ActiveX Data Objects (ADO) - A Microsoft high-level interface for all kinds of data.
Capability Maturity Model for Software (CMM or SW-CMM) - Maturity model focused on quality management processes and has five maturity levels that contain several key practices within each maturity level.
Common Object Request Broker Architecture (CORBA) - A set of standards that addresses the need for interoperability between hardware and software products.
Computer virus - program written with functions and intent to copy and disperse itself without the knowledge and cooperation of the owner or user of the computer.
Configuration management (CM) - A formal, methodical, comprehensive process for establishing a baseline of the IT environment (and each of the assets within that environment).
Covert channel - An information flow that is not controlled by a security control and has the opportunity of disclosing confidential information.
Data mining - A decision-making technique that is based on a series of analytical techniques taken from the fields of mathematics, statistics, cybernetics, and genetics.
Database Management System (DBMS) - A suite of application programs that typically manages large, structured sets of persistent data.
Database model - Describes the relationship between the data elements and provides a framework for organizing the data.
DevOps - An approach based on lean and agile principles in which business owners and the development, operations, and quality assurance departments collaborate.
Metadata - Information about the data.
Software assurance (SwA) - The level of confidence that software is free from vulnerabilities, either intentionally designed into the software or accidentally inserted at any time during its life cycle, and that it functions in the intended manner.
Time multiplexing - Allows the operating system to provide well-defined and structured access to processes that need to use resources according to a controlled and tightly managed schedule.
Time of Check vs. Time of Use (TOC/TOU) Attacks - Takes advantage of the dependency on the timing of events that takes place in a multitasking operating system.
Trusted computing bases (TCB) - The collection of all of the hardware, software, and firmware within a computer system that contains all elements of the system responsible for supporting the security policy and the isolation of objects.
Waterfall development methodology - A development model in which each phase contains a list of activities that must be performed and documented before the next phase begins.
Integrated Product and Process Development (IPPD) – A management technique that simultaneously integrates all essential acquisition activities through the use of multidisciplinary teams to optimize the design, manufacturing, and supportability processes.