Glossary S Flashcards
S/MIME (Secure/Multipurpose Internet Mail Extensions)
An email encryption standard that adds digital signatures and public key cryptography to traditional MIME communications.
SaaS (Software as a Service)
A computing method that uses the cloud to provide application services to users.
SAE (Simultaneous Authentication of Equals)
Personal authentication mechanism for Wi-Fi networks introduced with WPA3 to address vulnerabilities in the WPA-PSK method.
salt
A security countermeasure that mitigates the impact of a rainbow table attack by adding a random value to (“salting”) each plaintext input.
SAML (Security Assertion Markup Language)
An XML-based data format used to exchange authentication information between a client and a service.
SAN (subject alternative name)
Field in a digital certificate allowing a host to be identified by multiple host names/subdomains.
sandbox
A computing environment that is isolated from a host system to guarantee that the environment runs in a controlled, secure fashion. Communication links between the sandbox and the host are usually completely prohibited.
sanitization
The process of thorough and completely removing data from a storage medium so that file remnants cannot be recovered.
SAS (Serial Attached Small Computer Systems Interface)
Developed from parallel SCSI, SAS represents the highest performing hard disk interface available.
SCADA (Supervisory Control and Data Acquisition)
A type of industrial control system that manages large-scale, multiple-site devices and equipment spread over geographically large areas.
scalability
The property by which a computing environment is able to gracefully fulfill its ever-increasing resource needs.
scanless
Utility that runs port scans through third-party websites to evade detection.
SCAP (Security Content Automation Protocol)
A NIST framework that outlines various accepted practices for automating vulnerability scanning.
screened host
A dual-homed proxy/gateway server used to provide Internet access to other network nodes, whileprotecting them from external attack.
script kiddie
An inexperienced, unskilled attacker that typically uses tools or scripts created by others
SDK (software development kit)
Coding resources provided by a vendor to assist with development projects that use their platform or API.
SDN (software defined networking)
APIs and compatible hardware/virtual appliances allowing for programmable network appliances and systems.
SDV (software defined visibility)
APIs for reporting configuration and state data for automated monitoring and alerting.
SE (secure erase)
A method of sanitizing a drive using the ATA command set.
SEAndroid (Security-Enhanced Android)
Since version 4.3, Android has been based on Security-Enhanced Linux, enabling granular permissions for apps, container isolation, and storage segmentation.
SECaaS (Security as a Service)
A computing method that enables clients to take advantage of information, software, infrastructure, and processes provided by a cloud vendor in the specific area of computer security.
secure boot
A UEFI feature that prevents unwanted processes from executing during the boot operation.
security control
A technology or procedure put in place to mitigate vulnerabilities and risk and to ensure the confidentiality, integrity, and availability (CIA) of information.
SED (self-encrypting drive)
A disk drive where the controller can automatically encrypt data that is written to it.
segment
A portion of a network where all attached hosts can communicate freely with one another.
SEH (structured exception handler)
A mechanism to account for unexpected error conditions that might arise during code execution. Effective error handling reduces the chances that a program could be exploited.
self-signed certificate
A digital certificate that has been signed by the entity that issued it, rather than by a CA.
sentiment analysis
Devising an AI/ML algorithm that can describe or classify the intention expressed in natural language statements.
separation of duties
A concept that states that duties and responsibilities should be divided among individuals to prevent ethical conflicts or abuse of powers.
server certificate
A digital certificate that guarantees the identity of e-commerce sites and other websites that gather and store confidential information.
serverless
A software architecture that runs functions within virtualized runtime containers in a cloud rather than on dedicated server instances.
server-side
In a web application, input data that is executed or validated as part of a script or process running on the server.
service account
A host or network account that is designed to run a background service, rather than to log on interactively.