- Write Once Read Many (WORM) A type of data storage that allows data to be written once but read multiple times. It is commonly used in industries such as finance and healthcare, where data must be retained for extended periods of time and remain unchanged. Examples of its use include storing financial records for compliance purposes or maintaining electronic medical records for patient care.
- Write protect A hardware or software mechanism that prevents modification or deletion of data on a storage device. Write protection ensures the integrity of data by making it read-only, safeguarding it against accidental or malicious alterations.
- X.25 A data link protocol used in packet-switched networks. It is commonly used in public data networks and provides error detection and recovery, flow control, and routing. Examples include X.25 over IP, X.25 over ATM, and X.25 over Frame Relay.
- X.25 interface A protocol suite for packet-switched network communications, X.25 facilitates data transmissions across long distances. It was widely used in the pre-Internet era for connecting terminals to computers, providing error correction and flow control. Although largely superseded by newer technologies, X.25 laid the groundwork for modern network communication standards.
- X.500 X.500 is a standard for directories that store information about objects on a network. It is used in directory services for storing and organizing information about users, resources, and services in a network. Examples of X.500 directories include Active Directory, LDAP, and X.500 directory services.
- X.509 V3 A standard for public key certificates, which are used to verify the identity of a user or device in a network. It is used in secure communication protocols such as SSL/TLS, which require the use of certificates for authentication and encryption. Examples of X.509 V3 certificates include SSL/TLS certificates, digital signatures, and client authentication certificates.
- Xmas Attack/Scan A network scanning technique that manipulates the TCP header flags, sending packets with the FIN, URG, and PSH flags set—resembling a lit-up Christmas tree. It is designed to probe for responses that can reveal information about active services on network devices, potentially identifying vulnerable targets for further exploits.
- XML Injection An attack where malicious XML code is inserted into a system, exploiting insecure processing of XML input by an application. This can affect the logic of XML parsers, leading to unauthorized access, data exposure, or service disruption. It's distinct from other injection attacks by specifically targeting XML parser vulnerabilities.
- XOR A logical operation that outputs true only when one of the inputs is true. It is commonly used in computer science and cryptography to perform logical operations and encrypt data. Examples include binary XOR, bitwise XOR, and Boolean XOR.
- Zachman framework A system for categorizing and organizing the components of an enterprise architecture. It is used by organizations to help plan, design, and implement complex information systems and to ensure alignment with business goals and strategies. Examples of Zachman framework components include data, function, network, people, and time.
Share our FREE glossary with your friends and study buddies.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions, if you find errors please contact us.