A robot reads a scroll

Cybersecurity
Terms & Definitions

Understanding security terminology helps you make informed decisions about protecting your organization. This glossary defines essential security terms for managed services and enterprise protection.

L

Lattice Techniques
Plus icon.

Security models using hierarchical classifications to control information access based on clearance levels and data sensitivity labels. Lattice techniques enforce mandatory access controls where users only access information matching their authorization level.

Layer 2 Forwarding Protocol (L2F)
Plus icon.

A tunneling protocol developed by Cisco that extends dial-up connections across networks by encapsulating PPP traffic over IP. L2F creates virtual private network connections transparent to end users.

Layer 2 Tunneling Protocol (L2TP)
Plus icon.

An extension of PPTP enabling internet service providers to operate virtual private networks over public infrastructure. L2TP combines the best features of L2F and PPTP for secure remote access.

Least privilege
Plus icon.

The security principle of granting users and processes only the minimum permissions required to perform their specific functions. Least privilege limits damage from compromised accounts by restricting unnecessary access to systems and data.

Legion
Plus icon.

Scanning software designed to identify unprotected network shares and accessible resources. Legion helps both attackers discover vulnerable targets and administrators locate unsecured assets requiring protection.

Lightweight Directory Access Protocol (LDAP)
Plus icon.

A protocol for accessing and managing directory services over TCP/IP networks. LDAP provides centralized authentication, user information storage, and authorization services for applications and systems.

Link State
Plus icon.

A routing protocol where routers maintain complete network topology information and calculate optimal paths. Link state protocols converge faster than distance-vector alternatives but require more processing power and memory.

List Based Access Control
Plus icon.

An access control method associating specific users with permissions for each protected object. List-based controls define who can access resources through explicitly maintained permission lists.

Local area network (LAN)
Plus icon.

A network connecting devices within a limited physical area like an office building or campus. LANs enable resource sharing and high-speed communication between connected systems.

Loadable Kernel Modules (LKM)
Plus icon.

Software components that extend operating system kernel functionality without requiring reboots or recompilation. LKMs provide flexibility but create security risks when attackers install malicious rootkits as kernel modules.

Log Clipping
Plus icon.

The selective deletion of log entries to conceal unauthorized activity or system compromises. Attackers use log clipping to hide evidence of intrusions, making forensic investigation more difficult.

Log management
Plus icon.

The collection, storage, analysis, and retention of system logs from applications, devices, and infrastructure. Log management supports security monitoring, incident response, compliance auditing, and troubleshooting.

Logic bombs
Plus icon.

Malicious code that remains dormant until triggered by specific conditions like dates, events, or system states. Logic bombs execute destructive actions when activated, often used by disgruntled insiders for sabotage.

Logic Gate
Plus icon.

Fundamental digital circuit components performing Boolean operations with binary inputs to produce outputs. Logic gates form the building blocks of processors and digital systems.

Loopback Address
Plus icon.

The IP address 127.0.0.1 that always references the local host machine without transmitting traffic across networks. Loopback addresses enable testing and internal communication within a single system.

Get in Touch

Fill-up the contact form and we will connect with you shortly.

By submitting this form, you are agreeing to receive additional communications from MCK Network Solutions. You can opt out at any time. Please review our Privacy Policy for additional information about how MCK Network Solutions protects your privacy.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Plus icon.