Glossary V
Vendor

Vendor

A commercial supplier of software or hardware. See NISTIR 4734 for more information.  

Read More

Virtual Machine

Virtual Machine

A simulated environment created by virtualization. See the following under Virtual machine (VM) for more information: NIST SP 800-125. NIST SP 800-190. Software that allows a single host to run one ...

Read More

VPN

VPN

Protected information system link utilizing tunneling, security controls, and endpoint address translation giving the impression of a dedicated line. See NIST SP 800-53 Rev. 4 under Virtual Private ...

Read More

Virtualization

Virtualization

The simulation of the software and/or hardware upon which other software runs. See the following for more information: NIST SP 800-125 .NIST SP 800-190 (NIST SP 800-125). The use of ...

Read More

Virus

Virus

A hidden, self-replicating section of computer software, usually malicious logic, that propagates by infecting (i.e., inserting a copy of itself into and becoming part of) ...

Read More

Virus Definitions

Virus Definitions

Predefined signatures for known malware used by antivirus detection algorithms. See NIST SP 800-82 Rev. 2 for more information. 

Read More

VoIP

VoIP

Voice over Internet Protocol A term used to describe the transmission of packetized voice using the internet protocol (IP) and consists of both signaling ...

Read More

Volatile Data

Volatile Data

Data on a live system that is lost after a computer is powered down.See NIST SP 800-86 for more information.

Read More

Vulnerability

Vulnerability

Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source. See the following under ...

Read More