S Flashcards
Secure Shell (SSH)
Network protocol that uses cryptography to secure communication, remote command line login and remote command execution between two networked computers
Security as a Service (SecaaS)
The next generation of managed security services dedicated to the delivery, over the Internet, of specialized
information-security services.
Security information and event management (SIEM)
SIEM solutions are a combination of the formerly disparate product categories of SIM (security information management) and SEM (security event management). SIEM technology provides realtime analysis of security alerts generated by network hardware and
applications. SIEM solutions come as software, appliances or managed services, and are also used to log security data and generate reports for compliance purposes.
Security metrics
A standard of measurement used in management of security-related activities.
Segregation/separation of duties (SoD)
A basic internal control that prevents or detects errors and irregularities by assigning to separate individuals the responsibility for initiating and recording transactions and for the custody of assets.
Sensitivity
A measure of the impact that improper disclosure of information may have on an enterprise
Service delivery objective (SDO
Directly related to the business needs, SDO is the level of services to be reached during the alternate process mode until the normal situation is restored.
Service level agreement (SLA)
An agreement, preferably documented, between a service provider and the customer(s)/user(s) that defines minimum performance targets for a service and how they will be measured
Shell programming
A script written for the shell, or command line interpreter, of an operating system; it is often considered a simple domain-specific programming language.
Sniffing
The process by which data traversing a network are captured or monitored
Social engineering
An attack based on deceiving users or administrators at the target site into revealing confidential or sensitive information
Software as a service (SaaS)
Offers the capability to use the provider’s applications running on cloud infrastructure. The applications are accessible from various client devices through a thin client interface, such as a web browser (e.g., web-based email).
Split knowledge/split key
A security technique in which two or more entities separately hold data items that individually convey no knowledge of the information that results from combining the items; a condition under which two or more
entities separately have key components that individually convey no knowledge of the plain text key that will be produced when the key components are combined in the cryptographic module.
Spoofing
Faking the sending address of a transmission in order to gain illegal entry into a secure system
Standard
A mandatory requirement, code of practice or specification approved by a recognized external standards organization, such as International Organization for Standardization (ISO).