A robot reads a scroll

Cybersecurity
Terms & Definitions

Understanding security terminology helps you make informed decisions about protecting your organization. This glossary defines essential security terms for managed services and enterprise protection.

Q

QAZ
Plus icon.

A network worm that spreads through infected systems and exploits weak passwords to propagate. QAZ demonstrates how malware leverages credential vulnerabilities to move laterally across networks.

Quality Management System (QMS)
Plus icon.

Formalized documentation of processes and procedures ensuring managed service providers consistently meet client requirements and regulatory standards. QMS frameworks support continuous improvement and accountability in service delivery.

Quality of Service (QoS)
Plus icon.

Network management technologies prioritizing specific traffic types like VoIP or video conferencing to maintain performance during congestion. QoS policies allocate bandwidth based on business requirements, ensuring critical applications remain responsive.

Quantum computing
Plus icon.

Computing technology using quantum mechanics principles to perform calculations exponentially faster than traditional computers. Quantum computing threatens current encryption standards while potentially enabling new cryptographic methods resistant to conventional attacks.

Quantum Cryptography
Plus icon.

Encryption techniques leveraging quantum mechanics principles like quantum key distribution to create theoretically unbreakable secure communication channels. Quantum cryptography detects eavesdropping attempts through quantum state changes, ensuring message confidentiality.

Quarantine
Plus icon.

Isolating infected files, compromised systems, or suspicious activities from production networks to prevent malware spread. Quarantine contains threats while allowing security teams to investigate and remediate without risking additional systems.

Quarterly Business Review (QBR)
Plus icon.

Strategic meetings between managed service providers and clients held every three months to review performance metrics, security posture, and plan future investments. QBRs ensure alignment between technology services and business objectives.

Query
Plus icon.

A structured request for specific information from databases, search engines, or security information systems. Security analysts use queries to retrieve logs, filter events, and correlate data during threat hunting investigations.

Queue Management
Plus icon.

Systematic organization of incoming support tickets, network packets, or data processing requests to ensure efficient handling based on priority and arrival time. Effective queue management prevents backlog and maintains service levels.

Quick Response (QR) Code Security
Plus icon.

Practices for verifying QR codes before scanning to prevent "quishing" attacks redirecting users to malicious websites. QR code security requires user awareness since codes hide destination URLs.

Quid pro quo attack
Plus icon.

Social engineering tactic where attackers promise benefits or services in exchange for sensitive information or access credentials. Quid pro quo exploits reciprocity by offering fake technical support or rewards to manipulate victims.

Get in Touch

Fill-up the contact form and we will connect with you shortly.

By submitting this form, you are agreeing to receive additional communications from MCK Network Solutions. You can opt out at any time. Please review our Privacy Policy for additional information about how MCK Network Solutions protects your privacy.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Plus icon.