The glossary

Cybersecurity Glossary

Learn about Cybrary's impact initiatives where we focus on reducing industry-wide gatekeeping, improving security teams, and making a difference throughout the cybersecurity industry and beyond.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Letter for filtering (will be hidden in prod) :

S

Session Hijacking

Session hijacking is also known as cookie hijacking. It is an exploitation of a valid computer session, sometimes also called a session key, to gain unauthorized access to sensitive information or services in a computer system or network.

Letter for filtering (will be hidden in prod) :

S

Smurf Attack

A smurf attack is a distributed denial-of-service attack in which large numbers of internet control message protocol (ICMP) packets with the intended victim’s spoofed source IP are broadcast to a computer network using an ip broadcast address. Most devices on a network respond to this by sending a reply to the source IP address. This can slow down the victim’s computer to the point where it becomes impossible to work on.

Letter for filtering (will be hidden in prod) :

S

Security Fault Analysis (SFA)

Security fault analysis (SFA) is an assessment, usually performed on information system hardware, to determine the security properties of a device when hardware fault is encountered.

Letter for filtering (will be hidden in prod) :

S

Security Strength

Security strength is a measure of the computational complexity associated with recovering certain secret and/or security-critical information concerning a given cryptographic algorithm from known data (e.g. Plaintext/ciphertext pairs for a given encryption algorithm). It is also a number associated with the amount of work (that is, the number of operations) that is required to break a cryptographic algorithm or system. Sometimes referred to as a security level.

Letter for filtering (will be hidden in prod) :

S

Security Authorization Boundary

A security authorization boundary is an information security area that includes a grouping of tools, technologies, and data.

Letter for filtering (will be hidden in prod) :

S

Security Plan

A security plan is a formal document that provides an overview of the security requirements for an information system or an information security program and describes the security controls in place or planned for meeting those requirements.

Letter for filtering (will be hidden in prod) :

S

Shell

Shell is a unix term for the interactive user interface with an operating system. The shell is the layer of programming that recognises and executes the commands that a user enters. In some systems, the shell is called a command interpreter.

Letter for filtering (will be hidden in prod) :

S

Security Level

A security level is a hierarchical indicator of the degree of sensitivity to a certain threat. It implies, according to the security policy being enforced, a specific level of protection.

Letter for filtering (will be hidden in prod) :

S

Socket

A socket is an endpoint for communication between two systems. The socket tells a host’s ip stack where to plug in a data stream so that it connects to the right application.

Letter for filtering (will be hidden in prod) :

S

Security Control Effectiveness

Security control effectiveness is the measure of correctness of implementation (i.e., how consistently the control implementation complies with the security plan) and how well the security plan meets organizational needs in accordance with current risk tolerance.