The glossary

Cybersecurity Glossary

Learn about Cybrary's impact initiatives where we focus on reducing industry-wide gatekeeping, improving security teams, and making a difference throughout the cybersecurity industry and beyond.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Letter for filtering (will be hidden in prod) :

S

Static Routing

Static routing is a form of routing that occurs when a router uses a manually-configured routing entry, rather than information from a dynamic routing traffic. Static routing can also be used in stub networks, or to provide a gateway of last resort.

Letter for filtering (will be hidden in prod) :

S

Socket Pair

A socket pair is a way to uniquely specify a connection, i.e., source ip address, source port, destination ip address, destination port.

Letter for filtering (will be hidden in prod) :

S

Syslog

A syslog is a widely used standard for message logging facility in unix systems. It permits separation of the software that generates messages, the system that stores them, and the software that reports and analyzes them.

Letter for filtering (will be hidden in prod) :

S

Switched Network

A switched network is a fully switched network in a computer network that uses only network switches rather than network hubs on ethernet local area networks. The switches allow for a dedicated connection to each workstation. A switch allows for many conversations to occur simultaneously.

Letter for filtering (will be hidden in prod) :

S

Synchronization

Synchronization is the signal made up of a distinctive pattern of bits that network hardware looks for to signal that start of a frame. Synchronization refers to one of two distinct but related concepts: synchronization of processes, and synchronization of data.

Letter for filtering (will be hidden in prod) :

S

Switch

A switch is also called switching hub, bridging hub, officially mac bridge. It is a computer networking device that connects devices together on a computer network by using packet switching to receive, process and forward data to the destination device.

Letter for filtering (will be hidden in prod) :

S

Symbolic Links

Symbolic links are sometimes also known as symlinks. Symbolic links are essentially advanced shortcuts that point to another file.

Letter for filtering (will be hidden in prod) :

S

Straight Through Cable

A straight-through cable is a type of twisted pair cable that is used in local area networks to connect a computer to a network hub such as a router. This type of cable is also sometimes called a patch cable and is an alternative to wireless connections where one or more computers access a router through a wireless signal.

Letter for filtering (will be hidden in prod) :

S

Split Key

A split key is a cryptographic key that is divided into two or more separate data items that individually convey no knowledge of the whole key or information that results from combining the items.

Letter for filtering (will be hidden in prod) :

S

System-Specific Policy

A system-specific policy is a policy written for a specific system or device and may change with changes in the system or device, its functionality, or its vulnerabilities.