A robot reads a scroll

Cybersecurity
Terms & Definitions

Understanding security terminology helps you make informed decisions about protecting your organization. This glossary defines essential security terms for managed services and enterprise protection.

S

Secret key
Plus icon.

A cryptographic key used for both encryption and decryption in symmetric encryption systems. Secret keys must remain confidential to both parties, as compromise exposes all protected communications and data.

Securely Provision
Plus icon.

A cybersecurity framework category focused on designing, developing, and building secure information systems. Secure provisioning integrates security controls throughout development lifecycles rather than adding them after deployment.

Security as code (SaC)
Plus icon.

Managing security controls as code within DevOps processes and CI/CD pipelines. Security as code enforces policies programmatically in cloud-native environments, ensuring consistent security configurations across automated deployments.

Security automation
Plus icon.

Using technology to execute security processes without manual intervention, including incident response, policy enforcement, and threat detection. Automation reduces response times, eliminates human error, and enables security teams to focus on complex threats.

Security policy
Plus icon.

Formal rules governing acceptable use of information assets and defining required security controls. Security policies establish organizational security posture, compliance requirements, and consequences for violations while guiding technology implementations.

Security Program Management
Plus icon.

Strategic oversight of an organization's information security program, including policy development, resource allocation, risk management, and incident planning. Security program management aligns technical controls with business objectives and regulatory requirements.

SIEM
Plus icon.

Security Information and Event Management systems aggregating logs from multiple sources for correlation, analysis, and alerting. SIEM platforms provide centralized visibility but require significant tuning and analyst expertise to be effective.

Signature
Plus icon.

Distinctive patterns identifying specific threats, files, or behaviors used by security tools for detection. Signature-based detection effectively identifies known threats but fails against zero-day attacks and polymorphic malware.

SOAR
Plus icon.

Security Orchestration, Automation, and Response platforms integrating security tools and automating incident response workflows. SOAR systems coordinate actions across multiple tools, reducing manual tasks and accelerating threat containment.

SOC
Plus icon.

Security Operations Centers serving as centralized hubs for monitoring, detecting, analyzing, and responding to security incidents. SOCs combine people, processes, and technology to maintain continuous threat vigilance.

Social engineering
Plus icon.

Psychological manipulation tactics deceiving individuals into divulging confidential information or performing actions compromising security. Social engineering exploits human trust rather than technical vulnerabilities, making awareness training critical for defense.

Software assurance
Plus icon.

Confidence that software operates as intended without vulnerabilities introduced during development or deployment. Software assurance encompasses secure coding practices, testing, verification, and supply chain security throughout software lifecycles.

Software Assurance and Security Engineering
Plus icon.

Development practices integrating security controls, testing, and validation throughout software creation. Security engineering applies threat modeling, code review, and vulnerability testing to prevent flaws before production deployment.

Spam
Plus icon.

Unsolicited bulk messages sent indiscriminately through email, messaging, or other electronic communications. Spam consumes bandwidth, enables phishing attacks, and delivers malware while overwhelming legitimate communications.

Spillage
Plus icon.

Unauthorized disclosure or transfer of classified or sensitive information to uncleared systems or personnel. Spillage incidents require immediate containment, investigation, and remediation to prevent further exposure.

Spoofing
Plus icon.

Falsifying source identities in communications to impersonate trusted entities and bypass security controls. Spoofing attacks include email address forgery, IP address manipulation, and caller ID falsification for social engineering.

Spyware
Plus icon.

Malicious software secretly installed on systems to monitor user activity, collect sensitive information, or track behaviors without consent. Spyware compromises privacy and can enable identity theft or corporate espionage.

Stack
Plus icon.

The combination of technologies, tools, and platforms an organization uses to deliver services or protect systems. Security stacks often include multiple point solutions requiring integration for comprehensive protection.

Supervisory Control and Data Acquisition (SCADA)
Plus icon.

Industrial control systems managing geographically dispersed infrastructure like power grids, water treatment, and manufacturing processes. SCADA security requires protecting operational technology from cyber threats while maintaining safety and reliability.

Supply chain
Plus icon.

The network of organizations, processes, and resources involved in creating and delivering products or services from suppliers to customers. Supply chain security addresses risks from compromised vendors, components, or software dependencies.

Supply Chain Risk Management
Plus icon.

Identifying, assessing, and mitigating risks introduced through vendor relationships, third-party software, and hardware components. Supply chain risk management addresses threats from compromised suppliers, counterfeit components, and malicious insertions.

Symmetric cryptography
Plus icon.

Encryption methods using identical keys for both encryption and decryption operations. Symmetric algorithms like AES provide fast encryption but require secure key distribution mechanisms since key compromise exposes all protected data.

Symmetric key
Plus icon.

A cryptographic key performing both encryption and decryption in symmetric encryption systems. Symmetric keys require secure exchange between parties and must be rotated regularly to maintain security.

System Administration
Plus icon.

Managing and maintaining servers, networks, and IT infrastructure to ensure availability, performance, and security. System administrators configure access controls, apply patches, monitor systems, and respond to technical issues.

System integrity
Plus icon.

Assurance that systems function as intended without unauthorized manipulation or corruption. System integrity controls detect tampering, verify configurations, and ensure systems remain trustworthy throughout their operational lifecycle.

Systems Development
Plus icon.

The process of designing, creating, testing, and deploying information systems throughout their lifecycle. Secure systems development integrates security requirements from initial design through implementation and maintenance.

Systems Requirements Planning
Plus icon.

Translating business needs into technical specifications and system designs. Requirements planning ensures security controls address organizational risks while supporting operational objectives and compliance mandates.

Systems Security Analysis
Plus icon.

Evaluating system security through testing, integration assessment, and ongoing monitoring. Security analysis identifies vulnerabilities, validates controls, and ensures systems maintain appropriate protection throughout their lifecycle.

Systems Security Architecture
Plus icon.

Designing secure system structures that address security requirements while supporting business functionality. Security architecture defines how components interact, where controls apply, and how threats are mitigated.

Get in Touch

Fill-up the contact form and we will connect with you shortly.

By submitting this form, you are agreeing to receive additional communications from MCK Network Solutions. You can opt out at any time. Please review our Privacy Policy for additional information about how MCK Network Solutions protects your privacy.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Plus icon.