A robot reads a scroll

Cybersecurity
Terms & Definitions

Understanding security terminology helps you make informed decisions about protecting your organization. This glossary defines essential security terms for managed services and enterprise protection.

A

Advanced persistent threat (APT)
Plus icon.

A state-sponsored or well-funded threat actor that infiltrates networks and remains undetected for extended periods. APTs use sophisticated techniques to pursue specific political or economic objectives.

Adversary
Plus icon.

An individual or group that carries out or plans malicious activities against information systems. Adversaries range from opportunistic hackers to organized cybercrime groups and nation-state actors.

Air gap
Plus icon.

Physical isolation of a computer or network from all other systems and the internet. Air gaps protect critical infrastructure by eliminating remote access, though they remain vulnerable to insider threats.

Alert
Plus icon.

A notification generated by security tools indicating potential threats, policy violations, or suspicious activity. Effective alerts prioritize context and severity to reduce noise and improve response times.

Alert fatigue
Plus icon.

The desensitization that occurs when security teams face excessive false positives or low-priority notifications. Alert fatigue leads to delayed responses and missed threats as analysts become overwhelmed.

Antivirus (AV) software
Plus icon.

Software that detects and removes known malware by comparing files against signature databases. Traditional AV protects against common threats but struggles with zero-day attacks and advanced evasion techniques.

Artificial intelligence (AI)
Plus icon.

Computer systems designed to perform tasks requiring human-like decision-making and pattern recognition. In security, AI analyzes vast datasets to detect anomalies, though it requires human oversight for accuracy.

Attack surface
Plus icon.

All points where unauthorized users could potentially access a system. This includes exposed ports, applications, endpoints, and user credentials. Reducing attack surface limits opportunities for compromise.

Attacker
Plus icon.

An individual or group attempting to exploit vulnerabilities for malicious purposes. Attackers vary in motivation and sophistication, from script kiddies testing tools to organized ransomware operations.

Authentication
Plus icon.

The process of verifying a user's or device's claimed identity before granting system access. Authentication methods include passwords, biometrics, tokens, and certificates, often combined for stronger security.

Get in Touch

Fill-up the contact form and we will connect with you shortly.

By submitting this form, you are agreeing to receive additional communications from MCK Network Solutions. You can opt out at any time. Please review our Privacy Policy for additional information about how MCK Network Solutions protects your privacy.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Plus icon.