Glossary of Terms

Your guide to the specialized language of alternative investments.

Session Sharing

The process of sharing active application sessions between team members without revealing passwords.

Zero-Knowledge

A security architecture where the service provider has no access to the user's unencrypted data or keys.

AES-256

Advanced Encryption Standard with a 256-bit key, one of the most secure encryption methods available.

RBAC

Role-Based Access Control: A method of regulating access to computer or network resources based on the roles of individual users within an enterprise.

End-to-End Encryption

A system of communication where only the communicating users can read the messages.

SSO

Single Sign-On: An authentication scheme that allows a user to log in with a single ID to any of several related, yet independent, software systems.

OAuth 2.0

The industry-standard protocol for authorization, allowing limited access to user accounts on an HTTP service.

SAML

Security Assertion Markup Language: An open standard for exchanging authentication and authorization data between parties.

Multi-Factor Authentication

A security system that requires more than one method of authentication from independent categories of credentials.

Browser Isolation

A cybersecurity technique that segregates the web browsing activity from the local network and infrastructure.

Session Hijacking

The exploitation of a valid computer session to gain unauthorized access to information or services.

JWT

JSON Web Token: An open standard that defines a compact and self-contained way for securely transmitting information between parties as a JSON object.

TLS

Transport Layer Security: A cryptographic protocol designed to provide communications security over a computer network.

Penetration Testing

The practice of testing a computer system, network or web application to find security vulnerabilities.

SOC 2

A voluntary compliance standard for service organizations, developed by the AICPA, which specifies how organizations should manage customer data.

GDPR

General Data Protection Regulation: A regulation in EU law on data protection and privacy in the European Union and the European Economic Area.

API Key

A unique identifier used to authenticate a user, developer, or calling program to an API.

HTTPS

Hypertext Transfer Protocol Secure: An extension of the Hypertext Transfer Protocol (HTTP) used for secure communication.

Data Masking

The process of obscuring specific data within a database to protect sensitive information.

Brute Force Attack

A trial-and-error method used by application programs to decode encrypted data such as passwords or DES keys.