The glossary

Cybersecurity Glossary

Learn about Cybrary's impact initiatives where we focus on reducing industry-wide gatekeeping, improving security teams, and making a difference throughout the cybersecurity industry and beyond.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Letter for filtering (will be hidden in prod) :

S

Share

A share is any resource that has been made public on a system or network, such as a directory (file share) or printer (printer share).

Letter for filtering (will be hidden in prod) :

S

Security Engineering

Security engineering is an interdisciplinary approach and means to enable the realization of secure systems. It focuses on defining customer needs, security protection requirements, and required functionality early in the systems development life cycle, documenting requirements, and then proceeding with design, synthesis, and system validation while considering the complete problem.

Letter for filtering (will be hidden in prod) :

S

Security Specification

Security specification is the detailed description of the safeguards required to protect an information system.

Letter for filtering (will be hidden in prod) :

S

Secure Erasure

Secure erase is an overwrite technology using a firmware-based process to overwrite a hard drive. Is a drive command defined in the ANSI ATA and SCSI disk drive interface specifications, which runs inside drive hardware. It completes in about 1/8 the time of 5220 block erasure.

Letter for filtering (will be hidden in prod) :

S

Security Categorization

Security categorization is the process of determining the security category for information or an information system. The process of determining the security category for information or an information system. Security categorization methodologies are described in CNSS instruction 1253 for national security systems and in FIPS 199 for other than national security systems.

Letter for filtering (will be hidden in prod) :

S

Sensitive Information

Sensitive information is data that must be protected from unauthorized access to safeguard the privacy or security of an individual, organization, or nation. Information sensitivity is the control of access to information or knowledge that might result in loss of an advantage or level of security, if disclosed to others.

Letter for filtering (will be hidden in prod) :

S

Simple Network Management Protocol (SNMP)

Simple network management protocol (SNMP) is an internet-standard protocol for managing devices on ip networks. Devices that typically support SNMP include routers, switches, servers, workstations, printers, modem racks and more. SNMP is widely used in network management systems to monitor network-attached devices for conditions that warrant administrative attention.

Letter for filtering (will be hidden in prod) :

S

Security Features User's Guide (SFUG)

A security features user's guide (AFUG) is a guide or manual explaining how the security mechanisms in a specific system work.

Letter for filtering (will be hidden in prod) :

S

Secure Assertion Markup Language (SAML)

Security assertion markup language (SAML) is an xml-based security specification developed by the Organization for the Advancement of Structured Information Standards (OASIS) for exchanging authentication (and authorization) information between trusted entities over the internet. A framework for exchanging authentication and authorization information. Security typically involves checking the credentials presented by a party for authentication and authorization. Saml standardizes the representation of these credentials in an xml format called “assertions,” enhancing the interoperability between disparate applications. A protocol consisting of xml-based request and response message formats for exchanging security information, expressed in the form of assertions about subjects, between online business partners.

Letter for filtering (will be hidden in prod) :

S

Session

A session is a virtual connection between two hosts by which network traffic is passed. It is a way to store information (in variables) to be used across multiple pages.