The glossary
Cybersecurity Glossary
Learn about Cybrary's impact initiatives where we focus on reducing industry-wide gatekeeping, improving security teams, and making a difference throughout the cybersecurity industry and beyond.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Letter for filtering (will be hidden in prod) :
S
Secure Sockets Layer (SSL)
A secure sockets layer (SSL) is the standard security technology for establishing an encrypted link between a web server and a browser. SSL was developed by Netscape for transmitting private documents via the internet.
Letter for filtering (will be hidden in prod) :
S
Security Safeguards
Security safeguards are protective measures and controls prescribed to meet the security requirements specified for an information system. Safeguards may include security features, management constraints, personnel security, and security of physical structures, areas, and devices.
Letter for filtering (will be hidden in prod) :
S
Scanning
Scanning is sending packets or requests to another system to gain information to be used in a subsequent attack.
Letter for filtering (will be hidden in prod) :
S
Security Requirements Baseline
Security requirements baseline is the description of the minimum requirements necessary for an information system to maintain an acceptable level of risk.
Letter for filtering (will be hidden in prod) :
S
Simple Security Property
In simple security property, a user cannot read data of a higher classification than their own.
Letter for filtering (will be hidden in prod) :
S
Security Inspection
A security inspection is the examination of an information system to determine compliance with security policy, procedures, and practices.
Letter for filtering (will be hidden in prod) :
S
Security Controls
Security controls are the management, operational, and technical controls (i.e., safeguards or countermeasures) prescribed for an information system to protect the confidentiality, integrity, and availability of the system and its information.
Letter for filtering (will be hidden in prod) :
S
Sniffing
Sniffing is also known as passive wiretapping. Packet sniffing allows individuals to capture data as it is transmitted over a network. Packet sniffer programs are used by network professionals to diagnose network issues and by malicious users to capture unencrypted data like passwords and usernames in network traffic. Once this information is captured, the user can then gain access to the system or network.
Letter for filtering (will be hidden in prod) :
S
Security Relevant Information
Security relevant information is any information within the information system that can potentially impact the operation of security functions in a manner that could result in failure to enforce the system security policy or maintain isolation of code and data.
Letter for filtering (will be hidden in prod) :
S
Security Control Baseline
A security control baseline is the set of minimum security controls defined for a low-impact, moderate-impact, or high-impact information system. One of the sets of minimum security controls defined for federal information systems in NIST special publication 800-53 and CNSS instruction 1253.