The glossary

Cybersecurity Glossary

Learn about Cybrary's impact initiatives where we focus on reducing industry-wide gatekeeping, improving security teams, and making a difference throughout the cybersecurity industry and beyond.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Letter for filtering (will be hidden in prod) :

S

Security Service

A security service is a capability that supports one, or many, of the security goals. Examples of security services are key management, access control, and authentication. A capability that supports one, or more, of the security requirements (confidentiality, integrity, availability). Examples of security services are key management, access control, and authentication.

Letter for filtering (will be hidden in prod) :

S

Sha-1

Secure hash algorithm 1 (sha-1) is a cryptographic hash function designed by the United States National Security Agency and is a U.S. federal information processing standard published by the United States NIST.

Letter for filtering (will be hidden in prod) :

S

Security Relevant Change

A security relevant change is any change to a system’s configuration, environment, information content, functionality, or users which has the potential to change the risk imposed upon its continued operations.

Letter for filtering (will be hidden in prod) :

S

Sanitization

Sanitization is the process to remove information from media such that information recovery is not possible. It includes removing all labels, markings, and activity logs. A general term referring to the actions taken to render data written on media unrecoverable by both ordinary and, for some forms of sanitization, extraordinary means.

Letter for filtering (will be hidden in prod) :

S

Sniffer

A sniffer is a tool that monitors network traffic that is received in a network interface.

Letter for filtering (will be hidden in prod) :

S

Security Perimeter

A security perimeter is a physical or logical boundary that is defined for a system, domain, or enclave, within which a specified security policy or security architecture is applied.

Letter for filtering (will be hidden in prod) :

S

Safety

Safety is defined as the requirement to ensure that the individuals involved with an organization, including employees, customers, and visitors, are safeguarded from any kind of malicious act or attack.

Letter for filtering (will be hidden in prod) :

S

Security Mechanism

A security mechanism is a device designed to provide one or more security services usually rated in terms of strength of service and assurance of the design.

Letter for filtering (will be hidden in prod) :

S

Security Program Plan

A security management plan is a formal document that provides an overview of the security requirements for an organization-wide information security program and describes the program management security controls and common security controls in place or planned for meeting those requirements.

Letter for filtering (will be hidden in prod) :

S

Security Control Assessor

A security control assessor is the individual, group, or organization responsible for conducting a security control assessment.