- Legal holds in data retention The process of preserving data that may be relevant to a legal matter. It is used by organizations to ensure that they do not destroy or alter any data that may be needed for a legal investigation or lawsuit. For example, a company may use legal holds in data retention to prevent the deletion of emails that may be relevant to a pending lawsuit.
- Legal liability for data The responsibility of an organization for the data it collects, stores, and uses. It is used to ensure that organizations are held accountable for their handling of personal and sensitive data. For example, a company may be held legally liable for a data breach if it fails to adequately protect the personal information of its customers.
- Level of abstraction The distance between the details of a system and the concepts used to represent it. Higher levels of abstraction use more general concepts and provide less detail, while lower levels provide more specific details. Examples of high-level abstraction might include using a database abstraction layer to hide the details of database queries or using a high-level programming language to represent complex algorithms.
- Level of assurance A measure of the confidence that a system or process provides the desired level of security. It is used in security assessments and audits to determine the adequacy of security controls. Examples include low, medium, and high levels of assurance.
- Level of concern A measure of the potential impact of a security threat or vulnerability. It is used in risk assessments to determine the priority of addressing the threat or vulnerability. Examples include low, medium, and high levels of concern.
- Level of protection A measure of the effectiveness of security controls in protecting a system or process from security threats and vulnerabilities. It is used in security assessments and audits to determine the adequacy of security controls. Examples include confidentiality, integrity, and availability.
- Libraries (software) A collection of reusable software components that can be used to build or extend applications. It is used to improve the efficiency and maintainability of software development. Examples of software libraries include the Java API, the .NET Framework, and the Standard Template Library.
- Licensing agreement A contract between a software vendor and a user that specifies the terms and conditions for using the software. It is used to protect the intellectual property rights of the software vendor and ensure that the user complies with the specified terms and conditions. Examples include open-source and proprietary licensing agreements.
- Life cycle The stages a system or process goes through from its inception to disposal. It is used in system development and management to ensure that security is considered and implemented throughout the entire life cycle. Examples include planning, design, development, implementation, operation, and disposal.
- Lifecycle of assets The process of managing the entire lifecycle of an IT asset, from procurement to disposal. It is used to optimize the use of assets and reduce the risk of security vulnerabilities. Examples of the lifecycle of assets include asset tracking, software patching, and end-of-life planning.
Share our FREE glossary with your friends and study buddies.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions, if you find errors please contact us.