Coming mid-July
Get 3 months of access for the price of 2!
Celebrate Cybersecurity Awareness Month with our buy 2, get 1 offer. Valid until October 31. Elevate your skills today!
October Special
Get 3 months of access for the price of 2!
Celebrate Cybersecurity Awareness Month with our buy 2, get 1 offer!
Celebrate Cybersecurity Awareness Month with our buy 2, get 1 offer. Valid until October 31. Elevate your skills today!
Valid until October 31. Elevate your skills today!
Buy now
The glossary

Cybersecurity Glossary

Learn about Cybrary's impact initiatives where we focus on reducing industry-wide gatekeeping, improving security teams, and making a difference throughout the cybersecurity industry and beyond.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Letter for filtering (will be hidden in prod) :

S

Standard Access Control Lists (ACLs)

Standard access control lists (ACLs) are essentially a set of commands, grouped together by a number or name that is used to filter traffic entering or leaving an interface. ACLs make packet filtering decisions based on source ip address only.

Letter for filtering (will be hidden in prod) :

S

Static Host Tables

Static host tables are text files that contain hostname and address mapping.

Letter for filtering (will be hidden in prod) :

S

Steganalysis

Steganalysis is the study of detecting and defeating the use of steganography. This is analogous to cryptanalysis applied to cryptography.

Letter for filtering (will be hidden in prod) :

S

Stimulus

Stimulus is network traffic that initiates a connection or solicits a response.

Letter for filtering (will be hidden in prod) :

S

Software

Software is any computer instructions, data, or programs that can be stored electronically and executed by computer hardware. While running any software, associated data that is stored in the hardware may be dynamically written or modified.

Letter for filtering (will be hidden in prod) :

S

Symmetric Key

A symmetric key is a cryptographic key that is used in a symmetric cryptographic algorithm.

Letter for filtering (will be hidden in prod) :

S

Star Property

A star property is a user who is unable to write data to a lower classification level without logging in at that lower classification level when using star property.

Letter for filtering (will be hidden in prod) :

S

Stealthing

Stealthing is a term that refers to approaches used by malicious code to conceal its presence on the infected system.

Letter for filtering (will be hidden in prod) :

S

Source Port

A source port is a port that a host uses to connect to a server. It is usually a number greater than or equal to 1024. It is randomly generated and is different each time a connection is established.

Letter for filtering (will be hidden in prod) :

S

System Security Officer (SSO)

A system security officer (SSO) is an individual responsible for enforcement or administration of the security policy that applies to the system.