CompTIA Sec+ SY0-701 Acronyms V4 Flashcards
SDN
Software-defined Networking
- Definition: SDN is an architecture and approach to networking that separates the control plane from the data plane, allowing network administrators to centrally manage program network devices through software-based controllers, enabling dynamic, agile, and programmable network configurations.
- Scenario: A cloud service provider implements SDN technology to orchestrate network resources, automate provisioning tasks, and optimize traffic flows across virtualized data centers and multi-tenant environments. SDN controllers use open APIs, network overlays, and policy-based management frameworks to abstract network complexity, enforce quality of service (QoS) policies, and support workload mobility and scalability, enabling efficient resource utilization and application performance in cloud computing infrastructures.
SELinux
Security-enhanced Linux
- Definition: SELinux is a mandatory access control (MAC) mechanism and security extension for Linux operating systems that enforces fine-grained access controls, role-based permissions, and security policies to protect system resources, mitigate privilege escalation attacks, and enforce least privilege principles.
- Scenario: A Linux server administrator enables SELinux enforcement mode to restrict system processes, user accounts, and applications from accessing unauthorized files, directories, and system resources, reducing the attack surface and preventing privilege escalation exploits in web servers, database servers, and critical infrastructure components. SELinux policies define security contexts, labels, and permissions for objects and subjects in the Linux security model, enhancing isolation, integrity, and confidentiality controls in multi-user environments and shared computing platforms.
SED
Self-encrypting Drives
- Definition: SEDs are storage devices equipped with hardware-based encryption engines and cryptographic processors that automatically encrypt data at rest, protecting sensitive information stored on hard disk drives (HDDs), solid-state drives (SSDs), and removable storage media.
- Scenario: A corporate IT department deploys self-encrypting drives in laptops, desktops, and enterprise storage arrays to safeguard confidential data, intellectual property, and customer records against data breaches, theft, and unauthorized access. SEDs integrate encryption algorithms, key management features, and tamper-resistant hardware components to encrypt and decrypt data transparently, reducing performance overhead and ensuring data privacy and compliance with regulatory requirements such as GDPR and HIPAA in diverse computing environments.
SEH
Structured Exception Handler
- Definition: SEH is a mechanism in Windows operating systems that handles exceptions, interrupts, and abnormal program behaviors by directing program flow to structured exception handling routines, enabling error recovery, exception propagation, and crash reporting in software applications.
- Scenario: A software developer implements structured exception handling routines in a Windows-based application to gracefully handle runtime errors, memory access violations, and system exceptions, preventing application crashes, data corruption, and service disruptions for end users. SEH mechanisms intercept exceptions, execute exception filters, and invoke exception handlers to recover from errors, log diagnostic information, and notify users of unexpected program behaviors, ensuring robustness, reliability, and user experience in mission-critical software systems.
SFTP
Secured File Transfer Protocol
- Definition: SFTP is a secure file transfer protocol that enables encrypted file uploads, downloads, and file management operations over SSH (Secure Shell) connections, providing data confidentiality, integrity, and authentication for file transfer processes.
- Scenario: A financial institution uses SFTP to transfer sensitive financial data, transaction records, and regulatory reports securely between banking systems, trading platforms, and external partners, ensuring data privacy, compliance, and auditability in financial transactions and electronic payments. SFTP clients and servers authenticate users with SSH key pairs, encrypt file transfers using strong cryptographic algorithms such as AES and RSA, and maintain audit trails and session logs for regulatory compliance and security monitoring purposes in highly regulated industries.
SHA
Secure Hashing Algorithm
- Definition: SHA is a family of cryptographic hash functions used to generate fixed-size hash values or message digests from input data, providing data integrity, digital signatures, and message authentication in secure communication protocols and cryptographic applications.
- Scenario: A digital certificate authority uses SHA-256 hashing algorithm to generate digital signatures and certificate thumbprints for SSL/TLS certificates issued to web servers, online merchants, and e-commerce platforms, ensuring trust, authenticity, and data integrity for encrypted web connections and secure online transactions. SHA algorithms produce unique hash values that are computationally resistant to collisions, tampering, and forgery attacks, enabling secure data exchanges, identity verification, and cryptographic operations in public key infrastructures (PKIs) and digital signature schemes.
SHTTP
Secure Hypertext Transfer Protocol
- Definition: SHTTP is a deprecated protocol and extension of HTTP (Hypertext Transfer Protocol) that provides secure communication channels and encrypted data transmissions over the internet, enabling confidentiality and privacy for web browsing sessions and online transactions.
- Scenario: An e-commerce website adopts SHTTP protocol to secure customer login credentials, payment information, and sensitive data exchanged between web browsers and web servers, protecting against eavesdropping, man-in-the-middle attacks, and session hijacking exploits in public Wi-Fi networks and untrusted internet connections. SHTTP implementations use cryptographic protocols such as SSL/TLS (Secure Sockets Layer/Transport Layer Security) to encrypt HTTP traffic, authenticate servers, and establish secure communication channels, ensuring data privacy and integrity for online users and digital transactions in electronic commerce environments.
SIEM
Security Information and Event Management
- Definition: SIEM is a comprehensive security solution that combines security information management (SIM) and security event management (SEM) capabilities to collect, correlate, analyze, and respond to security events, incidents, and threats across enterprise networks, systems, and applications.
- Scenario: A security operations center (SOC) deploys a SIEM platform to aggregate security logs, network traffic data, and event logs from firewalls, intrusion detection systems (IDS), antivirus software, and endpoint devices, correlating actionable intelligence, detecting anomalous behaviors, and orchestrating incident response workflows in real time. SIEM solutions provide centralized dashboards, alerting mechanisms, and automated response actions to streamline threat detection, incident triage, and forensic analysis, enabling proactive threat hunting and security incident management in complex IT environments.
SIM
Subscriber Identity Module
- Definition: SIM is a smart card-based security module used in mobile devices, smartphones, and cellular networks to authenticate users, provision mobile services, and store subscriber identity information, phone numbers, and network credentials.
- Scenario: A mobile network operator issues SIM cards to subscribers, enabling cellular connectivity, voice calls, text messaging, and mobile data services on smartphones and feature phones, leveraging GSM (Global System for Mobile Communications) and UMTS (Universal Mobile Telecommunications System) technologies. SIM cards contain integrated circuits with unique identifiers, encryption keys, and authentication algorithms, enabling secure authentication, roaming capabilities, and network access control for mobile users in national and international telecommunications networks.
SLA
Service-level Agreement
- Definition: SLA is a contractual agreement between a service provider and a customer that defines the agreed-upon performance metrics, service levels, and quality standards for delivered services, specifying responsibilities, expectations, and remedies in case of service disruptions or breaches.
- Scenario: A cloud service provider offers SLAs to customers for guaranteed uptime, availability, and performance levels of cloud computing resources, virtual machines, and hosted services, ensuring reliability, responsiveness, and accountability in service delivery and support. SLAs include service credits, penalties, and compensation clauses to incentivize service providers to meet service level targets, resolve incidents, and maintain customer satisfaction in cloud-based environments and managed service offerings.
SLE
Single Loss Expectancy
- Definition: SLE is a risk management metric used to quantify the potential financial impact or monetary loss associated with a single security incident, threat event, or adverse occurrence within an organization’s risk management framework.
- Scenario: A cybersecurity analyst calculates the single loss expectancy (SLE) for a data breach incident based on the estimated value of sensitive data, intellectual property, and customer records stored on enterprise servers and databases, factoring in the probability of occurrence and expected loss magnitude for different threat scenarios. SLE assessments help organizations prioritize security investments, allocate risk mitigation resources, and justify cybersecurity expenditures based on the financial impact and business consequences of potential security breaches and cyberattacks.
SMS
Short Message Service
- Definition: SMS is a text messaging service and communication protocol used to exchange short text messages, multimedia messages, and SMS-based notifications between mobile devices, cellular phones, and messaging applications over cellular networks and mobile communication channels.
- Scenario: A mobile user sends an SMS text message to a friend’s smartphone to share event updates, appointment reminders, or personal greetings, leveraging SMS-based messaging platforms and mobile carriers to transmit short text messages in real time. SMS services support two-way communication, group messaging, and multimedia content delivery, enabling quick, efficient, and cost-effective communication for personal, social, and business interactions in mobile communication networks and telecommunication infrastructures.
SMTP
Simple Mail Transfer Protocol
- Definition: SMTP is a standard communication protocol used for sending and relaying email messages between mail servers, email clients, and mail transfer agents (MTAs) over the internet and computer networks, facilitating electronic mail delivery and communication.
- Scenario: An email client uses SMTP to send outbound email messages to remote mail servers and recipient mailboxes, leveraging SMTP servers and SMTP relay services to route email traffic, perform address verification, and deliver messages to intended recipients. SMTP sessions establish connections between sending and receiving mail servers, exchange SMTP commands and response codes, and transfer email messages using MIME (Multipurpose Internet Mail Extensions) encoding, ensuring reliable and efficient email delivery across diverse email platforms and messaging systems.
SOAP
Simple Object Access Protocol
- Definition: SOAP is a protocol and messaging format used for exchanging structured information, invoking remote procedure calls, and facilitating communication between distributed software components and web services over internet protocols such as HTTP and SMTP.
- Scenario: An enterprise integrates SOAP-based web services into its business applications to automate data integration, orchestrate business processes, and enable interoperability between legacy systems, enterprise applications, and external service providers. SOAP messages encode XML-based payloads, method calls, and service requests, encapsulating data elements and SOAP envelopes with headers and body elements, facilitating service-oriented architectures (SOA) and web service interactions in enterprise software development and integration projects.
SMTPS
Simple Mail Transfer Protocol Secure
- Definition: SMTPS is an extension of SMTP (Simple Mail Transfer Protocol) that adds encryption and security features to SMTP communications by using SSL/TLS (Secure Sockets Layer/Transport Layer Security) protocols to secure email transmissions and protect sensitive information from eavesdropping and interception.
- Scenario: An email server administrator configures SMTPS encryption settings to secure outgoing email traffic, encrypting SMTP connections between email clients, mail servers, and mail delivery agents to prevent unauthorized access, message tampering, and data breaches in transit. SMTPS implementations authenticate mail servers, negotiate encryption protocols, and establish secure TLS tunnels for SMTP sessions, ensuring confidentiality, integrity, and privacy for email communications and message transfers over untrusted networks and public internet connections.
SNMP
Simple Network Management Protocol
- Definition: SNMP is an application-layer protocol and network management standard used to monitor, manage, and control network devices, infrastructure components, and IT systems by collecting and exchanging management information between SNMP agents and network management systems (NMS).
- Scenario: A network administrator deploys SNMP monitoring tools and NMS platforms to monitor network traffic, track device performance, and diagnose network issues in routers, switches, firewalls, and servers across enterprise networks and data centers. SNMP agents installed on network devices generate SNMP traps, respond to SNMP queries, and transmit SNMP data objects such as system status, interface statistics, and hardware inventory information to centralized management consoles, enabling proactive network monitoring, fault detection, and performance optimization in complex IT environments.
SOAR
Security Orchestration, Automation, Response
- Definition: SOAR is a cybersecurity technology and operational framework that integrates security orchestration, automation, and incident response capabilities to streamline security operations, improve incident detection and response times, and mitigate cyber threats across distributed IT environments.
- Scenario: A security operations center (SOC) deploys SOAR platforms and security automation tools to orchestrate incident response workflows, automate routine security tasks, and correlate threat intelligence feeds across diverse security controls, SIEM (Security Information and Event Management) systems, and endpoint detection platforms. SOAR solutions leverage playbooks, workflows, and machine learning algorithms to analyze security alerts, prioritize incidents, and execute response actions, enabling security analysts to investigate, contain, and remediate security incidents with speed, accuracy, and consistency in dynamic threat landscapes.
SoC
System on Chip
- Definition: SoC refers to a complete computing system integrated onto a single chip. It typically includes a microprocessor or CPU, memory, input/output ports, and other components necessary for the functioning of a computer or electronic device.
- Scenario: A smartphone manufacturer designs a new model with an SoC that integrates the processor, graphics unit, modem, and memory controller into a single chip. This integration allows for better power efficiency, reduced size, and improved performance compared to devices with separate components.
SOC
Security Operations Center
- Definition: SOC is a centralized facility or team responsible for monitoring, detecting, analyzing, and responding to cybersecurity incidents within an organization’s network and information systems.
- Scenario: A large financial institution establishes a SOC equipped with advanced security tools, SIEM platforms, and a team of trained analysts to monitor network traffic, investigate security alerts, and respond to potential threats in real-time. The SOC operates 24/7 to ensure the confidentiality, integrity, and availability of critical assets and sensitive data.
SOW
Statement of Work
- Definition: SOW is a formal document that outlines the scope, objectives, deliverables, timelines, and responsibilities of a project or engagement between a client and a service provider.
- Scenario: A software development company creates a detailed SOW for a client project, specifying the project requirements, development milestones, acceptance criteria, and payment terms. The SOW serves as a contractual agreement and a roadmap for both parties involved in the project.
SPF
Sender Policy Framework
- Definition: SPF is an email authentication protocol that allows domain owners to specify which IP addresses are authorized to send emails on behalf of their domain.
- Scenario: An organization implements SPF records in its DNS configuration to prevent email spoofing and phishing attacks. By publishing SPF records, the organization specifies the authorized mail servers for sending emails from its domain, helping email providers verify the authenticity of incoming emails.
SPIM
Spam over Internet Messaging
Definition: SPIM refers to unsolicited and unwanted messages sent over internet messaging platforms such as instant messaging and chat applications.
Scenario: A user receives unwanted advertisements and malicious links through a messaging app. These messages disrupt communication and may contain phishing attempts or malware. The user can report such messages and use security features to block or filter SPIM.
SQL
Structured Query Language
- Definition: SQL is a standard programming language used for managing and manipulating relational databases. It allows users to perform tasks such as querying data, inserting records, updating information, and deleting entries from a database.
- Scenario: A database administrator uses SQL queries to retrieve customer information, generate reports, and analyze sales data stored in a company’s database. SQL statements are written to extract specific data based on defined criteria and to perform various data manipulation tasks.
SQLi
SQL Injection
- Definition: SQLi is a type of cyber attack where malicious SQL statements are inserted into input fields of a web application to manipulate the backend database or gain unauthorized access to sensitive information.
- Scenario: A hacker exploits a vulnerability in a web application by injecting SQL commands into a login form. If successful, the attacker can bypass authentication mechanisms, extract user credentials, or retrieve sensitive data from the database.
SSD
Solid State Drive
- Definition: SSD is a storage device that uses flash memory to store data persistently. Unlike traditional hard disk drives (HDDs), SSDs have no moving parts, resulting in faster data access times and improved performance.
- Scenario: A computer user upgrades their laptop with an SSD to enhance system responsiveness and reduce boot times. The SSD improves overall system performance by accelerating data read and write operations, making applications load faster and improving user experience.
SRTP
Secure Real-Time Protocol
- Definition: SRTP is a security protocol used to provide encryption, authentication, and integrity protection for real-time communication sessions such as voice over IP (VoIP) and video conferencing.
- Scenario: An organization implements SRTP to secure its VoIP infrastructure, ensuring that voice calls between employees are encrypted and protected from eavesdropping and tampering. SRTP encrypts the voice data packets exchanged during VoIP sessions, providing confidentiality and integrity for sensitive conversations.
SSH
Secure Shell
- Definition: SSH is a cryptographic network protocol used to establish secure communication channels over insecure networks. It provides encrypted and authenticated connections for remote access, file transfer, and command execution.
- Scenario: A system administrator uses SSH to remotely log in to a server and perform administrative tasks. SSH encrypts the communication between the client and the server, protecting sensitive information such as login credentials and command outputs from interception and tampering.
SSL
Secure Sockets Layer
- Definition: SSL is a deprecated cryptographic protocol used to secure communication over the internet. It provides encryption, data integrity, and authentication for data exchanged between web servers and clients.
- Scenario: An e-commerce website implements SSL to secure online transactions and protect customer information such as credit card details and personal data. SSL certificates are installed on web servers to establish secure HTTPS connections, ensuring that data transmitted between the web browser and the server remains confidential and tamper-proof.
STIX
Structured Threat Information eXchange
- Definition: STIX is a standardized language and format for describing cyber threat intelligence. It allows organizations to share and exchange threat information in a structured and machine-readable format.
- Scenario: Security analysts use STIX to exchange information about known threats, vulnerabilities, and attack patterns with other organizations and cybersecurity communities. STIX-encoded threat intelligence feeds are consumed by security tools and platforms to enhance threat detection, incident response, and risk mitigation efforts.
SSO
Single Sign-on
- Definition: SSO is an authentication mechanism that allows users to access multiple applications and services with a single set of login credentials. Once authenticated, users can navigate between different systems without having to log in again.
- Scenario: An organization deploys an SSO solution to streamline user authentication and access management. Employees can log in to their workstations once and gain access to email, file-sharing systems, and other corporate applications without entering their credentials repeatedly.
SWG
Secure Web Gateway
- Definition: SWG is a security solution that controls and monitors web traffic between internal users and the internet. It enforces security policies, filters malicious content, and protects users from web-based threats.
- Scenario: A company deploys a SWG appliance or cloud service to enforce web usage policies, block access to malicious websites, and inspect encrypted web traffic for threats. The SWG solution provides content filtering, malware detection, and URL categorization capabilities to secure web browsing sessions and prevent data breaches.