Acronyms (Page 17) Flashcards
SOW
Statement of Work
A document routinely employed in the field of project management. It defines project-specific activities, deliverables, and timelines for a vendor providing services to the client.
SPF
Sender Policy Framework
An email authentication method designed to detect forging sender addresses during the delivery of the email.
SPIM
Spam over Internet Messaging
Unsolicited messages sent via an instant messaing (IM) system.
SQL
Structured Query Language
A domain-specific language used in programming and designed for managing data held in a relational database management system.
SQLi
SQL Injection
A code injection technique used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution.
SRTP
Secure Real-Time Protocol
A profile of the Real-Time Transport Protocol (RTP) intended to provide encryption, message authentication, and integrity, and replay protection to the RTP data in both unicast and multicast applications.
SSD
Solid State Drive
A storage device containing nonvolatile flash memory, used in place of a hard disk because of its much greater speed.
SSH
Secure Shell
A cryptographic network protocol for establishing an encrypted link between a web server and a browser.
SSL
Secure Sockets Layer
The standard security technology for establishing an encrypted link between a web server and a browser.
SSO
Single Sign-on
A property of access control of multiple related, yet independent, software systems. With this property, a user logs in with a single ID and password to gain access to any of several related systems.
STIX
Structured Threat Information eXchange
A language and serialization format used to exchange cyber threat intelligence.
SWG
Secure Web Gateway
Solutions that filter unwanted software/malware from user-initiated web/internet traffic and enforce corporate and regulatory policy compliance.
TACACS+
Terminal Access Controller Access Control Systems
A security application that provides centralized validation of users attempting to gain access to a router or network access server.
TAXII
Trusted Automated eXchange of Indicator Information
An application layer protocol for the communication of cyber threat information in a simple and scalable manner.
TCP/IP
Transmission Control Protocol/Internet Protocol
A set of communication protocols used to interconnect network devices on the internet.