Day 13 Flashcards
These are operating systems that work in real-time, such as manufacturing and robotics.
RTOS
Real-time Operating System
One of several protocols used for telephony/audio/video.
RTP
Real-time Transport Protocol
The standard form of messaging with encryption or digital signatures that requires public and private keys.
S/MIME
Secure/Multipurpose Internet Mail Extensions
A minimal cloud asset that allows access to one application or port.
SaaS
Software as a Service
Based upon Dragonfly, this key management system incorporates elements of Diffie Hellman and is a part of WPA3.
SAE
Simultaneous Authentication of Equals
A method of exchanging credentials via a trusted authentication service.
SAML
Security Assertions Markup Language
A remote file system access via Internet-based protocols.
SAN
Storage Area Network
Embedding multiple names for server within a single certificate.
SAN
Subject Alternative Name
Industrial controls automation the network-based management systems that control many remote, small, embedded devices.
SCADA
System Control and Data Acquisition
This is a framework promoted by the US government to create open standards for the automation of information assurance.
SCAP
Security Content Automation Protocol
This is a technology that is highly resistant to dictionary attacks and is designed to replace Pre-shared Keys and WPA2-Personal.
SCEP
Simple Certificate Enrollment Protocol
A command line application that will securely upload or download files to work from a remote host.
SCP
Secure Copy
A host bus interface to connect to multiple hard drives.
SCSI
Small Computer System Interface
Tools, APIs and applications created by a vendor to allow development and customization.
SDK
Software Development Kit
The sequence of processes involved in the creation and management of software.
SDLC
Software Development Life Cycle
The stages or phases of a software-based application as it goes from inception to maintenance.
SDLM
Software Development Life-cycle Methodology
Using virtualization to create, manage and secure networks between various systems.
SDN
Software Defined Network
The elements that provide service delivery, session management and other key components to a client.
SDP
Service Delivery Platform
The capability implemented with software that allows for the organization to closely inspect network traffic from an array of collectors and sensors.
SDV
Software-defined Visibility
Storage devices that are capable of implementing high-grade encryption without additional software or resources.
SED
Self-Encrypting Drives
This is the facility within Windows that identifies memory corruption and contingencies.
SHE
Structured Exception Handler
This application runs over TCP/22 and encrypts control and data functions.
SFTP
Secured File Transfer Protocol
A now deprecated hashing algorithm that has been in very common use.
SHA
Secure Hashing Algorithm
These servers collect, aggregate and analyze data from multiple sources to identify threats and dangerous trends.
SIEM
Security Information and Event Management
An integrated circuit that identifies a phone and subscriber.
SIM
Subscriber Identity Module
This is used to signal, start up, maintain and terminate real-time communication services between endpoints using Internet protocol.
SIP
Session Initiation Protocol