
Definition

What is Hardware Security? | Definition from TechTarget
Hardware security is vulnerability protection that comes in the form of a physical device rather than software installed on a computer system’s hardware. Hardware security can pertain to a device used to scan a system or monitor network traffic. Common examples include hardware firewalls and proxy servers. Less common examples include hardware security modules (HSM)…

What is Network Security? Definition and Best Practices | TechTarget
Network security encompasses all the steps taken to protect the integrity of a computer network and the data within it. It involves a combination of tools, policies, protocols and practices designed to prevent unauthorized access, misuse, modification or denial of a network and its resources. Successful network security strategies use multiple security approaches to protect…

What is Integrated Risk Management (IRM)? | Definition from TechTarget
What is integrated risk management? Integrated risk management (IRM) is a set of proactive, businesswide practices that contribute to an organization’s security, risk tolerance profile and strategic decisions. As opposed to compliance-based risk management approaches, IRM focuses on evaluating risks in the wider context of business strategy. An IRM program should be collaborative and involve…

What is the Domain Name System (DNS)? | Definition from TechTarget
The domain name system (DNS) is a naming database in which internet domain names are located and translated into Internet Protocol (IP) addresses. The DNS maps the name people use to locate a website to the IP address that a computer uses to locate that website. For example, if someone types example.com into a web…

What is a Risk Assessment? | Definition from TechTarget
What is a risk assessment? Risk assessment is the process of identifying hazards that could negatively affect an organization’s ability to conduct business. These assessments help identify inherent business risks and prompt measures, processes and controls to reduce the impact of these risks on business operations. Risk assessments help ensure the health and safety of…

What is asymmetric cyberattack? | Definition from TechTarget
An asymmetric cyberattack refers to cyberwarfare that inflicts a proportionally large amount of damage compared to the resources used by targeting the victim’s most vulnerable security measure. What does ‘asymmetric’ mean in asymmetric cyberattacks? In asymmetric cyberattacks, the perpetrator has an unfair (or asymmetric) advantage over the victim that can be impossible to detect. Oftentimes,…

What is Third-Party Risk Management? | Definition from TechTarget
Third-party risk management (TPRM) is a comprehensive framework for identifying, assessing and mitigating risks associated with using external vendors, suppliers, partners and service providers. In today’s interconnected business environment, organizations increasingly rely on third parties, which can introduce financial, operational, regulatory, cybersecurity and reputational risks. TPRM is a specialized subset of broader risk management, which…

What is Security? | Definition from TechTarget
Security for information technology (IT) refers to the methods, tools and personnel used to defend an organization’s digital assets. The goal of IT security is to protect these assets, devices and services from being disrupted, stolen or exploited by unauthorized users, otherwise known as threat actors. These threats can be external or internal and malicious…

What is Compliance Risk? | Definition from TechTarget
Compliance risk is an organization’s potential exposure to legal penalties, financial forfeiture and material loss, resulting from its failure to act in accordance with industry laws and regulations, internal policies or prescribed best practices. Compliance risk is also known as integrity risk. Organizations of all types and sizes are exposed to compliance risk, whether they…