AWS Amazon Web Services Network Partner: Pioneering Network-Centric AI-ML-Quant-Cyber-Crypto-Quantum Cloud Computing AIMLExchange: We Create the Digital Future™: Beyond Artificial Intelligent Systems: Self-Adaptive Complex Systems Pioneer  BRINT: From Future of Finance™ to Future of FinTech™  C4I-Cyber: Beyond AI C4I-Cyber and Quantum Supremacy: Adversarial and Counter-Adversarial C4I-Cyber-Crypto Command and Control Premium Domains For Sale: FundRaiser

We Create the Digital Future™...And You Can Too. It's As Easy as A, B, C. Come. Join Us. Build the Future.
AWS Amazon Web Services  MIT Computer Science & AI Lab  Princeton University  Goldman Sachs  JP Morgan Asset Management

Silicon Valley-Wall Street-Pentagon-Global Digital Pioneer: Below: Historical Archive: World's Top Digital Site.
IT Security and Information Assurance Glossary of 4,000 Terms: A, B, C, D, E, F, G, H, I, J, K, L, M, N, O, P, Q, R, S, T, U, V, W, X, Y, Z
*
@brint.com
Interactive Research Portals-Glossary of 4,000 IT Security, Information Assurance, Controls, Compliance Terms: S
"Best web site for keeping up with hi-tech industry developments..." - InfoWorld
*

Research Analyst Wizard: Click on a term to create most-updated research microsite on that topic.


S
S FTP or Secure FTP S/FTP · S HTTP · S HTTP or Secure HTTP S/HTTP · S HTTP: Secure HTTP · S MIME or Secure MIME S/MIME · S/Key · S/MIME: Secure/Multipurpose Internet Mail Extensions · SACL: System access control list · Sacrificial Host · Sacrificial lamb · Sadmind · Safe Architecture · Safe Harbor · Safe Harbor Agreement · Safe Harbor Principles · Safeguard · Safeguarding Statement · Safety · SAINT: Security Administrator’s Integrated Network Tool · Salami Slicing · Salami Technique · Sales Droid · salt · Sam Spade · SAM: Security Accounts Manager · SAML · SAML: Security Assertion Markup Language · Sampling Risk · Samurai · Sandbox · Sanitize · Sanitized name · Sanity Check · SANS Institute · SANS Top Ten List · SARA: Security Auditor’s Research Assistant · SAS: Secure attention sequence · SATAN: System Administrator Tool for Analyzing Networks · SB 1386 · SCA: Subordinate Certification Authority · Scan · Scanning · scareware · Scavenging · Scheduling · Scope Creep · Scoping Process · SCR: Screen Saver Files · Screamer · Screen Capture · Screen Grab · Screen Savers · Screen Scraping · Screen Widow · screened subnet · Screening router · Screening Routers · script kiddie · script kiddy · Script Vulnerability · Scripts · Scunthorpe Test · SD Card: Secure Digital Cardt · SDDL · SDK (Software Development Kit) · seat management · Sechole · Second Site · Secondary data uses · Secondary logon · secret key · secret key algorithm · Secret Key Encryption · Sector · Secure Area (on a system) · Secure Communications · Secure Electronic Transaction · Secure Hash Algorithm · Secure Hash Standard · Secure HTTP · Secure Shell · Secure Socket Shell · Secure Sockets Layer (SSL) · Secure State · Secure Subsystem · SecurID Token System · Security Accounts Manager · Security Accreditation Scheme · Security Administrator · Security Algorithms Group of Experts · Security Assertion Markup Language · Security Association · security audit · Security Awareness · Security Awareness Campaign · Security Awareness Coordinator · Security Awareness Program · Security Breach · security certification · security clearance · Security Configuration and Analysis · Security context · Security Controls · Security descriptor · Security Descriptor Definition Language · Security Fault Analysis · Security Features Users Guide · Security Filter · Security for Electronic Transactions SET · Security Forum · security ID · security identifier · Security In Depth · Security Incident · security information management (SIM) · Security Inspection · Security Kernel · Security Label · Security log · Security Management · Security Metrics · Security Net Control Station · Security Officer · Security Perimeter · Security Plan · security policy · Security principal · Security Procedures · Security Range · Security Requirements · Security Requirements Baseline · Security Risk · Security rollup package · Security Safeguards · Security Software · Security Specification · Security Specifications · Security Standards · Security Target · Security template · Security Test and Evaluation · Security Testing · security token · Security zone · SED · Seed Key · Segregation of Duties · Sender ID · sender permitted from · Sender Policy Framework · SendIP · Sensitive Compartmented Information · Sensitive Compartmented Information Facility · Sensitive data · Sensitive Information · Sensitive Personal Data · Sensitivity · Sensitivity Label · Separation of Duties · Sequence Check · Sequential File · Serial Processing · Serious Organized Crime Agency · Serpent · Server · server accelerator card · Server certificate · Service account · Service Bureau · Service Delivery Objective (SDO) · Service Desk · Service Level Agreement (SLA) · Service Level Agreement SLA · Service Order · Service pack · Service Packs · Service Provider · Service Set Identifier (SSID) · Service User · Serving Network · Servlet · Session · Session Border Controller (SBC) · Session Hijacking · session ID · session key · SET: Secure Electronic Transaction · SGC: Server gated cryptography · SHA or SHA 1: Secure Hash Algorithm · SHA 2 · shadow password file · Shadow Passwords · Share · Share level security · Shared Key Authentication (SKA) · Shared secret · Shareware · sheep · Sheep Dip · sheep dipping · Sheep Dipping or Sheepdip · sheepdip · sheepdip computer · Shell · shell command injection · Shell Programming · Shielded Enclosure · Short Message Service · Short Message Service Center · Short Title · shoulder surfing · ShowAcls · ShowPriv · SHS: Secure Hash Standard · SID · Sid2user · SID: security identifier (ID) · Sign Off · Sign on Procedure · Signaling System 7 · Signals Analysis · Signature · Signature Detection · Signed Response · Simple Fail over · Simple Integrity Property · Simple Mail Transport Protocol (SMTP) · Simple Object Access Protocol (SOAP) · Simple Security Property · Simulation · Single Point Keying · Single Point of Failure · single sign on · single sign on · single factor authentication (SFA) · Sircam · Site certificate · Six/Four · Sizing · Skipjack · Slack Time (Float) · Slag · slag code · Slammer · Slashdot Effect · SMARRT · smart building · smart card · smart home · smart home or building · Smartphone · SMB signing · SMBRelay · Smoke Emitting Diode · Smoke Test · SMS spam · SMTP (Simple Mail Transfer Protocol) · smurf · Smurf Attack · Smurfing · Snail Mail · snake oil · snarf attack · Sniff · Sniffer · sniffer keystroke logger · Sniffers · Sniffing · sniper sniffing robot · SNMP Attack · SNMP: Simple Network Management Protocol · snoop server · snooping · Snort · SnortSnarf · SOCA · Social engineering · social engineering · Socket · Socket Pair · SOCKS · Soft Copy · softlifting · Software · Software Assurance · Software Copyright · Software Inventory · Software Licensing · software piracy · Software Release · Software Support / Maintenance Contract · Software System Test And Evaluation Process · Software Version Control · SORM · Source code · Source Code Compare Programs · Source Documents · Source Lines of Code (SLOC) · Source Port · SP: Service pack · SPA: Security Posture Assessment · Spam · spam blog · spam cocktail · spam over Internet telephony · Spam trap · Spambot · Spamdexing · Spanning Port · Spanning Tree Protocol Manipulation · SPAP: Shiva PAP · Spar · spear phishing · spear phishing · spearphishing · Special Access Program · Special Access Program Facility · Special identities · SPF · SPF: Sender Policy Framework · SPI: Security Parameter Index · Spillage · spim · SPIM: Spam Through Instant Messaging · sPING · SPIT · SPIT: Spam over Internet Telephony · Split Data Systems · Split DNS · Split Horizon · Split Key · Split Knowledge · splog · Splog or Spam Blog · splogger · spoof · Spoof Mail · Spoof or Spoofing · Spoof website · spoofing · spoofing · Spool (Simultaneous Peripheral Operations Online) · Spot Check · Spread Spectrum · Spyware · SQL Injection · SRVTAB · SSCP: Systems Security Certified Practitioner · SSH · SSH: Secure Shell or Secure Socket Shell · SSID: Service Set Identifier · SSL accelerator · SSL card · SSL Card: Server Accelerator Card · SSL Man in the Middle Attacks · SSL VPN: Secure Socket Layer Virtual Private Network · SSL: Secure Sockets Layer · SSO · SSO: Single Sign On or Signon · SSO: System Security Officer · SSPI: Security support provider interface · SST virus · Stability · Stacheldraht · Stack Mashing · stack smashing · Stage Gate · Standard · Standard ACLs (Cisco) · Standing Data · Star Property · Star Topology · Start of Day · Start Up KEK · stateful inspection · Static Analysis · Static Host Tables · Statistical Sampling · stealth · Stealth Bomb · Stealth scanning · stealth virus · Stealthing · Steganalysis · steganographic · steganography · Stimulus · Storage Area Networks (SANs) · storage encryption · Storage Object · storage security · Store And Forward Switching · Store and Forward · Store and Forward Switch · STPP: Microsoft Strategic Technology Protection Program · Straight Through Cable · Strategic Planning · stream cipher · Strengths Weaknesses Opportunities and Threats ( · Stress Testing · Stripping · Strong Authentication · Strong encryption · strong password · Strong Star Property · Structured Programming · Structured Query Language (SQL) · Stunnel · Su · Sub Network · Subassembly · Subject · Subject Matter · Subject Security Level · Subnet Mask · Subordinate CA · Subscriber Controlled Input · Subscriber Identification Module · SubSeven · Substantive Testing · Sudo · Sufficient Audit Evidence · SUID root · Suit · Suite · Super Computer · Super User · Superencryption · Supersession · SuperUser · Supervisor State · Supply Chain Management (SCM) · Suppression · Suppression Measure · Surge Suppressor · Surgery · Surrogate Access · Survivability · SUS: Software Update Services · Suspense File · SVGA · Swatch · Sweeping · SWI: Secure Windows Initiative · Switch CAM Table Overflow · Switches · Switching System · Syllabary · symetric key · Symlink: Symbolic Links · Symmetric Cryptography · Symmetric Key · Symmetric key algorithm · Symmetric key encryption · Syn Attack · Syn Flood · SYN Flood or Syn Flooding · SYN flooding · Syn Scanning · Synchronize (SYN) · Synchronous Crypto Operation · Synchronous Transmission · SYNdrop · Syskey · Syslog · System · System Administrator · System Assets · System Availability · System development life cycle (SDLC) · System Development Methodologies · System disk · System Exit · System files · System Flowcharts · System Hardening · System High · System High Mode · System High Security Mode · System Indicator · System Integrity · System Integrity Service · System Low · System Low Security Mode · system monitor · System Narratives · System of Record · System Owner · System Profile · System registry · System registry key · System Requirements · System Security · System Security Engineering · System Security Officer · System Security Plan · System Software · System Testing · System Specific Policy · Systems Acquisition Process · Systems Analysis · Systems Development · Systems Development Life Cycle (SDLC) · systems management · Systems Operations ·

Research Portals and Glossary of 4,000 IT Security and Information Assurance Terms
A, B, C, D, E, F, G, H, I, J, K, L, M, N, O, P, Q, R, S, T, U, V, W, X, Y, Z


Top of Page

AIMLExchange

'Your Survival Network for The Brave New World Of Business'tm

About AIMLExchange | News About AIMLExchange

Terms of Use | Privacy Notice | © Copyright 1994-2019, Global Risk Management Network, New York, USA