Browse — Information Class · IP
23 terms
TermTypeDefinitionClassificationsUpdated
business strategynounA term used in business planning that implies a careful selection and application of resources to obtain a competitive advantage in anticipation of future events or trends.ProcessIP
Business ValuenounHow much a business is worth. Business value is a highly subjective measure because it involves estimating the value of intangible assets like trade secrets and brand recognition. It adds to this the value of tangible assets like machinery and stockholder equity. Business value is especially important for potential investors or buyers.MetricConfidentialIP
coding standardnounA set of standards and guidelines which are/should be used when writing the source code for a program.RequirementIP
Competitive IntelligencenounCompetitive Intelligence is espionage using legal, or at least not obviously illegal, means.ThreatIP
Correctness ProofnounA mathematical proof of consistency between a specification and its implementation.ArtifactIP
data lossnounThe exposure of proprietary, sensitive, or classified information through either data theft or data leakage.EventRegulatedIP
Dumpster DivingnounDumpster Diving is obtaining passwords and corporate directories by searching through discarded media.ThreatRestrictedIP
FlowchartsnounTraditional flowcharts involve the use of geometric symbols, such as diamonds, ovals, and rectangles to represent the sequencing of program logic. Software packages are available that automatically chart programs or enable a programmer to chart a program without the need to draw it manually.ArtifactIP
formal contractnounAn officially recognized agreement between two or more parties.RequirementConfidentialIP
Intangible assetnounAn asset that is not physical in nature Scope Note: Examples include: intellectual property (patents, trademarks, copyrights, processes), goodwill, and brand recognitionArtifactConfidentialIP
intellectual propertynounCreations of the mind such as musical, literary, and artistic works; inventions; and symbols, names, images, and designs used in commerce, including copyrights, trademarks, patents, and related rights. Under intellectual property law, the holder of one of these abstract “properties” has certain exclusive rights to the creative work, commercial symbol, or invention by which it is covered.DataRestrictedIP
Knowledge ManagementnounIn the NICE Workforce Framework, cybersecurity work where a person: Manages and administers processes and tools that enable the organization to identify, document, and access intellectual capital and information content.ProcessIP
ObfuscationnounThe deliberate act of creating source or machine code that is difficult for humans to understandControlIP
Object codenounThe machine code generated by a source code language processor such as an assembler or compiler. A file of object code may be executable immediately or it may require linking with other object code files (e.g., libraries, to produce a complete executable program).DataIP
Object ProgramnounA program that has been translated into machine language and is ready to be run (i.e., executed) by the computer.ArtifactIP
Proprietary InformationnounMaterial and information relating to or associated with a company's products, business, or activities, including but not limited to financial information; data or statements; trade secrets; product research and development; existing and future product designs and performance specifications; marketing plans or techniques; schematics; client lists; computer programs; processes; and know-how that has been clearly identified and properly marked by the company as proprietary information, trade secrets, or company confidential information. The information must have been developed by the company and not be available to the government or to the public without restriction from another source.DataRestrictedIP
Reverse EngineeringnounAcquiring sensitive data by disassembling and analyzing the design of a system component.ThreatRestrictedIP
secure development practicenounA software development practice where the confidentiality, integrity, and availability of the software code is protected against threats and vulnerabilities.ProcessRegulatedIP
Source codenounSoftware program instructions written in a format (language) readable by humans.DataConfidentialIP
Source programnounA program written in a programming language (such as C, Pascal, or COBOL). A compiler translates the source code into a machine-language object program.ArtifactIP
system documentationnounDetailed information about a computer system its architecture, design, data flow, and programming logic.ArtifactInternalIP