vocabularyS Flashcards
S/MIME
Secure/Multipurpose Internet Mail Extensions is an application layer secure e-mail protocol that uses an encryption system.
SBU
Sensitive but Unclassified is information that has some controls built into it. It is available on a need-to-know basis, but is not classified to the degree that a security clearance is needed to access it.
Scalar Processor
A type of processor that handles linear executions one instruction at a time. Pipelining may be invoked in this type of processor.
Screened Host
A firewall architecture in which a packet filtering router is placed between the trusted and untrusted networks and a bastion host is placed between the packet filtering router and the trusted network.
Screened Subnet
A firewall architecture configuration in which a small subnet is attached to the bastion host creating a DMZ that is perfect for a Web server.
Script Kiddie
An amateur cracker with few real skills that uses virus-generation software to create virus code.
SDLC
Synchronous Data Link Control is a data transmission protocol developed in the 1970s by IBM to ease connections to mainframe computers.
Secondary Memory
Nonvolatile memory such as hard disks, floppy disks, USB drives, memory sticks, and memory drives. Secondary memory is used to copy data when the machine will be turned off.
Secret Information
Information that is intended for managers of government organizations. Requires an elevated security clearance and requirement to know of the information in order to perform a task or duties.
Security Kernel
A collection of components that work together to provide the reference monitors functions.
Security Label
A concept that assigns a classification level to objects.
Security Policy
A policy that represents the management and organizations position on security. It dictates the organizations strategy and attitude towards general and specific security issues.
Sensor
A type of physical access control that detects movement, then activates an alarm. Some types of sensors may be infrared motion detectors and gas detectors.
Separation of Privilege
A security control architecture where a single user is never allowed to complete a sensitive task. This type of architecture requires two or more authorized users to complete a task.
Sequential Access
The act of accessing memory in a sequential order.
Server
The computer that runs administrative software and controls access to the network and other resources.
SESAME
Secure European System for Applications in a Multivendor Environment is an authentication service for use in Europe. SESAME uses public key cryptography to distribute secret keys and a Privilege Attribute Certificate mechanism which contains key information and the necessary authentication packet to pass authentication.
Session Hijacking
An attack in which the attacker intercepts the credentials of a valid session. The attacker then acts as though he/she is a valid user.
Session Layer
The layer of the ISO/OSI reference model that manages sessions and synchronizes data flow. The session layer logically connects to the other machine, maintaining session information to create a flow of messages back and forth.
SET Protocol
Secure Electronics Transactions protocol is an application layer protocol developed by Visa and MasterCard to authenticate the sender and the receiver. It uses digital certificates and signatures to provide data confidentiality and integrity.
SHA-1
Secure Hash Algorithm is a hashing algorithm developed by the National Institute of Standards and Technology in which the input can be any size and it generates a 160-bit digest.