Term | Definition |
---|---|
SLT Digital Lead |
The SLT digital lead is usually someone with teaching experience. They will act as a link between:
|
social engineering |
Social engineering is the psychological manipulation of individuals to trick them into divulging confidential information or performing actions that compromise
Synonyms -
Social engineering |
Spear Phishing |
Spear phishing is a highly targeted cyberattack where a malicious actor crafts personalised messages, often emails, to trick a specific individual or organization into divulging sensitive information or performing actions that benefit the attacker. Unlike general phishing that casts a wide net, spear phishing relies on extensive research of the target to make the communication appear legitimate and trustworthy, often by impersonating a known contact or authority figure.
|
Special Categories of Data | Personal data containing information relating to an individual’s; racial and ethnic origin, political opinions, religious beliefs, trade union membership, physical or mental health, sexual life, or criminal history. |
Statistical accuracy |
How often the AI system guesses the correct answer.
|
Subject Access Request |
The request of an individual to a data controller to exercise their right of access. The data controller must produce the requested information in an intelligible and, as far as is practicable, permanent format.
|
Testing data | |
Third Party |
Any person other than; the data subject, the data controller, any data processor or other person authorised to process data for the data controller or processor, or any employee or agent of the data controller or data processor.
|
threat actor | Anyone who has the potential to impact your security, usually in relation to cyber security. Someone who is either a key driver of, or participates in, a malicious action that targets an organisation's IT security. |
Threat landscape |
The collection of current and potential cyber security threats that could impact an organisation, sector, or other group. The threat landscape is dynamic and can change rapidly.
|
Training data |
A colossal bank data used to train an AI tool to make decisions.
|
Transfer |
The movement of personal data from one organisation to another.
This could also relate to the international transfer of data.
|
Transparency |
Taking appropriate measures to provide any information relating to processing to the data subject in a concise, intelligible and easily accessible form, using clear and plain language.
|
virus | A computer virus is a type of malicious software (malware) that is designed to replicate itself and spread from one computer to another. It can infect a computer and cause harm to the system by deleting files, stealing personal information, corrupting data, and even rendering the system inoperable. Viruses can be spread through various methods, such as email attachments, infected software downloads, and malicious websites. Once a virus infects a computer, it can spread to other computers on the same network or via removable storage devices like USB drives. |
Vital Interests |
Although not defined in the Data Protection Act, the Information Commissioner has advised that "vital interests" should be interpreted as relating to life and death situations: e.g. the disclosure of a data subject's medical details to a hospital casualty department after a serious accident.
|
VPN |
A virtual private network establishes a digital connection between your computer and a remote server owned by a VPN provider, creating a point-to-point tunnel that encrypts your personal data, masks your IP address. It will avoid website blocks and firewalls on the internet. This means you online experiences are provite, protected and more secure.
Synonyms -
Virtual Private Network |
vulnerability | a security flaw, glitch, or weakness found in software code that could be exploited by an attacker |
worm | a worm is a standalone piece of malicious software that reproduces itself and spreads from computer to computer. |
write-once-read-many |
A data storage technology that allows data to be written to a storage medium once and prevents it from being changed or erased.
WORM storage is used by government agencies and enterprises for archival purposes, and by organisations that need to comply with rules.
WORM storage can be hardware-based or software-based, and can use optical, magnetic, or disk media.
|