S Flashcards
S/MIME
Secure/Multipurpose Internet Mail Extensions
The standard form of messaging with encryption or
digital signatures that requires public and private keys.
SaaS
Software as a Service
A minimal cloud asset that allows access to one
application or port.
SAE
Simultaneous Authentication of Equals
Based upon Dragonfly, this key management system
incorporates elements of Diffie Hellman and is a part of
WPA3.
SAML
Security Assertions Markup Language
A method of exchanging credentials via a trusted
authentication service.
SAN
Storage Area Network
A remote file system access via Internet-based
protocols.
SAN
Subject Alternative Name
Embedding multiple names for server within a single
certificate.
SCADA
System Control and Data Acquisition
Industrial controls automation the network-based
management systems that control many remote, small,
embedded devices.
SCAP
Security Content Automation Protocol
This is a framework promoted by the US government to
create open standards for the automation of information
assurance.
SCEP
Simple Certificate Enrollment Protocol
This is a technology that is highly resistant to dictionary
attacks and is designed to replace Pre-shared Keys and
WPA2-Personal.
SCP
Secure Copy
A command line application that will securely upload or
download files to work from a remote host.
SCSI
Small Computer System Interface
A host bus interface to connect to multiple hard drives.
SDK
Software Development Kit
Tools, APIs and applications created by a vendor to
allow development and customization.
SDLC
Software Development Life Cycle
The sequence of processes involved in the creation and
management of software.
SDLM
Software Development Life-cycle Methodology
The stages or phases of a software-based application as
it goes from inception to maintenance.
SDN
Software Defined Network
Using virtualization to create, manage and secure
networks between various systems.
SDP
Service Delivery Platform
The elements that provide service delivery, session
management and other key components to a client.
SDV
Software-defined Visibility
The capability implemented with software that allows
for the organization to closely inspect network traffic
from an array of collectors and sensors.
SED
Self-Encrypting Drives
Storage devices that are capable of implementing high-
grade encryption without additional software or resources.
SHE
Structured Exception Handler
This is the facility within Windows that identifies
memory corruption and contingencies.
SFTP
Secured File Transfer Protocol
This application runs over TCP/22 and encrypts control
and data functions.
SHA
Secure Hashing Algorithm
A now deprecated hashing algorithm that has been in
very common use.
SIEM
Security Information and Event Management
These servers collect, aggregate and analyze data from
multiple sources to identify threats and dangerous
trends.
SIM
Subscriber Identity Module
An integrated circuit that identifies a phone and
subscriber.
SIP
Session Initiation Protocol
This is used to signal, start up, maintain and terminate
real-time communication services between endpoints
using Internet protocol.
SLA
Service Level Agreement
An agreement on the characteristics of quality and
performance between two parties.
SLE
Single Loss Expectancy
The value of an asset multiplied times the exposure
factor.
SMB
Server Message Block
This is a core Microsoft protocol used for general access
and authentication.
S/MIME
Secure/Multipurpose Internet Mail Extensions
Developed by RSA, this is a formatting standard
originally created for implementing digital signatures
and encryption with public key infrastructure.
SMS
Short Message Service
Protocol used by cell phones to exchange brief text-
based messages.
SMTP
Simple Mail Transfer Protocol
The vulnerable application responsible for forwarding
email to a destination server or receiving it from a
sender.
SMTPS
Simple Mail Transfer Protocol Secure
The secured application responsible for forwarding
email to a destination server or receiving it from a
sender.
SNMP
Simple Network Management Protocol
A network-based application designed to discover
device status, change configuration and receive errors
and exceptions.
SOAP
Simple Object Access Protocol
The structured markup used to identify components of
service oriented architecture messages.
SOAR
Security Orchestration, Automation, Response
A software architecture designed to allow an
organization to collect and analyze threat information
from numerous sources and inputs, as well as respond to
incidents
SoC
System on Chip
The minimization of an application and operating
system to a state that will fit on an integrated circuit.
SOC
Security Operations Center
This is a hub of operations and communication that
focuses on security incidents and management at a
technical level.
SPF
Sender Policy Framework
An email validation architecture designed to detect and
eliminate spoofing and spamming through approved
mail exchangers.
SPIM
Spam over Internet Messaging
Chat messages delivered as a hoax were to induce
purchase.
SPIT
Spam over Internet Telephony
The use of SMS to deliver unwanted messages.
SPoF
Single Point of Failure
A device, business process or person that is critical to a
business and has no redundancy.
SQL
Structured Query Language
An industry-standard mass information repository
retrieval system.
SQLi
SQL injection
Manipulation of input to the front end of a server in
order to gain access to the data repositories.
SRTP
Secure Real-Time Protocol
A secure form of Internet protocol-based telephony.
SSD
Solid State Drive
Nonvolatile storage using persistent solid-state flash
memory to store and retrieve information.
SSH
SSH
This protocol, runs over TCP/22 and encrypts its
exchanges.
SSID
Service Set Identifier
An identifier for a wireless network.
SSL
Secure Sockets Layer
A certificate-based authentication and encryption
application that would securely process any TCP-based
layer 7 protocol.
SSO
Single Sign-on
An authentication architecture that relies on a central
system and it’s authentication to authorize users for
other services using a single set of credentials.
STIX
Structured Threat Information eXpression
Developed by OASIS and MITRE, this is an
international standard for sharing intelligence and threat
information
Stego
Stenography
The obfuscation of information within a common
looking format that achieves stealth.
STP
Shielded Twisted Pair
Four pairs of wires wrapped in foil that is grounded to
prevent interference and eavesdropping.
Symmetric key
Secret key
The use of a single value to hide and then reveal
information.
SWG
Secure Web Gateway
A system used by enterprises to protect the intranet
from hostile or unsecured traffic, commonly
implemented in a cloud-based solution.