Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Glossary

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z  |  Symbols
S
S/MIME
SA
SaaS
SaaS E-mail and Collaboration Solution
SACL
SAD
SAFECode
Safeguard
Safeguards
SAFER
Safety Instrumented System
SAID
SAISO
Salt
SAM
SAMATE
SAML
SAML authentication assertation
SAN
Sandbox
Sandboxing
Sandia National Laboratories
Sanitization
Sanitize
Sanitize
SANITIZE Command
SANS
SAO
SAOP
SAP
SAPF
SAR
Sarbanes-Oxley
Sarbanes-Oxley Act
SATE
SBH
S-Box
SC
SC 37
SCA
SCADA
SCADA Server
Scalability
Scalability Testing
Scanners
Scanning
SCAP
SCAP Component
SCAP Conformant
SCAP Content
SCAP Data Stream
SCAP Data Stream Collection
SCAP Result Data Stream
SCAP Source Data Stream
SCAP Source Data Stream Collection
SCAP Use Case
Scatternet
Scavenging
SCBA
Scenario
Scenario Test
SCEPACS
Scheme
SCI
SCIF
SCIP
Scoping Considerations
Scoping Guidance
SCP
Scrambling
Script
Scripting Language
SCRM
SCSI
SCTP
SD
SDK
SDLC
SDMI
SDO
SDOC
SDP
SDXC
SE
SecCM
Second Byte Of A Two-Byte Status Word
Second Extended Filesystem
Second Parameter Of A Card Command
Second Preimage
Second Preimage Resistance
Secondary Authenticator
Secondary Market
Secret Key
secret key cryptographic algorithm
Secret Keying Material
Secret Keying Material (that is shared)
Secret Seed
SECS
Sector
Secure And Fast Encryption Routine
Secure Channel
Secure Communication Protocol
Secure Communications
Secure Communications Interoperability Protocol Product
Secure Copy
Secure Digital
Secure Digital Extended Capacity
Secure Digital Music Initiative
Secure Element
Secure Entry Point
Secure Erase
Secure File Transfer Protocol
Secure FTP
Secure Hash Algorithm
Secure Hash Algorithm 1
Secure Hash Algorithm KECCAK
Secure Hash Algorithm Version 1
Secure Hash Algorithm version 2 (SHA-224, SHA-256, SHA-384, SHA-512)
Secure Hash Algorithm, Version 1
Secure Hash Algorithm-3
Secure Hash Standard
Secure Hash Standard (1)
Secure Hashing Algorithm
Secure Messaging
Secure Multipurpose Internet Mail Extensions
Secure Neighbor Discovery
Secure Shell
Secure Simple Pairing
Secure Socket Layer
Secure Socket Layer/Transport Layer Security
Secure Sockets Layer
Secure State
Secure/Multipart Internet Mail Extensions
Secure/Multipurpose Internet Mail Extensions
Security
Security (Domain)
Security Account Manager
Security Accounts Manager
Security Administrator
Security And Privacy Profile
Security Assertion Markup Language
Security Assertions Markup Language
Security Assessment
Security Assessment Plan
Security Assessment Report
Security Association
Security Association Database
Security Association Identifier
Security Association Lifetime
Security Associations
Security Assurance
Security Attribute
Security Audit
Security Auditor
Security Authorization
Security Authorization (to Operate)
Security Authorization Boundary
Security Authorization Package
Security Authorization to Operate
Security Automation Domain
Security Awareness, Training, And Education
Security Banner
Security Capability
Security Categorization
Security Category
Security Concept Of Operations
Security Configuration Management
Security CONOP
Security Content Automation Program
Security Content Automation Protocol
Security Control
Security Control Assessment
Security Control Assessor
Security Control Baseline
Security Control Effectiveness
Security Control Enhancement
Security Control Enhancements
Security Control Inheritance
Security Control Overlay
Security Control Provider
Security Controls
Security Controls Baseline
Security Domain
Security Engineering
Security Event Management
Security Event Management Software
Security Fault Analysis
Security Fault Injection Test
Security Features Users Guide (C.F.D.)
Security Filter
Security Functionality
Security Functions
Security Goal
Security Goals
Security Identify
Security Impact Analysis
Security Incident
Security Information And Event Management
Security Information And Event Management Software
Security Information And Event Management Tool
Security Information Management
Security Inspection
Security Kernel
Security Label
Security Life Of Data
Security Management Dashboard
Security Manager Protocol
Security Marking
Security Mechanism
Security Objective
Security Objectives
Security Parameters Index
Security Perimeter
Security Plan
Security Policy
Security Policy Database
Security Policy Filter
Security Posture
Security Program Plan
Security Properties
Security Protections
Security Protocol
Security Range
Security Requirement
Security Requirements
Security Requirements Baseline
Security Requirements Guide
Security Requirements Traceability Matrix
Security Risk
Security Rollup
Security Safeguards
Security Service
Security Services
Security Status
Security Strength
Security Target
Security Technical Implementation Guide
Security Technical Implementation Guidelines
Security Test And Evaluation
Security Testing
Security Token Service
Security Tokens
Security Tool Distribution
Security Zone
Security, Test, And Evaluation
Security-Focused Configuration Management
Security-Oriented Code Review
Security-Relevant Change
Security-Relevant Event
Security-Relevant Information
SED
Seed
Seed (Noun)
Seed (Verb)
Seed Key
Seed Period
seedlen
Seedlife
Segment
Select
select (V, a, b)
Self Testing
Self-Contained Breathing Apparatus
Self-Dual Key
Self-Encrypting Devices / Self-Encrypting Drives
Self-Signed Certificate
SEM
Semantic Web Services Architecture
Semantics
Semantics Of A Language
Semi-Active Tag
Semiblock
Semiblock String
Semi-Passive Tag
Semi-Quantitative Assessment
SEND
Sender
Senior Agency Information Security Officer
Senior Agency Official For Privacy
Senior Authorizing Official
Senior Executive Service
Senior Information Security Officer
Senior Information Security Officer (Agency)
Senioragency Information Security Officer
Sensitive Compartmented Information
Sensitive Compartmented Information Facility
Sensitive Information
Sensitive Personal Information
Sensitivity
Sensor
Sentences (formal)
SEP
Separation Of Duties
Sequence
Sequence Control
Sequence Covering Array Generator
Server
Server Administrator
Server Message Block
Server Software
Service
Service Agent
Service Agents
Service Agreement
Service Authority
Service Component Reference Model
Service Composition
Service Description
Service Discovery Protocol
Service Interface
Service Level Agreement
Service Location
Service Oriented Architecture
Service Pack
Service Pack 2
Service Pack 3
Service Processor
Service Release
Service Set Identifier
Service-Level Agreement
Service-Oriented Architecture
Servo Valve
SES
Session Cookie
Session Hijack Attack
Session Initiation Protocol
Session Key
Session Locking
Session Traversal Utilities For Nat
Set Point
Setting The Bar
SFA
SFTP
SFUG
SHA
SHA1
Sha-1
SHA-2
SHA-3
SHA3-224
SHA3-256
SHA3-384
SHA3-512
SHAKE
SHAKE128
SHAKE256
Shall
Shared Secret
Shared Service Provider
Shared Service Providers
Shared State Equivalence
SHAx(M)
Sheet
Shielded Enclosure
ShiftRows()
Shim
SHIM6
Short Message Service
Short Term Key
Short Title
Short Title Assignment Requester
Should
Shred
Shrinkage
SHRn(x)
SHS
SI
SIA
SID
SIEM
sig
sig’
SIGE(…)
Signal Processing System
Signaling Rate
Signatory
Signature
Signature Block Header
Signature Certificate
Signature Generation
Signature Scheme With Appendix - Probabilistic Signature Schemersassa-Pss
Signature Validation
Signature Verification
Signature-Based Detection
Signature-In-Question
Signed Data
Signed Response
Signed Zone
Significant Consequences
SIIT
SIM
Similarity
Similarity Digest
Simple Mail Transfer Protocol
Simple Mail Transport Protocol
Simple Network Management Protocol
Simple Network Management Protocol Version 1
Simple Network Management Protocol Version 2
Simple Network Management Protocol Version 3
Simple Network Time Protocol
Simple Object Access Protocol
Simple Object Access Protocol (originally)
Simple Power Analysis
Simple Service Discovery Protocol
Simple t -way combination coverage
Simulators
Single Log-On
Single Loop Controller
Single Point Keying
Single Sign On
Single Sign-On
Single-Hop Problem
Singulation
SIP
SiPS
SIS
SISO
Site Multihoming By Ipv6 Intermediation
Site-Level Aggregation Identifier
Site-Local (IPv6 Scope)
Situational Awareness
SKEY
Skimming
SLA
SLAAC
Slack Space
sLen
Slice
SM
Small Computer System Interface
Small Office Home Office
Small Office/Home Office
Smart Card
Smart Card Enabled Physical Access Control System
Smart Card Tokens
Smart Data
SMB
SME
SMI
SMM
SMP
SMS
SMS Chat
SMTP
Snapshot
Sniffer
SNL
SNMP
SNMPv1
SNMPv2
SNMPv3
SNTP
SOA
SOAP
SOAP Header
SOAP Message
Social Engineering
Social Security Number
Sockets Protocol
Sockets Protocol Version 5
SOCKS
SOCKS Protocol
SOCKSv5
Software
Software As A Service
Software Asset Management
Software Assurance
Software Assurance Automation Protocol
Software Assurance Forum For Excellence In Code
Software Assurance Metrics And Tool Evaluation
Software Correctness Testing
Software Debugger/ Update Utility ((PBX))
Software Development Kit
Software Identification
Software Identification Tag
Software System Test And Evaluation Process
Software Update Services
Software Vulnerability
Software-As-A-Service
SOHO
Solenoid Valve
Solid State Drive
SoM
SOP
SOR
SORN
Source Address
Source Address (IPv6 Field)
Source Authentication
Source Content
Source Of Randomness
Sources Sought Notice
SOW
SOX
SP
SP2
SP3
SPA
Spam
Spam Filtering Software
Spanning Port
SPC
SPD
Spear Phishing
Special Access Program
Special Access Program Facility
Special Category
Special Character
Special Interest Group
Special Publication
Special Publication (NIST)
Specialized Security-Limited Functionality
Specialized Security-Limited Functionality Environment
Specification
SPI
Spillage
SPK
SPL
Split Knowledge
Split Tunneling
Sponge Construction
Sponge Function
SPONGE[f, pad,r]
Spoofing
SPP
SPP-ICS
Sprawl
Spread Spectrum
Spyware
SQL
SR
SRES
SRG
SRM
SRTM
SRV
SR-XX-I
SS
SSAE
SSD
SSDP
SSE-CMM
SSH
SSID
SSL
SSL/TLS
SSLF
SSLF Environment
SSN
SSO
SSP
ST&E
STA
Standalone Environment
Standard
Standard Operating Procedure
Standard Operating Procedures
Standard User Account
Standards Developing Organization
Standards For Attestation Engagements
STAR
Start Of Authority
State
State Array
Stateful Inspection
Stateful Protocol Analysis
Stateless Address Autoconfiguration
Stateless Inspection
Stateless IP/ICMP Translation Algorithm
Stateless Transport Tunneling
Statement Coverage
Statement Of Work
Static Analysis
Static Authentication
Static Key
Static Key Pair
Station
Statistical Process Control
Statistical Test (of a Hypothesis)
Statistically Independent Events
Status Information
Status Monitoring
Status Word
STD
Steady State
Stealth Mode
Steganography
Step Mapping
STIG
STK
Storage
Storage Area Network
Storage Security
Store (key and/or metadata)
Store A Key Or Metadata
Stream Component
Stream Control Transmission Protocol
Strength Of Mechanism
String
Striped Core
Strong Authentication
Strongly Bound Credentials
Structured Product Labeling
Structured Query Language
STS
STT
STUN
Subaccount
Subassembly
SubBytes()
Subdirectory
Sub-Functions
Sub-Hand Receipt
Subject
Subject Certification Authority
Subject Matter Expert
Subkey
Subkey Generation
Subordinate CA
Subordinate Certificate Authority
Subscriber
Subscriber Identity Module
Subscriber Station
Subsystem
SubWord()
Successor
Suite A
Suite B
Suite B Compatible
Superencryption
Superior CA
Superior Certification Authority
Supersession
Superuser
Supervisory Control
Supervisory Control And Data Acquisition
Supplemental Guidance
Supplementation
Supplementation (Security Controls)
Supplier
Supplier's Declaration Of Conformity
Supply Chain
Supply Chain Assurance
Supply Chain Attack
Supply Chain Element
Supply Chain Map
Supply Chain Risk
Supply Chain Risk Management
Support
Support a Security Strength
Suppression Measure
SUS
Suspended State
Suspension
SUT
SW1
SW2
SwA
SwAAP
SWID
Switch
SWSA
Syllabary (C.F.D.)
Symmetric Algorithm (secret key)
Symmetric Cryptographic Algorithm
Symmetric Cryptography
Symmetric Encryption Algorithm
Symmetric Key
Symmetric Key Algorithm
Symmetric-Key Algorithm
Synchronization Protocols
Synchronous Crypto-Operation
Syntax
Sysadmin, Audit, Network, Security
Syslog
System
System Access Control List
System Administrator
System And Communications Protection
System And Communications Protection (NIST SP 800-53 security control family)
System And Information Integrity
System And Information Integrity (NIST SP 800-53 security control family)
System And Services Acquisition
System And Services Acquisition (NIST SP 800-53 security control family)
System Assurance
System Authority
System Development Life Cycle
System Environment
System Equipment Configuration
System Flash Memory
System High
System High Mode (C.F.D.)
System Indicator
System Initialization
System Integrator
System Integrity
System Interconnection
System Low
System Management Interrupt
System Management Mode
System Of Record Notice
System Of Records
System Of Records Notice
System Or Device Certificate
System Or Subsystem Under Test
System Owner
System Protection Profile For Industrial Control Systems
System Security Plan
System Software
System Test
Systems Management Server
Systems Security Engineering
Systems Security Engineering - Capability Maturity Model®
Systems Security Officer
System-Specific Control
System-Specific Policies
System-Specific Security Control
SZ