- Check digit A form of redundancy check used for error detection on identification numbers (e.g., bank account numbers, credit card numbers). It is a digit added to a string of numbers and is calculated from the other digits in the string. The presence of this additional digit helps in identifying incorrect input of the number sequence, thereby aiding in the prevention of data entry errors and enhancing the integrity of data.
- Check Digit Verification (Self-Checking Digit) A form of error detection mechanism that ensures the integrity of data during transmission or entry. It involves using a formula to calculate a check digit from the other digits in a string and then comparing that check digit to the one included with the string. If the calculated check digit matches the included one, the data is assumed to be correct; if not, an error is assumed, prompting a recheck or rejection of the data. This mechanism helps maintain data accuracy and can serve as a first line of defense against certain types of data corruption or fraudulent activity.
- Checklist A structured list of items required, things to be done, or points to be considered, used as a reminder. From a security perspective, a checklist can help ensure that all necessary procedures have been followed, security controls are in place, and potential vulnerabilities are addressed. This might include tasks to perform, security controls to implement, or guidelines to follow when developing or managing a system. Checklists can help reduce human error and ensure a consistent approach to managing security.
- Checklist test A test that is conducted by following a checklist of specific steps or tasks. It is commonly used in quality assurance or compliance testing to ensure that all necessary steps are followed and all relevant criteria are met. Examples of checklist tests include a checklist for testing the functionality of a software application or a checklist for conducting a security audit.
- Checkpoint restart procedures A method of managing long-running processes where intermediary results of a process are saved at 'checkpoints.' If the process is interrupted, rather than starting from the beginning, it restarts from the last checkpoint. This strategy is crucial for maintaining system availability and data integrity during unexpected events like system crashes or power outages. Besides saving time, these procedures can also help prevent data loss and minimize the potential for data corruption.
- Checksum A calculated value that is used to determine the integrity of data. This value is computed from the binary sequence of a digital file or message, creating a unique signature of sorts. When the data is transferred or retrieved, the checksum is recalculated and compared with the original. If the values match, the data is considered intact; if they don't, it indicates that the data has been corrupted or tampered with during transmission or storage.
- Check word A form of data verification that's used to detect errors after data transmission or storage. It is similar to a check digit but applies to a word or string of characters rather than just a number. By calculating a check word from a data string and comparing it to a stored or transmitted check word, it is possible to identify errors such as corruption or tampering. Maintaining the integrity of data is a key component of information security, making check words a useful tool in error detection and prevention.
- Chief Executive Officer (CEO) The highest-ranking executive in a company or organization, responsible for making major corporate decisions, managing overall operations and resources, acting as the main point of communication between the board of directors and corporate operations, and being the public face of the company. The CEO is often elected by the board and its shareholders.
- Chief Financial Officer (CFO) The senior executive responsible for managing an organization's financial operations and reporting, including financial planning and analysis, accounting, and budgeting. They often work closely with the CEO and other senior executives to develop and implement strategic plans and policies.
- Chief Information Officer (CIO) The senior executive responsible for overseeing an organization's information technology (IT) strategy, policies, and operations. They work closely with the CEO and other senior executives to develop and implement IT solutions that align with the organization's business goals and objectives.
Share our FREE glossary with your friends and study buddies.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions, if you find errors please contact us.