A robot reads a scroll

Cybersecurity
Terms & Definitions

Understanding security terminology helps you make informed decisions about protecting your organization. This glossary defines essential security terms for managed services and enterprise protection.

N

NCSC
Plus icon.

The UK's National Cyber Security Centre providing technical guidance, threat intelligence, and incident response support to businesses and public sector organizations. NCSC helps organizations defend against cyber attacks and recover when breaches occur.

Netmask
Plus icon.

A 32-bit value defining which portion of an IP address represents the network and which represents individual hosts. Netmasks configure subnet boundaries, routing, and access controls within network segments.

Network
Plus icon.

Connected computing devices that communicate and share resources through wired or wireless infrastructure. Networks range from small local area networks to global internet connections enabling data transmission between systems.

Network Address Translation (NAT)
Plus icon.

A technique translating private IP addresses to public addresses for internet communication, hiding internal network structure. NAT conserves public IP addresses and provides basic security through address obfuscation.

Network detection and response (NDR)
Plus icon.

Security platforms monitoring network traffic to detect and respond to threats that evade endpoint controls. NDR analyzes communication patterns, protocols, and payloads to identify lateral movement and data exfiltration.

Network Mapping
Plus icon.

The process of discovering and documenting all devices, connections, and services operating on a network. Network mapping creates inventory of assets, identifies unauthorized devices, and reveals potential security weaknesses.

Network resilience
Plus icon.

The capability to maintain operations during disruptions, recover quickly from failures, and scale to meet unexpected demands. Resilient networks continue functioning in degraded modes while restoring full capabilities.

Network Security Policy Management (NSPM)
Plus icon.

Processes and tools controlling network security configurations across firewalls, routers, and security devices. NSPM ensures consistent policy enforcement, automates rule changes, and maintains compliance across complex network environments.

Network segmentation
Plus icon.

Dividing networks into isolated subnetworks to limit lateral movement and contain breaches. Segmentation improves performance, simplifies compliance, and prevents attackers from accessing the entire network after initial compromise.

Network Services
Plus icon.

Infrastructure components enabling communication and resource sharing including routers, switches, firewalls, DNS, and DHCP. Network services require hardening and monitoring since they provide foundational connectivity attackers target.

Network Taps
Plus icon.

Hardware devices connecting directly to network cables to capture and duplicate all passing traffic for monitoring. Network taps enable passive security monitoring without impacting network performance or reliability.

Network-Based IDS
Plus icon.

Intrusion detection systems monitoring network traffic for malicious activity by analyzing packets against known attack signatures and behavioral patterns. Network-based IDS provides visibility across multiple systems but cannot detect host-level compromises.

NICE Framework
Plus icon.

The National Initiative for Cybersecurity Education Framework defining cybersecurity work roles, skills, and competencies. NICE standardizes job requirements, helping organizations recruit qualified security professionals and develop training programs.

NIST
Plus icon.

The National Institute of Standards and Technology providing cybersecurity frameworks, standards, and guidelines for federal agencies and private organizations. NIST's Cybersecurity Framework helps organizations manage and reduce cyber risks.

Non-Printable Character
Plus icon.

ASCII characters without visual representations, including control codes for line feeds, carriage returns, and system bells. Non-printable characters can hide malicious commands or data within seemingly innocent files.

Non-Repudiation
Plus icon.

Cryptographic proof preventing individuals from denying actions they performed, such as sending messages or approving transactions. Non-repudiation provides accountability through digital signatures and audit trails that verify authenticity.

Null Session
Plus icon.

Anonymous network connections to Windows systems that retrieve information like user accounts and shared resources without authentication. Null sessions enable reconnaissance and should be disabled to prevent information disclosure.

Get in Touch

Fill-up the contact form and we will connect with you shortly.

By submitting this form, you are agreeing to receive additional communications from MCK Network Solutions. You can opt out at any time. Please review our Privacy Policy for additional information about how MCK Network Solutions protects your privacy.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Plus icon.