Archives Glossary Terms

Certification Body

To impartially audit the client’s product, service or system against a particular standard and provide written assurance that it meets the specific requirements.

Consultant

Assent consultants provide expert opinions, analysis, and recommendations to organisations or individuals, based on their own expertise e.g. ISO 27001, ISO 45001.

APCR

Air Pollution Control Residues APCR are hazardous regardless of composition and have a high pH, heavy metal content and persistent organic pollutants (POPs) such as dioxins. They must be managed in a controlled way to ensure the protection of the…

RDF

Refuse Derived Fuel Produced from domestic and business waste, which includes biodegradable material as well as plastics. Non-combustible materials such as glass and metals are removed, and the residual material is then shredded.

EFW

Energy From Waste An energy recovery process that generates renewable power in the form of electricity, heat or transport fuels from the controlled incineration of residual waste. An EfW plant contributes towards carbon emissions reductions and the reuse and recycling…

NFR

Not For Resale A license which can be used in a test environment for training or demonstration purposes.  Often used to support partner or resell programmes.

DDoS

A denial of service attack which floods a server with requests, causing it to not function properly and/or crash. Often executed by multiple infected PC’s being manipulated by the attacker.

WAF

Web Application Firewall A firewall designed to protect a specific HTTP Web Application.  WAFs can be either hardware appliances or software based, including software as a service.  WAFs work by filtering web traffic and applying rules to prevent malicious attacks.…

VPC

Virtual Private Cloud A configurable shared computing resource within a Public Cloud, providing isolation from other users and organisations so as to be considered ‘Private’. Several cloud providers offer VPC including Amazon (AWS), Microsoft (Azure).

HSM

Hardware Security Module A physical device used to hold Cryptographic (Encryption) Keys. HSMs have the advantage of allowing organisations to keep their own encryption keys and provide additional controls such as tamper proofing. Often HSMs are certified to internationally recognized…