Acronyms S-Z Flashcards
(48 cards)
S/MIME
Secure/Multipurpose Internet Mail Extensions - standard for secure email messaging that provides encryption and digital signing capabilities.
SAN
Storage Area Network - specialized, high-speed network that provides network access to storage devices. SANs are typically composed of hosts, switches, storage elements, and storage devices that are interconnected using a variety of technologies, topologies, and protocols
SaaS
Software as a Service - a cloud computing model in which a third-party provider offers software applications.
SAE
Simultaneous Authentication of Equals - key exchange protocol that provides stronger security and that replaced PSK in WPA2.
SATCOM
Secure Satellite Communications - refers to the use of satellite technology for communication purposes, including voice, data, and video transmission.
SCADA
Supervisory Control and Data Acquisition - a system used to control and monitor industrial processes.
SCP
Secure Copy Protocol - a protocol used to securely transfer files between two devices.
SHA
Secure Hash Algorithm - SHA stands for secure hashing algorithm. SHA is a modified version of MD5 and used for hashing data and certificates. A hashing algorithm shortens the input data into a smaller form that cannot be understood by using bitwise operations, modular additions, and compression functions.
SID
Security Identifier - a unique identifier used to identify a user or group in Windows operating systems.
SIEM
Security Information and Event Management - type of security solution that provides real-time analysis of security alerts and events generated by network hardware and applications.
SLA
Service Level Agreement - a contract between a client and a service provider that defines cybersecurity expectations and responsibilities. Security standards: Minimum service levels, incident response times, and protection against cyber threats
SNMP
Simple Network Management Protocol - a protocol used to manage and monitor network devices.
SMTP
Simple Mail Transfer Protocol - a protocol used to send email messages between servers
SOAR
Security Orchestration, Automation and Response - security technology that helps organizations automate and streamline their security operations and incident response processes.
SoC
System on Chip - integrated circuit (IC) that combines various components of a computer or electronic system into a single chip
SQL
Structured Query Language - a programming language used for managing and manipulating data in relational databases.
SQLi
SQL Injection)- SQL injection is a code injection technique that might destroy your database. SQL injection is one of the most common web hacking techniques. SQL injection is the placement of malicious code in SQL statements, via web page input.
SSH
Secure Shell - a protocol used for secure remote access to a device. Uses Port 22
SSL
Secure Sockets Layer - SSL, or Secure Sockets Layer, is an encryption-based Internet security protocol. It was first developed by Netscape in 1995 for the purpose of ensuring privacy, authentication, and data integrity in Internet communications. SSL is the predecessor to the modern TLS encryption used today. A website that implements SSL/TLS has “HTTPS” in its URL instead of “HTTP”
SSO
Single Sign-On - an authentication method that lets users access multiple applications and services using a single set of login credentials.
STP
Spanning Tree Protocol - a protocol used to prevent loops in a network topology.
STIX
Structured Threat Information Exchange - designed to support the sharing of cybersecurity threat intelligence between different organizations and cybersecurity technologies.
TACACS+
Terminal Access Controller Access Control System Plus) - protocol used for providing centralized authentication, authorization, and accounting (AAA) services for network devices such as routers, switches, and firewalls.
TAXII
Trusted Automated Exchange of Indicator Information - application protocol for exchanging Cyber Threat Intelligence over HTTPS. It works with STIX.