S Flashcards

(53 cards)

1
Q

S/MIME

A

Secure/Multipurpose Internet Mail Extensions

The standard form of messaging with encryption or
digital signatures that requires public and private keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SaaS

A

Software as a Service

A minimal cloud asset that allows access to one
application or port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SAE

A

Simultaneous Authentication of Equals

Based upon Dragonfly, this key management system
incorporates elements of Diffie Hellman and is a part of
WPA3.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SAML

A

Security Assertions Markup Language

A method of exchanging credentials via a trusted
authentication service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SAN

A

Storage Area Network

A remote file system access via Internet-based
protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SAN

A

Subject Alternative Name

Embedding multiple names for server within a single
certificate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SCADA

A

System Control and Data Acquisition

Industrial controls automation the network-based
management systems that control many remote, small,
embedded devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SCAP

A

Security Content Automation Protocol

This is a framework promoted by the US government to
create open standards for the automation of information
assurance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SCEP

A

Simple Certificate Enrollment Protocol

This is a technology that is highly resistant to dictionary
attacks and is designed to replace Pre-shared Keys and
WPA2-Personal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SCP

A

Secure Copy

A command line application that will securely upload or
download files to work from a remote host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SCSI

A

Small Computer System Interface

A host bus interface to connect to multiple hard drives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SDK

A

Software Development Kit

Tools, APIs and applications created by a vendor to
allow development and customization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SDLC

A

Software Development Life Cycle

The sequence of processes involved in the creation and
management of software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SDLM

A

Software Development Life-cycle Methodology

The stages or phases of a software-based application as
it goes from inception to maintenance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SDN

A

Software Defined Network

Using virtualization to create, manage and secure
networks between various systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SDP

A

Service Delivery Platform

The elements that provide service delivery, session
management and other key components to a client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

SDV

A

Software-defined Visibility

The capability implemented with software that allows
for the organization to closely inspect network traffic
from an array of collectors and sensors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

SED

A

Self-Encrypting Drives

Storage devices that are capable of implementing high-
grade encryption without additional software or resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

SHE

A

Structured Exception Handler

This is the facility within Windows that identifies
memory corruption and contingencies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

SFTP

A

Secured File Transfer Protocol

This application runs over TCP/22 and encrypts control
and data functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

SHA

A

Secure Hashing Algorithm

A now deprecated hashing algorithm that has been in
very common use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

SIEM

A

Security Information and Event Management

These servers collect, aggregate and analyze data from
multiple sources to identify threats and dangerous
trends.

23
Q

SIM

A

Subscriber Identity Module

An integrated circuit that identifies a phone and
subscriber.

24
Q

SIP

A

Session Initiation Protocol

This is used to signal, start up, maintain and terminate
real-time communication services between endpoints
using Internet protocol.

25
SLA
Service Level Agreement An agreement on the characteristics of quality and performance between two parties.
26
SLE
Single Loss Expectancy The value of an asset multiplied times the exposure factor.
27
SMB
Server Message Block This is a core Microsoft protocol used for general access and authentication.
28
S/MIME
Secure/Multipurpose Internet Mail Extensions Developed by RSA, this is a formatting standard originally created for implementing digital signatures and encryption with public key infrastructure.
29
SMS
Short Message Service Protocol used by cell phones to exchange brief text- based messages.
30
SMTP
Simple Mail Transfer Protocol The vulnerable application responsible for forwarding email to a destination server or receiving it from a sender.
31
SMTPS
Simple Mail Transfer Protocol Secure The secured application responsible for forwarding email to a destination server or receiving it from a sender.
32
SNMP
Simple Network Management Protocol A network-based application designed to discover device status, change configuration and receive errors and exceptions.
33
SOAP
Simple Object Access Protocol The structured markup used to identify components of service oriented architecture messages.
34
SOAR
Security Orchestration, Automation, Response A software architecture designed to allow an organization to collect and analyze threat information from numerous sources and inputs, as well as respond to incidents
35
SoC
System on Chip The minimization of an application and operating system to a state that will fit on an integrated circuit.
36
SOC
Security Operations Center This is a hub of operations and communication that focuses on security incidents and management at a technical level.
37
SPF
Sender Policy Framework An email validation architecture designed to detect and eliminate spoofing and spamming through approved mail exchangers.
38
SPIM
Spam over Internet Messaging Chat messages delivered as a hoax were to induce purchase.
39
SPIT
Spam over Internet Telephony The use of SMS to deliver unwanted messages.
40
SPoF
Single Point of Failure A device, business process or person that is critical to a business and has no redundancy.
41
SQL
Structured Query Language An industry-standard mass information repository retrieval system.
42
SQLi
SQL injection Manipulation of input to the front end of a server in order to gain access to the data repositories.
43
SRTP
Secure Real-Time Protocol A secure form of Internet protocol-based telephony.
44
SSD
Solid State Drive Nonvolatile storage using persistent solid-state flash memory to store and retrieve information.
45
SSH
SSH This protocol, runs over TCP/22 and encrypts its exchanges.
46
SSID
Service Set Identifier An identifier for a wireless network.
47
SSL
Secure Sockets Layer A certificate-based authentication and encryption application that would securely process any TCP-based layer 7 protocol.
48
SSO
Single Sign-on An authentication architecture that relies on a central system and it's authentication to authorize users for other services using a single set of credentials.
49
STIX
Structured Threat Information eXpression Developed by OASIS and MITRE, this is an international standard for sharing intelligence and threat information
50
Stego
Stenography The obfuscation of information within a common looking format that achieves stealth.
51
STP
Shielded Twisted Pair Four pairs of wires wrapped in foil that is grounded to prevent interference and eavesdropping.
52
Symmetric key
Secret key The use of a single value to hide and then reveal information.
53
SWG
Secure Web Gateway A system used by enterprises to protect the intranet from hostile or unsecured traffic, commonly implemented in a cloud-based solution.