- GAAP (Generally Accepted Accounting Principles)Pertains to a common set of accounting rules and standards for financial reporting that public companies in the United States must follow. These principles are designed to ensure consistency, reliability, and comparability of financial statements. In the context of IT and cybersecurity firms, GAAP guides the recording and reporting of financial transactions, including the capitalization and expense recognition of software development costs, purchase of IT equipment, and investments in cybersecurity infrastructure.
- GAAS (Generally Accepted Auditing Standards)Pertains to a set of systematic guidelines used by auditors when conducting audits on companies' financial statements, ensuring the accuracy, consistency, and verifiability of auditors' actions and reports. In IT and cybersecurity, GAAS principles guide the auditing of IT systems and controls, focusing on issues such as data integrity, security, and the effectiveness of IT governance practices.
- Gamification The use of game design elements and mechanics in non-game contexts to increase user engagement and motivation. It is used in various industries, including information security, to make tasks and activities more enjoyable and rewarding for users. Examples include using points, badges, and leaderboards to incentivize users to follow security best practices or using game-like challenges to educate users about security threats.
- Gate In security, a gate is a physical or logical point of entry used to control access to a system or area. It can range from simple turnstiles to sophisticated biometric access systems. The gate's classification often indicates its application, such as residential (Class I), commercial (Class II), industrial (Class III), and high security (Class IV), each with a corresponding level of access control and security measures as outlined in ASTM standards for gates and barriers.
- Gateway A node in a network that serves as an access point to another network, often enabling networks using different protocols to communicate with each other. It essentially acts as a mediator, translating data between different networking protocols to ensure smooth data transfer. In security, gateways often include functions like firewalls, intrusion detection systems, or filtering to protect against potential threats and maintain the integrity and security of data passing through.
- General computer control The infrastructure controls in a computer system, including network security, access controls, and data backup procedures, among others. These controls are not specific to individual applications within the system but, instead, provide a secure foundation that supports all applications. They help ensure the integrity, reliability, and security of data and systems by safeguarding the IT environment and enabling the effective operation of application controls.
- General data center redundancy tier levels The tier levels for data center redundancy, typically classified by the Uptime Institute, range from Tier I to Tier IV. Each tier reflects the complexity and redundancy of the data center's infrastructure. Tier I represents the most basic level with no redundant components. Tier II includes some redundancy, Tier III features multiple paths for power and cooling and is concurrently maintainable, and Tier IV offers full fault tolerance with continuous uptime.
- General Data Protection Regulation (GDPR) A set of regulations governing the protection and processing of personal data in the European Union. It is used to ensure that individuals have control over their personal data and that companies handle it responsibly. Examples of GDPR compliance include obtaining consent from individuals before collecting their data and providing them with the option to opt out of data collection.
- Geocast The process of sending a message or data to a specific geographic location or group of locations. It is commonly used in networking to send targeted information to a specific group of devices within a specific geographic area. Examples include sending weather alerts to devices within a specific zip code or sending traffic updates to devices within a specific city.
- Geotagging The process of adding geographical information to digital media such as photos or videos. It is used to identify the location where the media was taken or created. Examples of GEO tagging include using GPS coordinates on a photo or using location data from a social media platform to add a location tag to a post.
Share our FREE glossary with your friends and study buddies.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions, if you find errors please contact us.