Archives: Glossary Terms

MITRE ATT&CK

MITRE ATT&CK® is a knowledge base of adversary tactics and techniques. Established and maintained by the MITRE Corporation, a US not-for-profit best known for managing research and development programs, ATT&CK...

Read More

Monte Carlo simulation

A probability simulation technique used to understand the impact of risk and uncertainty in complex problems. The technique builds models of possible results by running a large number of trials...

Read More

MSSP

Managed Security Service Provider. A provider of outsourced SOC services.

Read More

Multi-factor authentication

A form of authentication in which a user is granted access only after providing two or more distinct credentials. The first form of authentication is often a password, the other...

Read More

Network slicing

Network slicing is a method of dividing a physical network into multiple virtual networks, each designed to meet specific performance and service requirements. This is especially important in 5G networks,...

Read More

Network telescope 

A network telescope is a tool used in network security to monitor and analyze traffic patterns, particularly from unused or underutilized IP address spaces. By observing traffic in these “dark”...

Read More

Network Time Protocol attack

A kind of distributed denial-of-service attack in which query packets to an NTP server are generated at a high rate.

Read More

Next-Gen Firewall

“A firewall that goes beyond port/protocol inspection and blocking to add application-level inspection and intrusion prevention. Industry convergence has resulted in a next generation firewall being functionally equivalent to an...

Read More

Next-generation firewall

A next-generation firewall (NGFW) is a hardware- or software-based network security system that detects and blocks sophisticated attacks by enforcing security policies at the application level in addition to the...

Read More

NMAP 

N-MAP A network mapping tool that pings IP addresses looking for a response and can discover host names, open communications ports, operating system names and versions.

Read More