The glossary

Cybersecurity Glossary

Learn about Cybrary's impact initiatives where we focus on reducing industry-wide gatekeeping, improving security teams, and making a difference throughout the cybersecurity industry and beyond.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Letter for filtering (will be hidden in prod) :

S

Security Control Inheritance

Security control inheritance is a situation in which an information system or application receives protection from security controls (or portions of security controls) that are developed, implemented, assessed, authorized, and monitored by entities other than those responsible for the system or application; entities either internal or external to the organization where the system or application resides. See common control.

Letter for filtering (will be hidden in prod) :

S

Security Information and Event Management

Security information and event management (SIEM) tool is an application that provides the ability to gather security data from information system components and present that data as actionable information via a single interface.

Letter for filtering (will be hidden in prod) :

S

Secure Hash Algorithm (SHA)

Secure hash algorithm (SHA) is a hash algorithm with the property that is computationally infeasible 1) to find a message that corresponds to a given message digest, or 2) to find two different messages that produce the same message digest.

Letter for filtering (will be hidden in prod) :

S

Security Filter

Security filter is a secure subsystem of an information system that enforces security policy on the data passing through it.

Letter for filtering (will be hidden in prod) :

S

Security Test Evaluation (STE)

A security test and evaluation (STE) is an examination and analysis of the safeguards required to protect an information system, as they have been applied in an operational environment, to determine the security posture of that system.

Letter for filtering (will be hidden in prod) :

S

Security Testing

Security testing is the process to determine that an information system protects data and maintains functionality as intended.

Letter for filtering (will be hidden in prod) :

S

Secure Electronic Transactions (SET)

A secure electronic transaction (SET) is a communications protocol standard for securing credit card transactions over insecure networks. Set ensures that all parties (customers, merchant, and bank) are authenticated using digital signatures, encryption protects the message and provides integrity, and provides end-to-end security for credit card transactions online.

Letter for filtering (will be hidden in prod) :

S

Secret Seed

A secret seed is a secret value used to initialize a pseudorandom number generator.

Letter for filtering (will be hidden in prod) :

S

Secure Shell (SSH)

A secure shell (SSH) is also known as a secure socket shell. SSH is a unix-based command interface and protocol used to log into another computer over a network, to execute commands in a remote machine, and to move files from one machine to another.

Letter for filtering (will be hidden in prod) :

S

Secure Communications

Secure communications are telecommunications deriving security through use of NSA-approved products and/or protected distribution systems. Configuring and operating DNS servers so that the security goals of data integrity and source authentication are achieved and maintained.