Vernam cipher: See one-time pad
view: A logical operation that can be used to restrict access to specific information in a database, hide attribute and restrict queries available to a user. Views are a type of constrained user interface that restricts access to specific functions by not allowing a user to request it.
Violation Analysis: The process of examining audit logs and other sources in order to discover inappropriate activities.
Virtual memory: A type of secondary memory addressing that uses both installed physical memory and available hard drive space to present a larger apparent memory space that actually exist to the Central Processing Unit (CPU).
Virtual Tape Library (VTL): A disk based storage system taht is used like magnetic tape storage for use in backup operations.
Virus: A set of computer instructions whose purpose is to embed itself within another computer program in order to replicate itself.
Voice Over Internet Protocol (VoIP): Telephony Protocols that are designed to transport voice communications over TCP/IP networks.
Vulnerability: The absence or weakness of a safeguard in an asset, which make a threat potentially more harmful or costly, more likely to occur, or likely to occur more frequently.