The glossary

Cybersecurity Glossary

Learn about Cybrary's impact initiatives where we focus on reducing industry-wide gatekeeping, improving security teams, and making a difference throughout the cybersecurity industry and beyond.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Letter for filtering (will be hidden in prod) :

S

Secret Key Symmetric Cryptographic Algorithm

Secret key (symmetric) cryptographic algorithm is a cryptographic algorithm that uses a single secret key for both encryption and decryption. A cryptographic algorithm that uses a single key (i.e., a secret key) for both encryption and decryption.

Letter for filtering (will be hidden in prod) :

S

Shadow Password Files

Shadow password files are system files where encrypted user passwords are stored so that they aren’t available to people who try to break into the system.

Letter for filtering (will be hidden in prod) :

S

SQL Injection

SQL injection is a code injection technique that is used to attack data-driven applications, in which malicious or manipulative SQL statements are inserted into an entry field for execution.

Letter for filtering (will be hidden in prod) :

S

Steganography

Steganography is a technique used to hide the existence of a message, files, or any other information. The first recorded use of the term was in 1499 by Johannes Trithemius in his steganographia. This is different from cryptography, which hides the meaning of a message but does not hide the message itself. An example of a steganographic method is the invisible ink.

Letter for filtering (will be hidden in prod) :

S

Spanning Port

A spanning port is used to configure the switch to behave like a hub for a specific port.

Letter for filtering (will be hidden in prod) :

S

Stack Smashing

Stack smashing is used to cause a stack in a computer application or operating system to overflow. This makes it possible to weaken the program or system or cause it to crash. The stack is also called a pushdown stack or first-in last-out circuit. It is a form of buffer that holds the intermediate results of an operation or data that is awaiting processing.

Letter for filtering (will be hidden in prod) :

S

Stateful Inspection

Stateful inspection is also known as dynamic packet filtering. It is a firewall technology that monitors the state of active connections and uses this information to determine which network packets to allow through the firewall.

Letter for filtering (will be hidden in prod) :

S

Strong Star Property

In strong star property, a user cannot write data to higher or lower classifications levels than their own.

Letter for filtering (will be hidden in prod) :

S

Syn Flood

A syn flood is a type of denial-of-service attack in which an attacker sends a succession of syn requests to a target’s system in an attempt to consume enough server resources to make the system unresponsive to legitimate traffic.

Letter for filtering (will be hidden in prod) :

S

State Machine

A state machine is any device that stores the status of something at a given time and can operate on input to change the status and cause an action to take place for any given change. A computer is basically a state machine and each machine instruction is input that changes one or more states and may cause other actions to take place. Each computer’s data register stores a state. The read-only memory from which a boot program is loaded stores a state.