value, typically based on a global reference system. For time, the global reference can be based on the following time scales: UTC, International Atomic Time (TAI), or GPS. For position, the global reference can be WGS 84.
- Access control systemJan 05, 2026
A set of procedures and/or processes, normally automated, which allows access to a controlled area or to information to be controlled, in accordance with pre established policies and rules.
- 0x00Jan 05, 2026
An all zero octet.
- access typeJan 05, 2026
Privilege to perform action on an object. Read, write, execute, append, modify, delete, and create are examples of access types.
- ∇ψ2m(obs);∇2ψ2m(obs)Jan 05, 2026
A measure of how well the observed values match the expected value. See Sections 2.11 and 3.11.