Glossary of Cyber Security Terms

Essential Vocabulary for Navigating the World of Cyber Security

S

S Key

S Key is a cybersecurity protocol using cryptographic hash functions to create a series of unique 64-bit passwords for remote logins. The client generates a one-time password by repeatedly applying the MD4 cryptographic hash function to the user's secret key, reducing the number of hash applications with each successive user authentication.

Safety

In the cybersecurity context, safety denotes the necessity to safeguard all associated parties, including employees, customers, and visitors, from potential harm.

Scavenging

Scavenging refers to the clandestine practice of examining residual data in a system to obtain unauthorized access to confidential information.

Secure Electronic Transactions (SET)

SET is a protocol specifically designed to secure online credit card transactions. It employs digital signatures for customer, merchant, and bank authentication, while encryption secures the message and maintains its integrity, ensuring end-to-end security.

Secure Shell (SSH)

SSH is a security protocol that allows a user to remotely access another computer over a network, execute commands, and transfer files between machines.

Secure Sockets Layer (SSL)

SSL, developed by Netscape, is a protocol for transmitting private documents over the Internet. SSL uses a public key to encrypt data transferred over the SSL connection.

Security Policy

A security policy consists of rules and practices that dictate or regulate how a system or organization provides security services to safeguard sensitive and critical system resources.

Segment

In terms of TCP IP communication, a segment refers to a single TCP data packet.

Sensitive Information

As per federal government definitions, sensitive information is any non-classified information that, if compromised, could adversely impact the national interest or the execution of federal programs.

Separation of Duties

Separation of duties is a principle of dividing privileges across multiple individuals or systems to enhance security and accountability.

Server

In network communication, a server is a system entity that responds to requests from clients by providing a service.

Session

In network parlance, a session signifies a virtual connection between two hosts through which network traffic is transmitted.

Session Hijacking

Session hijacking refers to unauthorized takeover of a session established by someone else, often with malicious intent.

Session Key

In symmetric encryption, a session key is a temporary key used for a relatively short period. It is typically used for a single connection or transaction set, or to protect large amounts of data that need frequent re-keying.

SHA1

SHA1 is a one-way cryptographic hash function often used in securing data and verifying file integrity. It's similar to MD5 but provides a stronger hash value.

Shadow Password Files

Shadow password files are system files in which encrypted user passwords are stored, thereby shielding them from unauthorized access.

Share

In a networked environment, a share refers to a resource, such as a directory or a printer, made available (or "shared") on a machine.

Shell

In Unix systems, the shell acts as an interactive user interface with the operating system. It interprets and executes user commands. In some systems, it's known as a command interpreter.

Signals Analysis

Signals analysis involves monitoring and analyzing system-emitted signals carrying data to indirectly understand the communicated information.

Signature

In cybersecurity, a signature refers to a distinctive pattern in network traffic that can be linked to a specific tool or exploit.

Simple Integrity Property

In the context of information security, the Simple Integrity Property rule states that a user cannot write data to a higher integrity level than their own.

Simple Network Management Protocol (SNMP)

SNMP is a set of protocols governing network management and the monitoring of network devices and their functions.

Simple Security Property

The Simple Security Property principle states that a user cannot read data classified at a higher level than their own.

Smartcard

A smartcard is a portable device, like an electronic card, equipped with a magnetic strip or chip capable of recording and replaying a predetermined key.

Smurf Attack

A smurf attack is a type of DDoS attack that spoofs the target's address and pings the broadcast address of a remote network, resulting in a significant amount of ping replies flooding the target.

Sniffer

A sniffer is a software tool that monitors and analyzes network traffic as it is received on a network interface.

Sniffing

Also known as "passive wiretapping," sniffing refers to the practice of silently monitoring network traffic, often for malicious purposes.

Social Engineering

Social engineering encompasses non-technical or low-technology strategies, including lies, impersonation, tricks, bribes, blackmail, and threats, employed to exploit information systems.

Socket

In network communication, a socket instructs a host's IP stack where to connect a data stream to ensure it links to the correct application.

Socket Pair

A socket pair uniquely identifies a connection by specifying the source IP address, source port, destination IP address, and destination port.

SOCKS

SOCKS is a protocol that a proxy server can use to accept and forward client users' requests across the Internet. SOCKS uses sockets to represent and track individual connections.

Software

Software refers to computer programs and associated data, which are stored and executed by computer hardware. The data can be dynamically written or modified during execution.

Source Port

A source port is the port a host uses to connect to a server. It is usually a random number greater than or equal to 1024 and changes with each connection.

Spam

Spam refers to unsolicited digital communications, often in the form of emails or newsgroup postings, typically sent in bulk for advertising or phishing purposes.

Spanning Port

In network switching, a spanning port setting makes a switch behave like a hub for a specific port.

Split Horizon

Split horizon is an algorithm designed to prevent routing loops by omitting routes in updates sent to the gateway from which they were learned.

Split Key

A split key is a cryptographic key partitioned into two or more data items. Each item individually offers no knowledge of the complete key derived from combining them.

Spoof

Spoofing involves an unauthorized entity attempting to gain system access by impersonating an authorized user.

SQL Injection

SQL injection is a type of security exploit in which an attacker inserts malicious SQL code into application queries to manipulate a database.

Stack Mashing

Stack mashing is a technique used by cyber attackers to exploit buffer overflow vulnerabilities, tricking a computer into executing arbitrary code.

Standard ACLs (Cisco)

In Cisco's infrastructure, standard Access Control Lists (ACLs) make packet filtering decisions based on the source IP address alone.

Star Property

Star property, also known as the "*-property" or "confidentiality property," states that a user can't write data to a lower classification level without logging in at that lower classification level.

State Machine

A state machine is a system that sequentially progresses through a series of conditions or states.

Stateful Inspection

Stateful inspection, also referred to as dynamic packet filtering, is a firewall architecture that works at the network layer. It inspects not just the packet header information but also the packet contents up to the application layer, providing a more comprehensive understanding of the packet than static packet filtering.

Static Host Tables

Static host tables are text files containing mappings of hostnames and addresses.

Static Routing

Static routing implies that routing table entries are fixed and do not change dynamically.

Stealthing

Stealthing refers to techniques used by malicious software to conceal its presence on the infected system.

Steganalysis

Steganalysis involves the detection and defeat of steganography, the practice of concealing a message or data within another non-secret message or data.

Steganography

Steganography involves concealing the existence of data within another data. Unlike cryptography, which obfuscates the meaning of a message, steganography hides the existence of the message itself.

Stimulus

In network terminology, a stimulus refers to network traffic that initiates a connection or provokes a response.

Store-and-Forward

Store-and-forward is a switching method where a switch reads the entirety of a packet to ensure it is intact before forwarding it to its destination.

Straight-Through Cable

A straight-through cable is a type of networking cable in which the connector pins at one end are wired directly to the same pins at the other end. It is primarily used for interconnecting network nodes.

Stream Cipher

A stream cipher is a method of encryption that encrypts a message one bit, byte, or computer word at a time, providing real-time data encryption.

Strong Star Property

In the Strong Star Property concept, a user cannot write data to higher or lower classification levels than their own, ensuring secure information handling.

Sub Network

A sub network, or subnet, is an independently identifiable portion of a larger network. It typically represents a certain limited number of host computers, the hosts in a specific building or geographic area, or the hosts on an individual local area network.

Subnet Mask

A subnet mask is a 32-bit number used to delineate the number of bits used for the subnet and host portions of an address.

Switch

A network switch is a device that keeps a record of the MAC addresses linked to each of its ports, ensuring data is only transmitted to the intended recipient.

Switched Network

A switched network is a communications network where any user may be connected to any other user through the use of message, circuit, or packet switching and control devices.

Symbolic Links

Symbolic links, or symlinks, are special files that point to another file or directory, serving as shortcuts or references.

Symmetric Cryptography

Symmetric cryptography is a branch of cryptography featuring algorithms that use the same key for two different steps of the algorithm (such as encryption and decryption). Also known as secret-key cryptography, symmetric cryptography involves shared keys between the entities involved.

Symmetric Key

A symmetric key is a cryptographic key used in a symmetric cryptographic algorithm.

SYN Flood

A SYN flood is a type of denial-of-service attack that overloads a target by sending more TCP SYN packets (requests to synchronize sequence numbers when opening a connection) than the protocol implementation can handle.

Synchronization

In networking, synchronization is a unique bit pattern that network hardware seeks to signal the start of a frame.

Syslog

Syslog is a standard for message logging in Unix-based systems, providing a mechanism for collecting and storing log data on a centralized server.

System Security Officer (SSO)

A System Security Officer is an individual responsible for enforcing or administering the security policy applicable to a particular system.

System-Specific Policy

A system-specific policy is a policy written explicitly for a particular system or device, setting guidelines and rules specific to its operation and security.