Acronyms (Page 16) Flashcards
SFTP
Secured File Transfer Protocol
A secure version of the File Transfer Protocol (FTP) that uses Secure Shell (SSH) to encrypt the data transferred over the network.
SHA
Secure Hashing Algorithm
A family of cryptographic hash functions published by the National Institute of Standards and Technology as a U.S. Federal Information Processing Standard.
SHTTP
Secure Hyptertext Transfer Protocol
An obsolete alternative to HTTPS for encrypting web communications carried over HTTP.
SIEM
Security Information and Event Management
Software solutions that provide real-time analysis of security alerts generated by applications and network hardware.
SIM
Subscriber Identity Module
A removable smart card for mobile phones that securely stores the service-subscriber key used to identify a subscriber on mobile telephony devices.
SLA
Service-level Agreement
A commitment between a service provider and a client. Particular aspects of the service - quality, availability, responsibilities - are agreed upon between the service provider and the service user.
SLE
Single Loss Expectancy
A term used in risk management referring to the monetary value expected from the occurence of a risk on an asset.
SMS
Short Message Service
A text messaging service component of most telephone, internet, and mobile device systems.
SMTP
Simple Mail Transfer Protocol
An internet standard for email transmission across Internet Protocol (IP) networks.
SMTPS
Simple Mail Transfer Protocol Secure
A method for securing SMTP with transport layer security. It is intended to provide authentication of the communicated partners, as well as data integrity and confidentiality.
SNMP
Simple Network Management Protocol
An Internet Standard protocol for collecting and organizing information about managed devices on IP networks and for modifying that information to change device behavior.
SOAP
Simple Object Access Protocol
A messaging protocol specification for exchanging structured information in the implementation of web services in computer networks.
SOAR
Security Orchestration, Automation, and Response
Technologies that enable organizations to colect inputs monitored by the security operations center (SOC).
SoC
System on Chip
An integrated circuit that integrates all components of a computer or other electronic systems into a single chip.
SOC
Security Operations Center
A centralized unit that deals with security issues on an organizational and technical level.