Check digit
Check digit: A form of redundancy check used for error detection on identification numbers (e.g., bank account numbers, credit card numbers). It is a digit added to a string of numbers and is calculated from the other digits in the string. The presence of this additional digit helps in identifying incorrect input of the number […]
Capability Table
Capability Table: A security tool used in certain computer systems to define the access rights a certain user, process or a piece of software has over specific resources in the system. The table lists out the objects and the corresponding actions that can be performed on those objects, providing a comprehensive view of what is […]
Certificate Authority (CA)
Certificate Authority (CA): An entity that issues digital certificates, which are used to verify the identity of organizations and individuals in digital communications, ensuring secure transactions and data transfer over the Internet. The CA validates entities and binds a public key with an identity, producing a certificate that can be used for secure communication.
Check word
Check word: A data verification method used to detect errors after data transmission or storage. It functions like a check digit but applies to a word or string of characters instead of just a number. By calculating and comparing a check word from a data string, errors such as corruption or tampering can be identified, […]
Business Service Provider (BSP)
Business Service Provider (BSP): A company that offers organizations various business solutions and services, often through software as a service (SaaS) model. BSPs might specialize in delivering applications for enterprise resource planning, customer relationship management, or human resources management, among others. When engaging with BSPs, organizations must assess the providers’ security measures to ensure the […]
BYOD (Bring Your Own Device)
BYOD (Bring Your Own Device): A corporate policy allowing employees to use their personal electronic devices for work-related tasks. This approach can increase flexibility and employee satisfaction but also introduces security implications. Personal devices may not have the same stringent security controls as company-issued hardware, potentially exposing the network to malware or data breaches. To […]