S

« Back to Glossary Index

Safety: Safety is the need to ensure that the people involved with the company, including employees, customers, and visitors, are protected from harm.

Salting: An additional safeguard that’s used to strengthen hash functions

Scareware: Malware that employs tactics to frighten users into infecting their device

Search Processing Language (SPL): Splunk’s query language

Secure File Transfer Protocol (SFTP): A secure protocol used to transfer files from one device to another over a network

Secure Shell (SSH):  A program to log into another computer over a network, execute commands in a remote machine, and move files from one machine to another. A security protocol is used to create a shell with a remote system.

Secure Sockets Layer (SSL):  A protocol developed by Netscape for transmitting private documents via the Internet. SSL works by using a public key to encrypt data that’s transferred over the SSL connection.

Security Architecture: A type of security design composed of multiple components,

Security Audit: A review of an organization’s security controls, policies, and procedures against a set of expectations.

Security Controls: Safeguards designed to reduce specific security risks

Security Ethics: Guidelines for making appropriate decisions as a security.

Security Frameworks: Guidelines used for building plans to help mitigate risk and threats to data and privacy

Security Governance: Practices that help support, define, and direct security efforts

Security Hardening: The process of strengthening a system to reduce its vulnerabilities and attack surface.

Security Information and Event Management (SIEM): An application that collects and analyzes log data to monitor critical activities in an organization

Security Mindset: The ability to evaluate risk and constantly seek out and identify the

Security Operations Center (SOC): An organizational unit dedicated to monitoring

Security Orchestration, Automation, and Response (SOAR): A collection of applications, tools, and workflows that use automation to respond to security events

Security Policy: A set of rules and practices that specify or regulate how a system or organization provides security services to protect sensitive and critical system resources.

Security Posture: An organization’s ability to manage its defense of critical assets and data and react to change

Security Zone: A segment of a company’s network that protects the internal network from the internet

Select: The third step of the NIST RMF that means to choose, customize, and capture documentation of the controls that protect an organization

Sensitive Data: A type of data that includes personally identifiable information (PII),

Sensitive Information: Sensitive information, as defined by the federal government, is any unclassified information that, if compromised, could adversely affect the national interest or conduct of federal initiatives.

Sensitive Personally Identifiable Information (SPII): A specific type of PII that falls

Separation of Duties: Separation of duties is the principle of splitting privileges among multiple individuals or systems.

Server: A system entity that provides a service in response to requests from other system entities called clients.

Session: A session is a virtual connection between two hosts by which network traffic is passed.

Session Cookie: A token that websites use to validate a session and determine how

Session Hijacking: Take over a session that someone else has established. An event when attackers obtain a legitimate user’s session ID.

Session ID: A unique token that identifies a user and their device while accessing a

Session: A sequence of network HTTP requests and responses associated with the

Set Data: Data that consists of an unordered collection of unique values

SHA1: A one-way cryptographic hash function. Also, see “MD5.”

Share:  A share is a resource made public on a machine, such as a directory (file share) or printer (printer share).

Shared Responsibility: The idea that all individuals within an organization take an active role in lowering risk and maintaining both physical and virtual security

Shell: A Unix term for the interactive user interface with an operating system. The shell is the layer of programming that understands and executes the commands a user enters. In some systems, the shell is called a command interpreter. A shell usually implies an interface with a command syntax (think of the DOS operating system and its “C:>” prompts and user commands such as “dir” and “edit”). The command-line interpreter.

Signature Analysis: A detection method used to find events of interest

Signature: A pattern that is associated with malicious activity

Simple Network Management Protocol (SNMP): A network protocol used for monitoring and managing devices on a network

Single sign-on (SSO): A technology that combines several different logins into one

single threat actor, known as the “bot-herder”

Smartcard: A smartcard is an electronic badge that includes a magnetic strip or chip that can record and replay a set key.

Smishing: The use of text messages to trick users to obtain sensitive information or to

Smurf Attack: A network attack performed when an attacker sniffs an authorized user’s IP address and floods it with ICMP packets

Sniffer: A sniffer is a tool that monitors network traffic as it is received in a network interface.

Sniffing: A synonym for “passive wiretapping.”

Social Engineering: A euphemism for non-technical or low-technology means – such as lies, impersonation, tricks, bribes, blackmail, and threats – used to attack information systems.

Social Media Phishing: A type of attack where a threat actor collects detailed

SOCKS:  A protocol that a proxy server can use to accept requests from client users in a company’s network so that it can forward them across the Internet. SOCKS uses sockets to represent and keep track of individual connections. The client side of SOCKS is built into certain Web browsers and the server side can be added to a proxy server.

Software: Computer programs (which are stored in and executed by computer hardware) and associated data (which also is stored in the hardware) that may be dynamically written or modified during execution.

Source Port: The port that a host uses to connect to a server. It is usually a number greater than or equal to 1024. It is randomly generated and is different each time a connection is made.

Spam: The abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages.

Spanning Port: Configures the switch to behave like a hub for a specific port.

Spear Phishing: A malicious email attack targeting a specific user or group of users,

Speed: The rate at which a device sends and receives data, measured by bits per second

Splunk Cloud: A cloud-hosted tool used to collect, search, and monitor log data

Splunk Enterprise: A self-hosted tool used to retain, analyze, and search an organization’s log data to provide security information and alerts in real-time

Spoof: Faking the sending address of transmission to gain illegal [unauthorized] entry into a secure system.

Spyware: Software that is secretly or surreptitiously installed into an information system without the knowledge of the system user or owner. Malware that’s used to gather and sell information without consent.

SQL (Structured Query Language): A programming language used to create, interact

SQL Injection: SQL injection is a type of input validation attack specific to database-driven applications where SQL code is inserted into application queries to manipulate the database. An attack that executes unexpected queries on a database.

Stakeholder: An individual or group that has an interest in any decision or activity of

Standard error: An error message returned by the OS through the shell

Standard input: Information received by the OS via the command line

Standard output: Information returned by the OS through the shell

Standards: References that inform how to set policies

STAR Method: An interview technique used to answer behavioral and situational

Stateful: A class of firewalls that keeps track of information passing through it and proactively filters out threats

Stateless: A class of firewall that operates based on predefined rules and does not keep track of information from data packets

Steganography: Methods of hiding the existence of a message or other data. This is different than cryptography, which hides the meaning of a message but does not hide the message itself. An example of a steganographic method is “invisible” ink.

Stored XSS Attack: An instance when a malicious script is injected directly into the server

String Concatenation: The process of joining two strings together

String data: Data consisting of an ordered sequence of characters

Style Guide: A manual that informs the writing, formatting, and design of documents

Subnetting: The subdivision of a network into logical groups called subnets

Substring: A continuous sequence of characters within a string

Sudo: A command that temporarily grants elevated permissions to specific users

Supply Chain: A system of organizations, people, activities, information, and resources, for creating and moving products including product components and/or services from suppliers through to their customers.

Supply-chain Attack: An attack that targets systems, applications, hardware, and/or

Suricata: An open-source intrusion detection system, intrusion prevention system, and

Switch: A switch is a networking device that keeps track of MAC addresses attached to each of its ports so that data is only transmitted to the ports that are the intended recipient of the data. A device that makes connections between specific devices on a network by sending and receiving data between them.

Symmetric Encryption: The use of a single secret key to exchange information

SYN Flood: A denial of service attack that sends a host more TCP SYN packets (request to synchronize sequence numbers, used when opening a connection) than the protocol implementation can handle.

Synchronization: Synchronization is the signal made up of a distinctive pattern of bits that network hardware looks for to signal the start of a frame.

Synchronize (SYN) Flood Attack: A type of DoS attack that simulates a TCP/IP connection and floods a server with SYN packets

Syntax Error: An error that involves invalid usage of a programming language

Syntax: The rules that determine what is correctly structured in a computing language

Syslog: Syslog is the system logging facility for Unix systems.

SEARCH GLOSSARY
« Back to Glossary Index

Shopping Cart0

Cart