Acronyms (Page 16) - Reverse Flashcards
A secure version of the File Transfer Protocol (FTP) that uses Secure Shell (SSH) to encrypt the data transferred over the network.
SFTP
Secured File Transfer Protocol
A family of cryptographic hash functions published by the National Institute of Standards and Technology as a U.S. Federal Information Processing Standard.
SHA
Secure Hashing Algorithm
An obsolete alternative to HTTPS for encrypting web communications carried over HTTP.
SHTTP
Secure Hyptertext Transfer Protocol
Software solutions that provide real-time analysis of security alerts generated by applications and network hardware.
SIEM
Security Information and Event Management
A removable smart card for mobile phones that securely stores the service-subscriber key used to identify a subscriber on mobile telephony devices.
SIM
Subscriber Identity Module
A commitment between a service provider and a client. Particular aspects of the service - quality, availability, responsibilities - are agreed upon between the service provider and the service user.
SLA
Service-level Agreement
A term used in risk management referring to the monetary value expected from the occurence of a risk on an asset.
SLE
Single Loss Expectancy
A text messaging service component of most telephone, internet, and mobile device systems.
SMS
Short Message Service
An internet standard for email transmission across Internet Protocol (IP) networks.
SMTP
Simple Mail Transfer Protocol
A method for securing SMTP with transport layer security. It is intended to provide authentication of the communicated partners, as well as data integrity and confidentiality.
SMTPS
Simple Mail Transfer Protocol Secure
An Internet Standard protocol for collecting and organizing information about managed devices on IP networks and for modifying that information to change device behavior.
SNMP
Simple Network Management Protocol
A messaging protocol specification for exchanging structured information in the implementation of web services in computer networks.
SOAP
Simple Object Access Protocol
Technologies that enable organizations to colect inputs monitored by the security operations center (SOC).
SOAR
Security Orchestration, Automation, and Response
An integrated circuit that integrates all components of a computer or other electronic systems into a single chip.
SoC
System on Chip
A centralized unit that deals with security issues on an organizational and technical level.
SOC
Security Operations Center