Security-Operations
Data Breach — Unauthorized Access, Exposure, or Exfiltration of Protected Information
A Data Breach is an incident involving unauthorized access, disclosure, or exfiltration of sensitive information. This SECMONS glossary entry explains what qualifies as a breach, how breaches occur, legal and operational implications, and how organizations reduce breach impact.
Incident Response — Structured Process for Detecting, Containing, and Recovering from Cyber Incidents
Incident Response is the structured process organizations follow to detect, contain, eradicate, and recover from cybersecurity incidents. This SECMONS glossary entry explains incident response phases, operational workflows, and how effective response reduces dwell time and business impact.
Patch Management — Deploying Security Updates to Reduce Exploitable Risk
Patch Management is the operational process of acquiring, testing, deploying, and verifying software updates to remediate security vulnerabilities. This SECMONS glossary entry explains how patch management works, how it differs from vulnerability management, and why delayed patching leads to real-world exploitation.
Vulnerability Management — Identifying, Prioritizing, and Remediating Security Weaknesses
Vulnerability Management is the continuous process of discovering, assessing, prioritizing, and remediating security weaknesses across systems and applications. This SECMONS glossary entry explains how vulnerability management works, how it differs from patch management, and how organizations reduce real-world risk.