- Operational Level Agreement (OLA) A contract that defines how various departments of an organization work together to meet the service level requirements (SLR) of internal or external customers. OLAs are often used in conjunction with Service Level Agreements (SLAs) to ensure that all supporting processes are aligned to provide a certain level of service.
- Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE)A risk-based strategic assessment and planning technique for security. It helps organizations identify and manage risks related to information security by focusing on operational resilience and protection needs. It enables organizations to assess their security needs and formulate a risk-based strategy accordingly.
- Operation and Maintenance (O&M) The ongoing processes and activities required to manage and sustain the functionality of an organization's IT systems. O&M includes routine updates, technical support, system repairs, and the continuous improvement of operational workflows and IT infrastructure.
- Operations Security (OPSEC) A systematic process for identifying, controlling, and protecting sensitive information in an organization's operations. It is used to prevent unauthorized disclosure of information that could be exploited by adversaries. Examples of OPSEC measures include encrypting communications and restricting access to sensitive data.
- Operator Console A terminal or interface from which operators can monitor and manage the state of a system, network, or process. The console provides a comprehensive view of the operation, typically in real-time, and often includes tools for troubleshooting, management, and configuration of components within the system.
- Optical Character Recognition (OCR) A technology that enables the conversion of different types of documents, such as scanned paper documents, PDF files, or images captured by a digital camera, into editable and searchable data. This is commonly used in digital archiving, where physical documents are converted into digital formats for easier data retrieval and management.
- Optical Scanner A device that converts images, printed text, handwriting, or an object into a digital image. It's widely used to digitize physical photographs and documents so they can be edited, stored, and shared electronically. Its usage plays a crucial role in maintaining digital records and reducing paper clutter.
- Organization for Economic Cooperation and Development (OECD) An international organization that works to build better policies for better lives. Their goal is to shape policies that foster prosperity, equality, opportunity, and well-being for all. They draw on almost 60 years of experience and insights to better prepare the world of tomorrow.
- Orphaned software A program or application that's no longer supported or updated by its creators or maintainers. This can pose a serious risk as new vulnerabilities discovered in the software cannot be patched, potentially leaving systems susceptible to exploits. Organizations often replace orphaned software with supported alternatives to mitigate this risk.
- OS hardening Operating system (OS) hardening is the practice of securing an OS by reducing its surface area of vulnerability, which includes the disabling of unnecessary services, protecting against unauthorized access, applying patches, and enforcing the principle of least privilege. It's a crucial step during initial system setup and an ongoing policy in maintaining robust security postures, as it helps create a more secure environment that is less susceptible to cyber threats.
Share our FREE glossary with your friends and study buddies.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions, if you find errors please contact us.