Cyber Security Glossary | Redscan
Contact Us

Contact Us

Please get in touch using the form below

1000 characters left
View our privacy policy

Overview

Getting to grips with cyber security

With so much technical jargon used across the cyber security and IT sectors it can be challenging to keep up. Take a look at our glossary for a quick overview of some of the key terms used in our industries.

Key terms

SIEM

SIEM is a threat detection technology that enables organisations to discover targeted attacks and data breaches before they can cause disruption.

Red Teaming

Red teaming is a type of intelligence-led security engagement aimed at comprehensively assessing organisations’ overall cyber resilience, as well as testing their threat detection and incident response capabilities.

Threat Hunting

Cyber threat hunting is the process of proactively searching across networks and endpoints to identify threats that evade existing security controls.

Threat Management

Threat management is a multi-layered approach to help prevent cyber threats which encompasses prevention, detection, response and recovery.

Security Monitoring

Security monitoring is the collection of data from a range of security systems and the correlation and analysis of this information with threat intelligence to identify signs of compromise.

Ethical Hacking

Ethical hacking is the identification and exploitation of cyber security vulnerabilities across IT environments for legitimate and non-malicious purposes.

Cyber Security

Cyber security is a term used to describe the protection of electronic and computer networks, programs and data against criminal or unauthorised access.

Data Security

Data security is the collection of measures taken to safeguard confidential data and prevent its accidental or intentional compromise, disclosure, corruption or destruction.

Information Security

Information security (InfoSec) is a widely used term to describe the practice of preventing unauthorised access, modification or destruction of digital or non-digital information and the strategies that seek to achieve this.

Network Security

Network security is a term used to describe practices and policies designed to defend IT networks and data against unauthorised access, misuse, modification and exploitation.

Information Assurance

Information assurance (IA) concerns the protection of the integrity, availability, authenticity, confidentiality and non-repudiation of information and information systems.

Cyber Security Operations Centre

A Cyber Security Operations Centre is a facility that houses a dedicated team responsible for maintaining and improving an organisation’s cyber security.

Outsourced SOC

An outsourced SOC is a service designed to help organisations achieve a enterprise level security by outsourcing the full CSOC function at a fraction of the cost it would take to build the equivalent in-house.

Virtual SOC

A virtual SOC is a similar service that acts as an extension of an organisation's in-house IT team to provide 24/7 threat detection and response for a cost-effective monthly fee.

SOAR

SOAR (Security Orchestration, Automation and Response) is a set of security technologies that facilitate data collection and aggregation, as well as the automation of low-level response actions.

XDR

XDR (Extended Detection and Response) is a security technology designed to help organisations improve network visibility by correlating data across multiple layers and empower more effective incident response.