Strac's glossary

As a healthcare provider, insurer, or professional handling patient data, you know the stakes are high. With over 130 million patient records breached in 2023, the need to protect personal health (PHI) data has never been more urgent. Strac's HIPAA-compliant DLP solution guarantees patient data remains protected, avoiding costly violations and penalties, allowing you to focus on delivering quality care with peace of mind.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Encryption

The process of converting information into a code to stop unauthorized access.

This is some text inside of a div block.

End User Monitoring

The tracking and analysis of user interactions with applications and systems.

This is some text inside of a div block.

Endpoint Data Loss Prevention

DLP solutions that protect data on end-user devices like laptops and mobile devices.

This is some text inside of a div block.

Endpoint Detection and Response (EDR)

Security technology that monitors and responds to suspicious activities on endpoint devices.

This is some text inside of a div block.

Endpoint Security

Protection of network endpoints against cybersecurity threats.

This is some text inside of a div block.

Enterprise Security

Comprehensive protection of an organization's network, data, and assets from security threats.

This is some text inside of a div block.

European Data Protection Board

An independent European body that maintains consistent application of data protection rules.

This is some text inside of a div block.

European Data Protection Supervisor

An independent supervisory authority responsible for monitoring EU institutions' processing of personal data.

This is some text inside of a div block.

Exact Data Match Classification

A DLP technique that identifies sensitive data by matching it exactly against known values.

This is some text inside of a div block.

Exfiltration

The unauthorized transmission of data from a computer or network to an external location.

This is some text inside of a div block.

False Positive

An incorrect identification of a threat or violation when none actually exists.

This is some text inside of a div block.

Fine Tuning

The process of adjusting AI models to boost their performance for specific tasks or domains.

This is some text inside of a div block.

GDPR

The General Data Protection Regulation - EU's comprehensive data protection and privacy regulation.

This is some text inside of a div block.

Generative AI

AI systems capable of creating new content, including text, images, code, or other data types.

This is some text inside of a div block.

Google Bard Security

Security measures and considerations specific to Google's Bard AI language model.

This is some text inside of a div block.

HIPAA

Health Insurance Portability & Accountability Act - U.S. legislation that protects medical information privacy.

This is some text inside of a div block.

HIPAA Compliance

Meeting the requirements set forth by HIPAA for protecting healthcare information.

This is some text inside of a div block.

HITECH

Health Information Technology for Economic & Clinical Health Act - legislation that strengthens HIPAA enforcement.

This is some text inside of a div block.

Hallucination, Inconsistency, and Bias

Common issues in AI systems where they generate false information, show inconsistent behavior, or display unfair prejudices.

This is some text inside of a div block.

Homomorphic Encryption

A form of encryption allowing computations on encrypted data without decrypting it.

This is some text inside of a div block.

Human Firewall

The human element of cybersecurity where employees act as a defense against security threats.

This is some text inside of a div block.

IT Compliance

Adherence to requirements set by laws, regulations, and industry standards for IT systems.

This is some text inside of a div block.

Identity Threat Detection & Response (ITDR)

Security solutions focused on detecting and responding to identity-based threats.

This is some text inside of a div block.

Identity and Access Management (IAM)

Framework of policies and technologies managing digital identities and access rights.

This is some text inside of a div block.

Information Security Policy

Documented guidelines for protecting an organization's information assets.

This is some text inside of a div block.

Insider Threat

Security risks posed by individuals with legitimate access to an organization's systems.

This is some text inside of a div block.

Keyloggers

Malicious software that records keystrokes to capture sensitive information.

This is some text inside of a div block.

Large Language Models (LLMs)

Advanced AI models trained on broad amounts of text data to understand & generate human like language.

This is some text inside of a div block.

Least Privilege

Security principle of giving users only the minimum access rights needed for their work.

This is some text inside of a div block.

MITRE ATT&CK Framework

A globally-accessible knowledge base of adversary tactics and techniques.

This is some text inside of a div block.

Machine Learning

Technology enabling systems to learn and improve from experience without explicit programming.

This is some text inside of a div block.

Malicious Email Attachments

Files attached to emails containing harmful code or malware.

This is some text inside of a div block.

Malware

Malicious software created to damage, disrupt, or gain unauthorized access to computer systems.

This is some text inside of a div block.

Man-in-the-Middle Attack (MITM)

A cyberattack where attackers secretly intercept and relay communications between two parties.

This is some text inside of a div block.

Masked Data

Information that has been modified to hide sensitive elements while maintaining a similar structure.

This is some text inside of a div block.

Microsoft Defender External Attack Surface Management

A tool that helps organizations discover and manage external digital assets.

This is some text inside of a div block.

Microsoft Defender for Cloud

A cloud security platform providing threat protection for cloud workloads.

This is some text inside of a div block.

Misconfiguration

Security vulnerabilities resulting from incorrect system or application settings.

This is some text inside of a div block.

Mobile Device Management (MDM)

Software for managing and securing mobile devices in an enterprise environment.

This is some text inside of a div block.

Model Theft

The unauthorized extraction or copying of machine learning models.

This is some text inside of a div block.

Multi-Factor Authentication (MFA)

A security system requiring multiple forms of verification to grant access.

This is some text inside of a div block.

NPI (Non-Public Information) - Finance

This is some text inside of a div block.

NYDFS Cybersecurity Regulation

New York's requirements for financial institutions' cybersecurity programs.

This is some text inside of a div block.

National Institute of Standards & Technology (NIST)

National Institute of Standards & Technology - organization that develops cybersecurity standards.

This is some text inside of a div block.

Network DLP

Data Loss Prevention solutions that monitor and protect data moving through network traffic.

This is some text inside of a div block.

Network Security

Measures taken to protect the usability and integrity of computer networks and data.

This is some text inside of a div block.

Obfuscated Data

Information that has been deliberately made difficult to understand.

This is some text inside of a div block.

PCI Compliance

Abidance to the Payment Card Industry Data Security Standard requirements.

This is some text inside of a div block.

PCI DSS

Payment Card Industry Data Security Standard - security standards for organizations handling credit cards.

This is some text inside of a div block.

Penetration Testing

Authorized simulated cyberattack to evaluate system security.

This is some text inside of a div block.

Personally Identifiable Information (PII)

Any data that could potentially recognize a specific individual.

This is some text inside of a div block.

Privilege Escalation

The exploiting of bugs or design flaws to gain elevated access to resources.

This is some text inside of a div block.

Prompt Injection

A type of attack targeting AI systems through manipulated input prompts.

This is some text inside of a div block.

Prompt Jailbreaking

Techniques used to bypass AI systems' built-in restrictions and safeguards.

This is some text inside of a div block.

Protected Health Information (PHI)

Protected Health Information - health data protected under HIPAA regulations.

This is some text inside of a div block.

Red Team

A group that helps organizations improve security by simulating real-world attacks.

This is some text inside of a div block.

Responsive Web Design

This is some text inside of a div block.

Retrieval-Augmented Generation (RAG)

A technique that combines language models with external knowledge retrieval to generate more accurate and contextual responses.

This is some text inside of a div block.

SOC2 Compliance

A framework ensuring service organizations securely manage customer data.

This is some text inside of a div block.

SOX Compliance

Meeting the requirements of the Sarbanes-Oxley Act for financial reporting and corporate governance.

S
This is some text inside of a div block.

SSensitive Personally Identifiable Information Copy

This is some text inside of a div block.

Security Information and Event Management (SIEM)

A system supplying real-time analysis of security alerts generated by network hardware and applications.

This is some text inside of a div block.

Security Operation Center (SOC)

A facility where information security experts monitor, analyze, and protect organizations from cybersecurity threats.

This is some text inside of a div block.

Security Orchestration, Automation, & Response (SOAR)

Tools that enable organizations to collect security data and automate security operations.

This is some text inside of a div block.

Security Posture Management

The continuous monitoring and improvement of an organization's overall security status.

This is some text inside of a div block.

Sensitive Data

Data that must be protected from unauthorized access to safeguard privacy or security.

This is some text inside of a div block.

Sensitive Personally Identifiable Information

This is some text inside of a div block.

Shadow Data

Sensitive information that exists outside of an organization's managed systems and security controls.

This is some text inside of a div block.

Shadow IT

Hardware or software used within an organization without IT department approval.

This is some text inside of a div block.

Shadow SaaS

Cloud services used by employees without formal IT department approval or oversight.

This is some text inside of a div block.

Single Sign-On (SSO)

An authentication method allowing users to access numerous applications with one set of credentials.

This is some text inside of a div block.

Smishing

Phishing attacks conducted through SMS text messages.

This is some text inside of a div block.

Social Engineering

Psychological manipulation techniques used to deceive people into revealing confidential information.

This is some text inside of a div block.

Social Media Archiving

The capture and storage of social media communications for compliance and record-keeping.

This is some text inside of a div block.

Software as a Service (SaaS)

Cloud based application delivery model where applications are accessed via the internet.

This is some text inside of a div block.

Unmanaged Data Stores

Data repositories that exist outside of an organization's formal management and security controls.

U
This is some text inside of a div block.

Unstructured Data

Information that doesn't follow a predefined data model or organization.

U
This is some text inside of a div block.

User Experience Design

This is some text inside of a div block.

Virtual Private Cloud (VPC)

An isolated section of a public cloud where organizations can run resources in a virtual network.

V
This is some text inside of a div block.

Virtual Private Network (VPN)

Virtual Private Network - encrypted connection over the internet from a device to a network.

V
This is some text inside of a div block.

Vishing

Voice phishing attacks conducted through phone calls.

V
This is some text inside of a div block.

Vulnerabilities

Weaknesses in a system that could be exploited by threats.

V
This is some text inside of a div block.

Vulnerability

A weakness or fault in a system, application, or process that could be exploited by malicious actors to attain unauthorized access, steal data, or disrupt operations. This can include software bugs, misconfigurations, weak passwords, or design flaws that compromise security.

V
This is some text inside of a div block.

Web Content Filtering

Technology that screens and excludes harmful or inappropriate web content.

W
This is some text inside of a div block.

Web Security

Measures protecting websites and web applications from security threats and vulnerabilities.

W
This is some text inside of a div block.

Data Security Glossary

Learn all the security and compliance terms you need to secure your customer data

Strac Logomark in the Center surrounded by Company Logos

Data Discovery, DSPM, DLP, AI-SPM Glossary