Security terms explained
The world of cybersecurity contains many specific terms. In this list, you'll find explanations of the most important concepts.
Advisory
Cybersecurity advisory:
Strategic advice on security risks, policies, and investments, aimed at improving an organization’s overall cyber resilience.Cybersecurity consultancy:
Strategic and operational support in implementing security measures, tools, and processes within an organization.Cybersecurity experts:
Specialists with in-depth knowledge of cyber threats, security technologies, and risk management.Security baseline assessment / zero measurement:
Initial evaluation of an organization’s current security status and risks.Cybersecurity roadmap:
Strategic plan with steps and priorities to structurally improve information security.Cloud security:
Security measures and processes for data and applications hosted in cloud environments.Supply chain risks:
Risks arising from vulnerabilities in suppliers, partners, or external systems.
Compliance
NIS2:
European directive that requires critical sectors to implement stricter security measures for network and information systems.DORA:
Legislation that obliges financial institutions to ensure digital resilience and incident response.ISO 27001:
International standard for establishing, implementing, and maintaining an information security management system.NEN 7510:
Dutch standard for information security in the healthcare sector, based on ISO 27001.
SOC
SOC (Security Operations Center):
A team or facility that detects, analyzes, and responds to cyber threats 24/7.MDR (Managed Detection and Response):
Outsourced service for detecting and responding immediately to security incidents.AI (Artificial Intelligence):
Technology that recognizes patterns, makes predictions, and automates security processes.Datalake:
Large central repository for storing unstructured and structured (security) data.Machine Learning:
AI technique where systems learn from data to automatically recognize threats.Threat Intelligence:
Information on cyber threats, hackers, and attack methods used for prevention.Threat Hunting:
Proactively searching for hidden threats in IT environments before damage occurs.Cybersecurity Monitoring:
Continuous monitoring of systems and networks to detect suspicious activity.Security Incident:
An event that threatens the availability, integrity, or confidentiality of information.SOAR (Security Orchestration, Automation and Response):
Platform for automating and coordinating responses to security incidents.24/7:
Around-the-clock monitoring, detection, and response to cyber threats.Open XDR (Extended Detection and Response):
Integrated detection and response solution that combines data from multiple sources.MITRE ATT&CK:
Framework that categorizes and clarifies cybercriminal attack techniques.TIP (Threat Intelligence Platform):
Platform for collecting, analyzing, and sharing threat intelligence.Cyber Kill Chain:
Model that describes the steps attackers follow during a cyberattack.XDR Kill Chain (Extended Detection and Response):
Expanded kill chain focused on detection and response through XDR platforms.Advanced Threat Detection:
Detection of complex threats using AI, behavior analysis, or correlation.SIEM (Security Information and Event Management):
System that collects, analyzes, and generates real-time security alerts.SecOps:
Collaboration between IT and security to continuously protect systems from threats.UBA (User Behavior Analytics):
Analysis of user behavior to detect anomalies and security risks.UEBA (User and Entity Behavior Analytics):
Analysis of behavior of users and entities to identify threats early.DBA (Device Behavior Analytics):
Analysis of device behavior to detect anomalies and risks.EBA (Entity Behavior Analytics):
Behavior analysis of non-users such as systems, applications, or processes.NBA (Network Behavior Analytics):
Analysis of network behavior to detect unusual patterns and potential attacks.NDR (Network Detection and Response):
Detection and response to threats at the network level using advanced analytics.