Security-Operations

Security Information and Event Management
Security information and event management centralizes and analyzes security-relevant logs and events so defenders can detect, investigate, and monitor activity more effectively.
Security Orchestration, Automation, and Response
Security orchestration, automation, and response coordinates security workflows and automates selected tasks so alerts and incidents can be handled more consistently.
Security Operations Center
A security operations center is the team and operating function responsible for monitoring, triaging, investigating, and coordinating responses to security activity.
Log Correlation
Log correlation is the practice of linking related events from different systems so defenders can identify patterns that single logs do not show clearly.
Threat Hunting
Threat hunting is the proactive search for signs of malicious or risky activity that may not have triggered an obvious alert yet.
Detection Rule
A detection rule is reusable security-monitoring logic that identifies suspicious activity from telemetry and decides when a defender-visible signal or alert should be created.
Incident Triage
Incident triage is the initial process of reviewing, prioritizing, and routing suspicious events or alerts so the right response happens next.
Forensic Artifact
A forensic artifact is a piece of data or evidence that can help investigators understand what happened on a system or in an incident.
Alert Fatigue
Alert fatigue is the reduced effectiveness that happens when defenders face too many noisy, repetitive, or low-value alerts.
False Positive
A false positive is an alert or detection result that appears suspicious but does not represent the harmful activity the rule was intended to catch.
False Negative
A false negative is a harmful event or behavior that should have been detected but was missed by the security control or rule.
Vulnerability Management
Vulnerability management is the operational process of finding, validating, prioritizing, remediating, and tracking security weaknesses over time.
Vulnerability Scanner
A vulnerability scanner is a security tool or service that checks systems, applications, cloud assets, or dependencies for known weaknesses and risky misconfigurations at scale.
Threat Intelligence
Threat intelligence is analyzed security information about relevant threats, behaviors, infrastructure, and trends that helps defenders prioritize, detect, and respond more effectively.
Common Vulnerabilities and Exposures
Common Vulnerabilities and Exposures is the public identifier system used to label and track specific disclosed security vulnerabilities.
Common Vulnerability Scoring System
Common Vulnerability Scoring System is a standardized method for describing the technical severity of a vulnerability.
Detection Engineering
Detection engineering is the practice of designing, testing, tuning, and maintaining security detections so suspicious activity is identified reliably.
Managed Detection and Response
Managed detection and response is a security service model where an external provider helps monitor, detect, investigate, and support response to threats.
Attack Surface Management
Attack surface management is the continuous process of finding, monitoring, and reducing the systems and exposures that attackers could target.
External Attack Surface Management
External attack surface management focuses on discovering and monitoring the internet-facing systems, services, and exposures an organization presents to the outside world.
Dwell Time
Dwell time is the amount of time an attacker or unauthorized activity remains in the environment before being detected or removed.
User and Entity Behavior Analytics
User and entity behavior analytics is the use of behavioral patterns to identify activity that differs from expected norms for users, devices, or services.
Anomaly Detection
Anomaly detection is the identification of behavior or events that differ meaningfully from an expected baseline.
Red Team
A red team is the group or function that simulates adversary behavior to test how well an organization’s defenses, detection, and response hold up under realistic pressure.
Blue Team
A blue team is the group or function responsible for defending systems, detecting suspicious activity, investigating alerts, and improving protective controls.
Purple Team
A purple team is the collaborative practice of bringing offensive simulation and defensive operations together to improve detection, response, and resilience more quickly.
Deception Technology
Deception technology is the use of decoy systems, credentials, files, or services to detect suspicious behavior and mislead attackers inside an environment.
Attack Graph
An attack graph is a model that maps how different weaknesses, permissions, trust relationships, or exposures could connect to create possible paths to a target.
Kill Chain
A kill chain is a staged model used to describe how an attack or intrusion can progress from early activity to later impact.
Attack Campaign
An attack campaign is a coordinated set of related malicious actions carried out over time against one or more targets.
Honeypot
A honeypot is a deliberately monitored decoy system or service used to attract suspicious activity so defenders can study or detect it without exposing production assets in the same way.
Threat Emulation
Threat emulation is the controlled practice of simulating realistic adversary behavior patterns so defenders can evaluate detection, response, and resilience without treating the activity as a live malicious incident.
Security Chaos Engineering
Security chaos engineering is the practice of deliberately testing how security controls and response processes behave under disruptive but controlled conditions.
Threat Landscape
The threat landscape is the overall picture of relevant threat actors, behaviors, trends, exposures, and defensive pressures affecting an organization or sector.
Defense Evasion
Defense evasion is the category of attacker behavior aimed at avoiding, weakening, or bypassing security visibility and control enforcement.
Exposure Management
Exposure management is the ongoing practice of identifying, prioritizing, and reducing security exposures based on how they create real organizational risk.