Coming mid-July
Get 3 months of access for the price of 2!
Celebrate Cybersecurity Awareness Month with our buy 2, get 1 offer. Valid until October 31. Elevate your skills today!
October Special
Get 3 months of access for the price of 2!
Celebrate Cybersecurity Awareness Month with our buy 2, get 1 offer!
Celebrate Cybersecurity Awareness Month with our buy 2, get 1 offer. Valid until October 31. Elevate your skills today!
Valid until October 31. Elevate your skills today!
Buy now
The glossary

Cybersecurity Glossary

Learn about Cybrary's impact initiatives where we focus on reducing industry-wide gatekeeping, improving security teams, and making a difference throughout the cybersecurity industry and beyond.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Letter for filtering (will be hidden in prod) :

S

S/Key

An s/key is a one-time password mechanism developed for authentication to unix-like operating systems, particularly from dumb terminals or untrusted public computers. This mechanism uses a cryptographic hash function to generate a sequence of 64-bit, one-time passwords for remote user login. Since each password is only used once, the user is protected from password sniffers.

Letter for filtering (will be hidden in prod) :

S

S-Box

A s-box is a nonlinear substitution table used in several byte substitution transformations and in the key expansion routine to perform a one-for-one substitution of a byte value.

Letter for filtering (will be hidden in prod) :

S

Share

A share is any resource that has been made public on a system or network, such as a directory (file share) or printer (printer share).

Letter for filtering (will be hidden in prod) :

S

Security Engineering

Security engineering is an interdisciplinary approach and means to enable the realization of secure systems. It focuses on defining customer needs, security protection requirements, and required functionality early in the systems development life cycle, documenting requirements, and then proceeding with design, synthesis, and system validation while considering the complete problem.

Letter for filtering (will be hidden in prod) :

S

Security Specification

Security specification is the detailed description of the safeguards required to protect an information system.

Letter for filtering (will be hidden in prod) :

S

Secure Erasure

Secure erase is an overwrite technology using a firmware-based process to overwrite a hard drive. Is a drive command defined in the ANSI ATA and SCSI disk drive interface specifications, which runs inside drive hardware. It completes in about 1/8 the time of 5220 block erasure.

Letter for filtering (will be hidden in prod) :

S

Security Categorization

Security categorization is the process of determining the security category for information or an information system. The process of determining the security category for information or an information system. Security categorization methodologies are described in CNSS instruction 1253 for national security systems and in FIPS 199 for other than national security systems.

Letter for filtering (will be hidden in prod) :

S

Sensitive Information

Sensitive information is data that must be protected from unauthorized access to safeguard the privacy or security of an individual, organization, or nation. Information sensitivity is the control of access to information or knowledge that might result in loss of an advantage or level of security, if disclosed to others.

Letter for filtering (will be hidden in prod) :

S

Simple Network Management Protocol (SNMP)

Simple network management protocol (SNMP) is an internet-standard protocol for managing devices on ip networks. Devices that typically support SNMP include routers, switches, servers, workstations, printers, modem racks and more. SNMP is widely used in network management systems to monitor network-attached devices for conditions that warrant administrative attention.

Letter for filtering (will be hidden in prod) :

S

Security Features User's Guide (SFUG)

A security features user's guide (AFUG) is a guide or manual explaining how the security mechanisms in a specific system work.