A B C D E F G H I J K L M N O P Q R S T U V W X Z
*

V

Validation

Confirmation (through the provision of strong, sound, objective evidence) that requirements for a specific intended use or application have been fulfilled.

Vector

An access method for cyber operations.

Verification

Confirmation, through the provision of objective evidence, that specified requirements have been fulfilled.

Virtual Local Area Network (VLAN)

Network devices and other IT equipment grouped logically based on resources, security or business requirements instead of their physical location.

Virtual Private Network (VPN)

A network that maintains privacy through a tunnelling protocol and security procedures. Virtual Private Networks may use encryption to protect network traffic.

Virtualisation

Simulation of a hardware platform, operating system, application, storage device or network resource.

Virus

A type of malware. Viruses spread on their own by attaching code to other programs, or copying themselves across systems and networks.

Volatile media

A type of media, such as random-access memory, which gradually loses its data when power is removed.

Vulnerability

A weakness in a system’s security requirements, design, implementation or operation that could be accidentally triggered or intentionally exploited and result in a violation of the system’s security policy.

Vulnerability assessment

A vulnerability assessment can consist of a documentation-based review of a system’s design, an in-depth hands-on assessment or automated scanning with software tools. In each case, the goal is to identify as many vulnerabilities as possible.

Vulnerability management

The process of identifying, prioritising and responding to vulnerabilities.