Acronyms (Page 17) - Reverse Flashcards
A document routinely employed in the field of project management. It defines project-specific activities, deliverables, and timelines for a vendor providing services to the client.
SOW
Statement of Work
An email authentication method designed to detect forging sender addresses during the delivery of the email.
SPF
Sender Policy Framework
Unsolicited messages sent via an instant messaing (IM) system.
SPIM
Spam over Internet Messaging
A domain-specific language used in programming and designed for managing data held in a relational database management system.
SQL
Structured Query Language
A code injection technique used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution.
SQLi
SQL Injection
A storage device containing nonvolatile flash memory, used in place of a hard disk because of its much greater speed.
SSD
Solid State Drive
A profile of the Real-Time Transport Protocol (RTP) intended to provide encryption, message authentication, and integrity, and replay protection to the RTP data in both unicast and multicast applications.
SRTP
Secure Real-Time Protocol
A cryptographic network protocol for establishing an encrypted link between a web server and a browser.
SSH
Secure Shell
The standard security technology for establishing an encrypted link between a web server and a browser.
SSL
Secure Sockets Layer
A property of access control of multiple related, yet independent, software systems. With this property, a user logs in with a single ID and password to gain access to any of several related systems.
SSO
Single Sign-on
A language and serialization format used to exchange cyber threat intelligence.
STIX
Structured Threat Information eXchange
Solutions that filter unwanted software/malware from user-initiated web/internet traffic and enforce corporate and regulatory policy compliance.
SWG
Secure Web Gateway
A security application that provides centralized validation of users attempting to gain access to a router or network access server.
TACACS+
Terminal Access Controller Access Control Systems
An application layer protocol for the communication of cyber threat information in a simple and scalable manner.
TAXII
Trusted Automated eXchange of Indicator Information
A set of communication protocols used to interconnect network devices on the internet.
TCP/IP
Transmission Control Protocol/Internet Protocol