Skip to main content
. 2 3 A B C D E F G H I J K L M N O P Q R S T U V W X Z

V

Validation

Confirmation (through the provision of strong, sound, objective evidence) that requirements for a specific intended use or application have been fulfilled.

Vector

An access method for cyber operations.

Verification

Confirmation, through the provision of objective evidence, that specified requirements have been fulfilled.

VHA

Vodafone Hutchison Australia

Virtual Local Area Network

Network devices and ICT equipment grouped logically based on resources, security or business requirements instead of their physical location.

Virtual Private Network

A network that maintains privacy through a tunnelling protocol and security procedures. VPNs may use encryption to protect traffic.

Virtual reality

Virtual reality (VR) is a simulated experience that can be similar to or completely different from the real world.

Virtualisation

Simulation of a hardware platform, operating system, application, storage device or network resource.

Virus

A type of malware. Viruses spread on their own by attaching their code to other programs, or copying themselves across systems and networks. (Micro)

Viruses

A computer virus is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code.

VLAN

Virtual Local Area Network

Vodafone

Vodafone is a British multinational telecommunications conglomerate with headquarters in London.

Vodafone Hutchison Australia

Vodafone Hutchison Australia is a mobile telecommunications company and internet service provider that operates the Vodafone brand in Australia.

Volatile media

A type of media, such as RAM, which gradually loses its information when power is removed.

VPN

Virtual Private Network

VR

Virtual reality

Vulnerability

A weakness in system security requirements, design, implementation or operation that could be exploited.

Vulnerability assessment

A vulnerability assessment can consist of a documentation-based review of a system’s design, an in-depth hands-on assessment or automated scanning with software tools. In each case, the goal is to identify as many security vulnerabilities as possible.

Vulnerability management

Vulnerability management assists in identifying, prioritising and responding to security vulnerabilities.