TroutTrout
Glossary

Security & Compliance Glossary

Key terms and definitions in cybersecurity, compliance frameworks, and industrial control systems.

99 terms

Access controlIdentity access management

Access Control

Access Control is a fundamental component of cybersecurity that determines who is allowed to access and interact with resources within a network. In the context of OT/IT cybersecurity, access control...

Admin dashboardSecurity dashboard

Admin Dashboard

An admin dashboard is a centralized interface that provides administrators with a comprehensive overview and control of a system's operations and security posture. In the context of OT/IT cybersecurit...

AntivirusEndpoint protection

Antivirus

An antivirus is a software program designed to detect, prevent, and remove malicious software, known as malware, from computers and networks. In the context of OT/IT cybersecurity, antivirus solutions...

Award noticeContract award

Award Notice

An award notice is an official communication that announces the successful bidder or contractor who has been selected to receive a contract, often in the context of government procurement. This notice...

Barcode scannerInventory scanner

Barcode Scanner

A barcode scanner is a device used to read and interpret barcodes, which are visual representations of data in the form of patterns or symbols. These devices are commonly used in inventory management...

Government bidDefense bid

Bid

A bid is a formal proposal submitted by a company or individual to undertake a specific project or deliver a particular service, often in response to a request for proposals (RFP) or invitation to ten...

CAGE codeCommercial and Government Entity

CAGE Code

CAGE Code stands for Commercial and Government Entity Code, a unique identifier assigned to suppliers, contractors, or entities that work with or seek to work with the United States government. It is...

Capability statementGovernment capability

Capability Statement

A capability statement is a concise document or presentation that outlines a company's qualifications, competencies, and experience, often used to demonstrate its ability to meet the specific needs of...

CertificationsIndustry certifications

Certifications

Certifications are formal recognitions issued by authoritative bodies that verify an individual, organization, or product meets specific standards of competence, quality, or the ability to perform par...

Cloud backupOffsite backup

Cloud Backup

Cloud backup refers to the practice of copying data to a remote, cloud-based server to ensure its protection and availability in the event of data loss, corruption, or disaster. This method of backup...

CMMCCybersecurity Maturity Model Certification

CMMC

Cybersecurity Maturity Model Certification (CMMC) is a framework designed to enhance the protection of sensitive unclassified information within the Defense Industrial Base (DIB). It mandates cybersec...

CMMC Level 1Basic Cyber Hygiene

CMMC Level 1

CMMC Level 1, or Basic Cyber Hygiene, represents the foundational tier of the Cybersecurity Maturity Model Certification (CMMC), focusing on implementing fundamental cybersecurity practices to protect...