A robot reads a scroll

Cybersecurity
Terms & Definitions

Understanding security terminology helps you make informed decisions about protecting your organization. This glossary defines essential security terms for managed services and enterprise protection.

I

ICT supply chain threat
Plus icon.

Risks introduced through vulnerabilities in the information and communications technology supply chain, from hardware manufacturers to software vendors. Supply chain attacks compromise trusted products before deployment, affecting multiple organizations simultaneously.

Identity and access management (IAM)
Plus icon.

Systems and processes that control user identities, authentication methods, and authorization levels across an organization's IT resources. IAM ensures only verified users access appropriate systems while maintaining audit trails.

Identity Management
Plus icon.

The oversight of digital identities and their associated permissions within an IT environment. Identity management authenticates users, assigns access rights, and revokes privileges when roles change or employment ends.

Incident
Plus icon.

An event that violates or threatens to violate security policies, potentially compromising information confidentiality, integrity, or availability. Incidents range from malware infections to unauthorized access attempts requiring formal response procedures.

Incident management
Plus icon.

The coordinated activities for detecting, analyzing, containing, and recovering from security incidents. Effective incident management minimizes damage, reduces recovery time, and documents lessons learned for improving future responses.

Incident recovery
Plus icon.

The process of restoring normal operations and repairing systems following a security incident. Recovery includes removing attacker access, rebuilding compromised systems, validating data integrity, and implementing controls to prevent recurrence.

Incident response (IR)
Plus icon.

Immediate actions taken to detect, analyze, contain, and remediate security incidents. IR teams investigate alerts, isolate affected systems, collect forensic evidence, and coordinate communications during active incidents.

Incident response plan
Plus icon.

Documented procedures defining roles, communication channels, and actions required during security incidents. IR plans establish decision-making authority, escalation paths, and recovery priorities before incidents occur.

Indicator
Plus icon.

Observable evidence suggesting a security incident may have occurred or is in progress. Indicators include unusual network traffic patterns, unexpected system behavior, or alerts from security tools.

Industrial Control System (ICS)
Plus icon.

Specialized computing systems controlling manufacturing processes, critical infrastructure, and physical operations. ICS security requires protecting operational technology from cyber threats while maintaining safety and production requirements.

Information and communications technology (ICT)
Plus icon.

The hardware, software, networks, and services used to process, transmit, receive, and store data. ICT encompasses everything from endpoints and servers to telecommunications infrastructure and cloud platforms.

Information assurance
Plus icon.

The practice of protecting information and systems by ensuring availability, integrity, authentication, confidentiality, and non-repudiation. Information assurance combines technical controls, policies, and risk management to maintain trusted operations.

Information security policy
Plus icon.

Formal rules and procedures governing how an organization protects, manages, and distributes information assets. Security policies establish acceptable use standards, access controls, and consequences for violations.

Information sharing
Plus icon.

The exchange of threat intelligence, incident data, and security best practices between organizations or agencies. Information sharing improves collective defense by alerting others to emerging threats and attack techniques.

Information system resilience
Plus icon.

The capability to maintain essential operations under attack or adverse conditions and recover quickly afterward. Resilient systems continue functioning in degraded modes while restoring full capabilities.

Information technology (IT)
Plus icon.

The systems, infrastructure, and processes used to create, store, process, and transmit digital data. IT encompasses computers, networks, software, and support services enabling business operations.

Infrastructure as a Service (IaaS)
Plus icon.

Cloud computing model where providers rent virtualized computing resources including servers, storage, and networking on demand. IaaS eliminates physical infrastructure management while requiring customers to secure operating systems and applications.

Infrastructure as code (IaC)
Plus icon.

Managing IT infrastructure through machine-readable configuration files rather than manual processes. IaC enables version control, automated deployments, and consistent environments across development, testing, and production.

Insider threat
Plus icon.

Security risks posed by employees, contractors, or partners with authorized access who intentionally or accidentally compromise systems or data. Insider threats bypass perimeter defenses and require behavioral monitoring to detect.

Integrated risk management
Plus icon.

Enterprise-wide approach coordinating risk assessment, analysis, and mitigation strategies across departments and systems. Integrated risk management provides unified visibility into threats, enabling informed resource allocation and prioritized responses.

Integrity
Plus icon.

Assurance that data and systems remain unaltered except through authorized actions. Integrity controls detect tampering, corruption, or unauthorized modifications, maintaining trust in information accuracy.

Interoperability
Plus icon.

The ability of different systems, applications, or components to exchange and use information effectively. Interoperability enables integrated security tools to share threat data and coordinate automated responses.

Intrusion
Plus icon.

Unauthorized access to networks or systems that bypasses security controls. Intrusions may result from exploited vulnerabilities, stolen credentials, or social engineering, requiring incident response procedures.

Intrusion detection
Plus icon.

The monitoring and analysis of network traffic and system activity to identify security breaches or policy violations. Detection systems alert security teams to suspicious patterns requiring investigation.

Intrusion detection system (IDS)
Plus icon.

Software or hardware that monitors networks and systems for malicious activity, generating alerts when suspicious behavior matches known attack signatures or anomaly patterns. IDS provides visibility but requires human analysis.

Intrusion Prevention System (IPS)
Plus icon.

An active security control that detects and automatically blocks malicious traffic or activity in real-time. IPS extends IDS capabilities by taking defensive actions without human intervention.

ISO 27001
Plus icon.

International standard defining requirements for establishing, implementing, and maintaining information security management systems. ISO 27001 certification demonstrates an organization's commitment to systematic security controls and continuous improvement.

IT environment
Plus icon.

The complete technology landscape including hardware, software, networks, cloud services, and endpoints used to support business operations. Understanding your IT environment is fundamental to identifying security gaps.

IT infrastructure
Plus icon.

The foundational technology components supporting IT services, including servers, storage, networks, and data centers. Infrastructure security protects the underlying platforms that applications and services depend on.

ITIL (Information Technology Infrastructure Library)
Plus icon.

A framework of best practices for IT service management aligning technology services with business needs. ITIL processes include incident management, change control, and service desk operations.

IT Service Management (ITSM)
Plus icon.

The activities organizations perform to design, deliver, manage, and improve IT services. ITSM frameworks standardize incident handling, service requests, problem resolution, and change management.

Get in Touch

Fill-up the contact form and we will connect with you shortly.

By submitting this form, you are agreeing to receive additional communications from MCK Network Solutions. You can opt out at any time. Please review our Privacy Policy for additional information about how MCK Network Solutions protects your privacy.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Plus icon.