S Flashcards
S/MIME
Secure/Multipurpose Internet Mail Extensions
The standard form of messaging with encryption or
digital signatures that requires public and private keys.
SaaS
Software as a Service
A minimal cloud asset that allows access to one
application or port.
SAE
Simultaneous Authentication of Equals
Based upon Dragonfly, this key management system
incorporates elements of Diffie Hellman and is a part of
WPA3.
SAML
Security Assertions Markup Language
A method of exchanging credentials via a trusted
authentication service.
SAN
Storage Area Network
A remote file system access via Internet-based
protocols.
SAN
Subject Alternative Name
Embedding multiple names for server within a single
certificate.
SCADA
System Control and Data Acquisition
Industrial controls automation the network-based
management systems that control many remote, small,
embedded devices.
SCAP
Security Content Automation Protocol
This is a framework promoted by the US government to
create open standards for the automation of information
assurance.
SCEP
Simple Certificate Enrollment Protocol
This is a technology that is highly resistant to dictionary
attacks and is designed to replace Pre-shared Keys and
WPA2-Personal.
SCP
Secure Copy
A command line application that will securely upload or
download files to work from a remote host.
SCSI
Small Computer System Interface
A host bus interface to connect to multiple hard drives.
SDK
Software Development Kit
Tools, APIs and applications created by a vendor to
allow development and customization.
SDLC
Software Development Life Cycle
The sequence of processes involved in the creation and
management of software.
SDLM
Software Development Life-cycle Methodology
The stages or phases of a software-based application as
it goes from inception to maintenance.
SDN
Software Defined Network
Using virtualization to create, manage and secure
networks between various systems.
SDP
Service Delivery Platform
The elements that provide service delivery, session
management and other key components to a client.
SDV
Software-defined Visibility
The capability implemented with software that allows
for the organization to closely inspect network traffic
from an array of collectors and sensors.
SED
Self-Encrypting Drives
Storage devices that are capable of implementing high-
grade encryption without additional software or resources.
SHE
Structured Exception Handler
This is the facility within Windows that identifies
memory corruption and contingencies.
SFTP
Secured File Transfer Protocol
This application runs over TCP/22 and encrypts control
and data functions.
SHA
Secure Hashing Algorithm
A now deprecated hashing algorithm that has been in
very common use.