Default image

Access Control

Access controls are security protocols that manage and restrict which persons or programs can view or use specific computing resources.

Default image

Advanced Encryption Standard

The Advanced Encryption Standard (AES) is an algorithm that uses a specific encryption procedure to protect...

Default image

Applied Research

Research conducted to gain the knowledge or understanding to meet a specific, recognized need.

Default image

Authentication

Authentication is a way of establishing that the user is who they claim to be before granting access to university systems and data.

Default image

Authorization

Possessing official permission or being granted/denied approval by an authoritative source (e.g., owner, steward, automated mechanism) to perform an action or set of activities.

Default image

Availability

Availability means data are accessible when you need them.

Default image

Basic Research

Research undertaken primarily to acquire new knowledge without any particular application or use in mind.

Default image

Biometrics

Biometrics are unique features of individuals, for example, fingerprints, that can identify a
specific person.

Default image

Certificate

A digital certificate is a digitally signed document with a unique signature, which definitively establishes the identity of an online entity to ensure the legitimacy of a software or website.

Default image

Chemical Facility Anti-Terrorism Standards (CFATS)

The Department of Homeland Security has issued Chemical Facility Anti-Terrorism Standards for any facility that manufactures, uses, stores, or distributes certain chemicals above a specified quantity.

Default image

Cloud

Cloud computing uses the internet to deliver computing services such as storage in servers, the provision of software, and conducting analytics.

Default image

Compliance

Compliance in cyber security means meeting certain standards and obeying by regulations...

Default image

Confidential Data

Confidential information is not subject to legal regulation, but it is not freely available to create, store, and transmit.

Default image

Confidentiality

Confidentiality refers to protecting information from unauthorized access.

Default image

Controlled Unclassified Information (CUI)

Controlled Unclassified Information (CUI) is a category of unclassified data that federal agencies create or possess...

Default image

Cryptography

Cryptography is the use of encryption, through ciphers, to protect sensitive or confidential data...

Default image

Cyber Threat

A cyber threat is any act or event that could be harmful to an individual, organization, or even a country through...

Default image

Data Breach

A data breach happens when an unauthorized person or organization acquires,
accesses, or uses confidential information.

Default image

Data Classification

Data classification is the categorization of data according to the severity of adverse effects should those data be disclosed, altered, or destroyed without authorization.

Default image

Data Classification

The organized categorization of data based on potential harm from unauthorized access, alteration, or destruction.

Default image

Data Disposal

Data disposal is the process of removing, “sanitizing,” or deleting stored information.

Default image

Deep Web/Dark Web

The Deep Web refers to are parts of the internet, or the World Wide Web (www.) that don’t come up with a standard search engine search

Default image

Deidentified Data

Deidentified data has had all individual identifiers removed.

Default image

Development Research

The systematic use of the knowledge or understanding gained from research directed toward the production of useful materials, devices, systems or methods . . .

Default image

Encryption

Encryption is the process of making information unreadable to all unauthorized users.

Default image

EU General Data Protection Regulation (GDPR)

The European Union’s General Data Protection Regulation (GDPR) is a privacy and security law that applies to any organization that collects or uses data from EU residents.

Default image

Family Educational Rights and Privacy Act (FERPA)

The Family Educational Rights and Privacy Act protects student information and gives individual students certain rights pertaining to their education records.

Default image

Federal Information Security Modernization Act (FISMA)

Under the Federal Information Security Modernization Act (FISM) federal agencies and those providing services on their behalf must develop, document, and implement security programs for information technology systems.

Default image

Food and Drug Administration Code of Federal Regulations, Title 21, Part 11 (FDA 21 CFR Part 11)

The regulations in FDA 21 CFR Part 11 set necessary criteria for electronic records and signatures to be considered reliable, trustworthy, and equivalent to paper versions.

Default image

Gramm-Leach Bliley Act (GLBA)

The Gramm-Leach Bliley Act requires financial institutions (i.e., organizations offering consumers financial products, advice, or insurance) to protect their customer’s personal information.

Default image

Health Insurance Portability and Accountability Act (HIPAA)

The Health Insurance Portability and Accountability Act specifies requirements for the privacy and security of all individually identifiable patient health information in any form or media, whether electronic, paper, or oral.

Default image

Incident

Any event which is not part of the standard operation of a service and which causes, or may cause, an interruption to, or a reduction in the quality of that service. (ITIL perspective)

Default image

Information Security

Information security is a combination of practices that protect information resources from unauthorized access, use, and modification.

Default image

Institutional Review Board

An institutional review board’s role is to ensure that research involving human subjects is
done ethically and meets federal requirements and regulations.

Default image

Integrity

Integrity means data are trustworthy, complete, and have not been accidentally altered or modified by an unauthorized user.

Default image

Least Privilege

Least Privilege is the idea of only giving users the necessary access to complete their assigned actions.

Default image

Missouri Personally Identifiable Information (PII)

Missouri PII refers to personally identifiable information (PII) as defined by the state of Missouri.

Default image

National Institute of Standards and Technology (NIST)

In cybersecurity, NIST is extremely well known for the NIST Cybersecurity Framework, as well the NIST Risk Management Framework (RMF), NIST 800-53 control guidance, NIST Digital Identity Guidelines and others.

Default image

Nuclear Regulatory Commission (NRC)

The Nuclear Regulatory Commission outlines regulations to protect information related to U.S. government programs for the physical protection and safeguarding of nuclear materials or facilities.

Default image

Office for Human Research Protections

The OHRP provides guidance and leadership to ensure human subjects’ safety and well-being and oversees regulatory implementation.

Default image

Payment Card Industry Data Security Standard (PCI DSS)

The Payment Card Industry Data Security Standard was developed by the major credit card companies as a guideline to help organizations that process card payments.

Default image

Principal Investigator

The Principal Investigator (PI) is responsible for all aspects of the research project.

Default image

Private Information

Private information is provided by an individual for a specific purpose, and the individual reasonably expects it will not be made public. 

Default image

Protected Data

Protected data refers to data regulated by federal, state, and local legislation.

Default image

Protected Health Information (PHI)

Protected health information (PHI) refers to health data created, kept, or shared by HIPAA-covered entities and their commercial partners in the provision of healthcare, healthcare operations, and payment for such services.

Default image

Public Data

Public data may be shared openly and does not have regulatory or industry requirements on its control and use.

Default image

Ransomware

Ransomware is malicious software that renders data and systems unusable until the targeted individual or organization pays a ransom.

Default image

Removable Media

Data storage devices or media that can be easily removed (i.e. are portable) from the reader device (e.g. disk drive, optical drive, USB port, hub/cradle).
Example: USB flash drive, digital memory card, CD/DVD, floppy disks, ZIP disks, external hard drive

Default image

Research

Research is creative and systematic work undertaken to contribute to the stock of knowledge . . .

Default image

Research Data

Any information generated during the research process is considered “research data.”