The glossary
Cybersecurity Glossary
Learn about Cybrary's impact initiatives where we focus on reducing industry-wide gatekeeping, improving security teams, and making a difference throughout the cybersecurity industry and beyond.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Letter for filtering (will be hidden in prod) :
S
S/Key
An s/key is a one-time password mechanism developed for authentication to unix-like operating systems, particularly from dumb terminals or untrusted public computers. This mechanism uses a cryptographic hash function to generate a sequence of 64-bit, one-time passwords for remote user login. Since each password is only used once, the user is protected from password sniffers.
Letter for filtering (will be hidden in prod) :
S
S-Box
A s-box is a nonlinear substitution table used in several byte substitution transformations and in the key expansion routine to perform a one-for-one substitution of a byte value.
Letter for filtering (will be hidden in prod) :
S
Share
A share is any resource that has been made public on a system or network, such as a directory (file share) or printer (printer share).
Letter for filtering (will be hidden in prod) :
S
Security Engineering
Security engineering is an interdisciplinary approach and means to enable the realization of secure systems. It focuses on defining customer needs, security protection requirements, and required functionality early in the systems development life cycle, documenting requirements, and then proceeding with design, synthesis, and system validation while considering the complete problem.
Letter for filtering (will be hidden in prod) :
S
Security Specification
Security specification is the detailed description of the safeguards required to protect an information system.
Letter for filtering (will be hidden in prod) :
S
Secure Erasure
Secure erase is an overwrite technology using a firmware-based process to overwrite a hard drive. Is a drive command defined in the ANSI ATA and SCSI disk drive interface specifications, which runs inside drive hardware. It completes in about 1/8 the time of 5220 block erasure.
Letter for filtering (will be hidden in prod) :
S
Security Categorization
Security categorization is the process of determining the security category for information or an information system. The process of determining the security category for information or an information system. Security categorization methodologies are described in CNSS instruction 1253 for national security systems and in FIPS 199 for other than national security systems.
Letter for filtering (will be hidden in prod) :
S
Sensitive Information
Sensitive information is data that must be protected from unauthorized access to safeguard the privacy or security of an individual, organization, or nation. Information sensitivity is the control of access to information or knowledge that might result in loss of an advantage or level of security, if disclosed to others.
Letter for filtering (will be hidden in prod) :
S
Simple Network Management Protocol (SNMP)
Simple network management protocol (SNMP) is an internet-standard protocol for managing devices on ip networks. Devices that typically support SNMP include routers, switches, servers, workstations, printers, modem racks and more. SNMP is widely used in network management systems to monitor network-attached devices for conditions that warrant administrative attention.
Letter for filtering (will be hidden in prod) :
S
Security Features User's Guide (SFUG)
A security features user's guide (AFUG) is a guide or manual explaining how the security mechanisms in a specific system work.