Browse — Information Class · IP

23 terms
TermTypeDefinitionClassificationsUpdated
business strategynounA term used in business planning that implies a careful selection and application of resources to obtain a competitive advantage in anticipation of future events or trends.ProcessIPMay 9, 2026
Business ValuenounHow much a business is worth. Business value is a highly subjective measure because it involves estimating the value of intangible assets like trade secrets and brand recognition. It adds to this the value of tangible assets like machinery and stockholder equity. Business value is especially important for potential investors or buyers.MetricConfidentialIPMay 12, 2026
coding standardnounA set of standards and guidelines which are/should be used when writing the source code for a program.RequirementIPMay 12, 2026
Competitive IntelligencenounCompetitive Intelligence is espionage using legal, or at least not obviously illegal, means.ThreatIPMay 12, 2026
Correctness ProofnounA mathematical proof of consistency between a specification and its implementation.ArtifactIPMay 9, 2026
data lossnounThe exposure of proprietary, sensitive, or classified information through either data theft or data leakage.EventRegulatedIPMay 12, 2026
Dumpster DivingnounDumpster Diving is obtaining passwords and corporate directories by searching through discarded media.ThreatRestrictedIPMay 9, 2026
FlowchartsnounTraditional flowcharts involve the use of geometric symbols, such as diamonds, ovals, and rectangles to represent the sequencing of program logic. Software packages are available that automatically chart programs or enable a programmer to chart a program without the need to draw it manually.ArtifactIPMay 9, 2026
formal contractnounAn officially recognized agreement between two or more parties.RequirementConfidentialIPMay 9, 2026
Intangible assetnounAn asset that is not physical in nature Scope Note: Examples include: intellectual property (patents, trademarks, copyrights, processes), goodwill, and brand recognitionArtifactConfidentialIPMay 9, 2026
intellectual propertynounCreations of the mind such as musical, literary, and artistic works; inventions; and symbols, names, images, and designs used in commerce, including copyrights, trademarks, patents, and related rights. Under intellectual property law, the holder of one of these abstract “properties” has certain exclusive rights to the creative work, commercial symbol, or invention by which it is covered.DataRestrictedIPMay 9, 2026
Knowledge ManagementnounIn the NICE Workforce Framework, cybersecurity work where a person: Manages and administers processes and tools that enable the organization to identify, document, and access intellectual capital and information content.ProcessIPMay 12, 2026
ObfuscationnounThe deliberate act of creating source or machine code that is difficult for humans to understandControlIPMay 9, 2026
Object codenounThe machine code generated by a source code language processor such as an assembler or compiler. A file of object code may be executable immediately or it may require linking with other object code files (e.g., libraries, to produce a complete executable program).DataIPMay 12, 2026
Object ProgramnounA program that has been translated into machine language and is ready to be run (i.e., executed) by the computer.ArtifactIPMay 12, 2026
production codenounCode that is currently used in a production environment.DataRegulatedIPMay 9, 2026
Proprietary InformationnounMaterial and information relating to or associated with a company's products, business, or activities, including but not limited to financial information; data or statements; trade secrets; product research and development; existing and future product designs and performance specifications; marketing plans or techniques; schematics; client lists; computer programs; processes; and know-how that has been clearly identified and properly marked by the company as proprietary information, trade secrets, or company confidential information. The information must have been developed by the company and not be available to the government or to the public without restriction from another source.DataRestrictedIPMay 9, 2026
Reverse EngineeringnounAcquiring sensitive data by disassembling and analyzing the design of a system component.ThreatRestrictedIPMay 12, 2026
secure development practicenounA software development practice where the confidentiality, integrity, and availability of the software code is protected against threats and vulnerabilities.ProcessRegulatedIPMay 9, 2026
Source codenounSoftware program instructions written in a format (language) readable by humans.DataConfidentialIPMay 9, 2026
Source programnounA program written in a programming language (such as C, Pascal, or COBOL). A compiler translates the source code into a machine-language object program.ArtifactIPMay 9, 2026
system documentationnounDetailed information about a computer system its architecture, design, data flow, and programming logic.ArtifactInternalIPMay 9, 2026
Technology Research and DevelopmentnounProcessIPMay 12, 2026