67 terms
Database security terms
Database security terms refer to the protection of sensitive records against unauthorized access and attacks. Knowing database security terminology helps you enforce least privilege, prevent SQL injection, and audit activity effectively.
Hadoop cluster
Hadoop cluster refers to a collection of commodity hardware servers, or nodes, interconnected to form a distributed computing infrastructure.
Soundex
Soundex is a phonetic algorithm that indexes words based on their sounds.
Zero-latency enterprise
Zero-latency enterprise refers to a concept based on the idea that decision-making processes within an organization should happen instantaneously, with no delays or “latency“.
Virtual database
A virtual database is a management system that allows users to query data from multiple sources as if they were part of a single, unified database.
Universally unique identifier
A universally unique identifier (UUID) is a 128-bit number that an algorithm generates, and it identifies unique data.
Unique constraint
A unique constraint is a database system rule that ensures every value in a column is unique.
Two-phase commit
Two-phase commit (2PC) is a protocol used in distributed systems to ensure transactional consistency between several nodes in a network.
Transparent Data Encryption
Transparent Data Encryption is a method of encrypting databases to provide a layer of security against unauthorized access to sensitive data.
Transactional data
Transactional data is a type of data that contains variables derived from transactions, such as their date, time zone, or currency.
Three-schema architecture
The three-schema architecture is a design approach for databases that splits data views into three layers: what users see, the logical structure, and how data is stored.
Third normal form
Third normal form (3NF) refers to a principle in relational database design that is used to eliminate redundancy and undesirable characteristics like insertion, update, and deletion anomalies.
Text data mining
Text data mining, also known as text mining, is a process of analyzing large amounts of unstructured textual data to extract meaningful insights and patterns.
Superkey
Superkey refers to a combination of columns that uniquely identify rows within an RDBMS (relational database management system) table.
Static data
Static data refers to data that does not change frequently or remains constant over time.
Spatial data mining
Spatial data mining extracts patterns and insights from location-based data.
Rollback
A rollback is the process of returning a database to its previous state.
RDF database
An RDF database, or a triplestore, is a type of database designed to store and manage data in the format of RDF (Resource Description Framework).
Query Language
A Query Language is a computer language.
Optical character recognition
Optical character recognition (OCR) is a technology that converts handwritten or digitally scanned text into a machine-readable format.
Operational database
An operational database manages and stores data related to daily business activities, such as orders and sales leads.
Network database
A network database is a way of organizing information where data is represented as nodes, and the relationships between nodes are represented as links.
Multidimensional database
A multidimensional database organizes data into dimensions and facts optimizing it for complex querying and fast access.
Metadirectory
A metadirectory is a system that consolidates information from multiple directories into a unified view, harmonizing data from different sources for consistency.
Log shipping
Log shipping is a database replication technique that involves automatically backing up transaction logs from a primary database to a standby (secondary) one.
In-memory database
An in-memory database (IMDB) is a type of database management system (DBMS) that stores and manages data primarily in main memory (RAM) rather than on traditional disk storage.
Garbage in, garbage out
Garbage in, garbage out (GIGO) is a principle in computer science and IT that refers to the idea that input quality is crucial for output quality.
Functional dependency
A functional dependency is a constraint between two sets of attributes in a relationship from a database.
Flat file
A flat file is a collection of alphanumeric data stored in a two-dimensional database (i.e., a database with rows and columns).
Extraction
Extraction refers to organizations obtaining relevant information from various sources, such as databases, web pages, documents, or other unstructured or structured data repositories.
Dynamic data masking
Dynamic data masking (DDM) is a way to protect sensitive information in database systems by obscuring specific data elements in real-time.
Distributed transaction
A distributed transaction refers to a database transaction that involves multiple network hosts.
Database repository
Database repository refers to a centralized place where data is stored and managed.
Database report
A database report is a formatted presentation of data from a database that provides structured information for decision-making.
Database replication
Database replication refers to electronic copying of digital data from one digital location to another to create a distributed database.
Database management system
Database management system refers to software that serves as an interface between the database and end-users or application programs.
Database engine
A database engine is the core software component that powers database systems.
Database dump
A database dump (or “dump”) is a process of pulling data from a database and saving it as a structured file.
Database clustering
Database clustering is a database management technique where multiple database servers are grouped together to work as a single unit (the “cluster”).
Database as a service
Database as a service (DBaaS) refers to a cloud computing service model that allows users, such as app developers, to use databases via the cloud.
Database administration
Database administration is the process of managing and maintaining database systems.
Data warehouse
A data warehouse is a centralized repository for data collected from various sources.
Data validation
Data validation refers to the process of ensuring that data is accurate, complete, and consistent before it is used for a specific purpose.
Data server
A data server is a computer or platform used for storing, securing, managing, and processing data.
Data retrieval
Data retrieval is a process that locates, extracts and presents information from data repositories.
Data profiling
Data profiling is reviewing and analyzing data from various sources to understand its structure, content, and quality.
Data processor
A data processor is a system, subsystem, or software application that manages and manipulates data.
Data preprocessing
Data preprocessing refers to the process of cleaning and transforming raw data into a format that can be accurately analyzed or fed into a model.
Data modernization
Data modernization refers to the process of upgrading an organization's data infrastructure and management practices to better align with contemporary technology and business needs.
Data masking
Data masking is a technique used in data security to protect sensitive or confidential information from being exposed to unauthorized individuals or systems.
Data mart
A data mart is a specialized database that stores and manages data focused on a particular business function or department (e.g., sales, marketing, or finance).
Data Manipulation Language
Data Manipulation Language is an SQL subset that executes commands to modify and manipulate data in relational databases.
Data feed
Data feed refers to a stream of data provided at regular intervals or in real-time.
Data fabric
Data fabric is a data architecture approach to creating unified environments for managing vast amounts of information in distributed systems.
Data entry
Data entry is the act of entering information into a computer, database, or application.
Data dictionary
A data dictionary is a structured collection of information about the data within a database or dataset.
Data definition language
Data definition language is a subset of SQL (structured query language) that deals with the structure and schema of the database rather than the data itself.
Data conversion
Data conversion refers to the process of transforming data from one format, structure, or system to another.
Data bank
A data bank is a structured collection of data that is organized in a way that allows for efficient storage, retrieval, and manipulation of information.
Data aggregation
Data aggregation involves gathering and merging information from different sources, formats, or categories to generate valuable insights, facilitate decision-making, or produce bigger, more inclusive datasets.
Configuration management database
Configuration management database (CMDB) is a repository that acts as a data warehouse for various IT installations.
Concurrency control
Concurrency control is the practice of managing access to shared resources in concurrent (or parallel) environments.
Composite key
A composite key is a combination of two or more columns that uniquely identify a row within a database table.
Cardinality
Cardinality refers to the relationship between tables in a database.
Canonical data model
A canonical data model (CDM) is a design pattern software engineers use to standardize the structure and format of data.
Boyce-Codd normal form
BCNF is a standard for organizing database tables to minimize data repetition.
Atomicity, Consistency, Isolation, Durability (ACID)
In general terms, Atomicity, Consistency, Isolation, Durability (ACID) is a set of database properties that are responsible for transaction process reliability.
The importance of database security terminology
Understanding database security terms shows how identities, permissions, and data are handled across devices on-premises and in the cloud. It helps you enforce least privilege, prevent injection and privilege abuse, and monitor threats without hurting performance.
Know what to do
This glossary covers how to configure authentication, roles, and least‑privilege access, rotate credentials and keys, and enable auditing in common databases.
Understand how database security works
Learning how encryption, tokenization, and network segmentation protect data helps you reduce risk without hurting performance.
Prevent common attacks
Know how to stop SQL injection and privilege escalation attacks using prepared statements, input validation, secure defaults, and timely patching.
Online security starts with a click.
Stay safe with the world’s leading VPN
Explore related articles
Explore related glossary categories
Can’t find an answer to your question?
Ask the questions that matter to you — and get answers from our cybersecurity experts.