| Term / Acronym | Plain-English Meaning | Why It Matters to a Manager |
| Attack Surface | All the ways a system can be accessed or attacked | Larger attack surfaces increase risk and cost |
| Authentication | Proving someone is who they claim to be | Weak authentication leads to unauthorized access |
| Authorization | What an authenticated user is allowed to do | Prevents employees from accessing data they shouldn’t |
| Breach | Unauthorized access to data or systems | Often triggers legal, regulatory, and reputational damage |
| Business Continuity Plan (BCP) | Plan to keep operations running during disruption | Downtime directly impacts revenue and customers |
| Data Exfiltration | Unauthorized transfer of data out of a system | Can result in intellectual property or customer data loss |
| Defense in Depth | Multiple layers of security controls | No single failure should expose the organization |
| Encryption | Converting data into unreadable form without a key | Protects sensitive data if systems are compromised |
| Endpoint | Any device connected to the network (laptops, phones, servers) | Endpoints are common entry points for attackers |
| Firewall | A barrier that filters network traffic | First line of defense against external attacks |
| Identity and Access Management (IAM) | Systems that manage user identities and permissions | Limits risk from insider threats and compromised accounts |
| Incident Response Plan (IRP) | Defined steps to follow during a cyber incident | Reduces chaos, cost, and response time during crises |
| Least Privilege | Users get only the access they need | Minimizes damage if an account is compromised |
| Malware | Malicious software (viruses, ransomware, spyware) | Can disrupt operations and steal data |
| Multi-Factor Authentication (MFA) | Login requires more than one verification method | Dramatically reduces account takeover risk |
| Network Segmentation | Separating systems into isolated zones | Limits spread of attacks inside the organization |
| Patch Management | Keeping systems updated with security fixes | Unpatched systems are a top cause of breaches |
| Penetration Testing (Pen Test) | Simulated attack to find weaknesses | Identifies risks before criminals do |
| Phishing | Deceptive emails or messages to steal credentials | Leading cause of successful cyber attacks |
| Ransomware | Malware that encrypts data and demands payment | Can halt business operations entirely |
| Risk Assessment | Evaluation of threats, vulnerabilities, and impact | Informs budgeting and security priorities |
| Security Awareness Training | Educating employees on cyber risks | Humans are often the weakest link |
| SOC (Security Operations Center) | Team monitoring and responding to threats | Provides early detection and response |
| Threat Actor | Person or group attempting an attack | Helps contextualize motive and sophistication |
| Vulnerability | A weakness that can be exploited | Needs prioritization based on business impact |
| Vulnerability Scanning | Automated search for known weaknesses | Ongoing hygiene to prevent easy attacks |
| Zero Trust | “Never trust, always verify” security model | Reduces implicit trust inside the network |
| Data Loss Prevention (DLP) | Tools to prevent sensitive data leakage | Protects intellectual property and compliance |
| Third-Party Risk | Risk introduced by vendors and partners | Breaches often originate outside the company |
| Mean Time to Detect (MTTD) | How long it takes to notice an incident | Faster detection reduces damage |
| Mean Time to Respond (MTTR) | How quickly an incident is contained | Directly impacts cost and recovery |