The glossary

Cybersecurity Glossary

Learn about Cybrary's impact initiatives where we focus on reducing industry-wide gatekeeping, improving security teams, and making a difference throughout the cybersecurity industry and beyond.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Letter for filtering (will be hidden in prod) :

S

Safeguards

Safeguards are protective measures prescribed to meet the security requirements (i.e., confidentiality, integrity, and availability) specified for an information system. Safeguards may include security features, management constraints, personnel security, and security of physical structures, areas, and devices. Synonymous with security controls and countermeasures.

Letter for filtering (will be hidden in prod) :

S

Security Goals

Security goals are the five security goals are confidentiality, availability, integrity, accountability, and assurance.

Letter for filtering (will be hidden in prod) :

S

Secure State

Secure state is a condition in which no subject can access any object in an unauthorized manner.

Letter for filtering (will be hidden in prod) :

S

Security Content Automation Protocol (SCAP)

Security content automation protocol (SCAP) is a method for using specific standardized testing methods to enable automated vulnerability management, measurement, and policy compliance evaluation against a standardized set of security requirements.

Letter for filtering (will be hidden in prod) :

S

Social Engineering

Social engineering is a non-technical technique that intrusion hackers commonly use. This approach relies on human interaction and often involves tricking people into breaking normal security procedures.

Letter for filtering (will be hidden in prod) :

S

Scavenging

Scavenging is the process of searching through data residue in a system or a network to gain unauthorized knowledge of sensitive information.

Letter for filtering (will be hidden in prod) :

S

Separation of Duties (SOD)

Separation of duties (SOD) is also known as “segregation of duties”. It is based on the principle of splitting privileges among multiple individuals or systems.

Letter for filtering (will be hidden in prod) :

S

Security Net Control System

A security net control system is a management system overseeing and controlling implementation of network security policy.

Letter for filtering (will be hidden in prod) :

S

Security Attribute

A security attribute is a security-related quality of an object. Security attributes may be represented as hierarchical levels, bits in a bit map, or numbers. Compartments, caveats, and release markings are examples of security attributes. A security attribute is also an abstraction representing the basic properties or characteristics of an entity with respect to safeguarding information; typically associated with internal data structures (e.g., records, buffers, files) within the information system which are used to enable the implementation of access control and flow control policies; reflect special dissemination, handling, or distribution instructions; or support other aspects of the information security policy.

Letter for filtering (will be hidden in prod) :

S

Signature

A signature is a distinct pattern in network traffic that can be identified by a specific tool.