Glossary of Terms
A weakness in an information system, security procedures, internal controls, or implementation that could be exploited by a threat source.
The continuous process of identifying, classifying, prioritizing, remediating, and mitigating vulnerabilities in systems and software.
A vulnerability that has been disclosed but is not yet patched, leaving systems susceptible to a zero-day exploit. Attackers have "zero days" to exploit it before a fix is released.
A standardized system for identifying and naming publicly disclosed cybersecurity vulnerabilities. Each vulnerability gets a unique CVE ID.
An open industry standard for assessing the severity of computer system security vulnerabilities. It provides a numerical score (0-10) to reflect severity.
The process of distributing and applying updates to software. It is a component of vulnerability management focused on remediation.
A simulated cyber attack against your computer system to check for exploitable vulnerabilities. It is a depth-over-breadth approach.
The process of continuously observing and analyzing activity on a network to detect and respond to potential threats or malicious behavior.
A computer-generated file that captures activity within an operating system or software application, including messages, errors, and file transfers.
A solution that gives security teams a central place to collect, aggregate, and analyze log data from across an enterprise to detect incidents.
A passive monitoring tool that analyzes network traffic for signs of potential threats and generates alerts when suspicious activity is detected.
An active security tool that monitors network traffic and takes immediate action to block or prevent potential threats in real time.
An integrated security solution that combines anti-malware, personal firewall, and other controls to provide preventative security on endpoint devices like laptops and servers.
A structured approach used by organizations to manage and mitigate security incidents. The lifecycle includes phases like Preparation, Identification, Containment, Eradication, Recovery, and Lessons Learned.