The Cyber Glossary: Comprehensive Cybersecurity Terms
Browse alphabetically or search directly for the cybersecurity terms your team needs right now.Learn more about our mission.
S
- S/MIME(Secure/Multipurpose Internet Mail Extensions)
- S/MIME Certificate Association (Resource Record)Definition
- SA(System Administrator)
- SA&A(Security Assessment and Authorization)
- SAC(Security Advisory Committee)
- SafeguardsDefinition
- SANS(SysAdmin, Audit, Network, and Security)
- SCADA(Supervisory Control and Data Acquisition)
- SCADA Security Scientific SymposiumDefinition
- ScalabilityDefinition
- Scalability TestingDefinition
- scarewareDefinition
- ScenarioDefinition
- Scenario TestDefinition
- SCIF(Sensitive Compartmented Information Facility)
- SCIP(Standing Committee for Information Policy)
- SCP(Secure Copy Protocol)
- ScriptDefinition
- Scripting LanguageDefinition
- SECaaS(Security as a Service)
- SecDevOps(Sec Development Operations)
- SecOpsDefinition
- Secret KeyDefinition
- Securely ProvisionDefinition
- Security AutomationDefinition
- Security IncidentDefinition
- Security PolicyDefinition
- Security Program ManagementDefinition
- selectDefinition
- SFS(Secure File System)
- SHA(Secure Hash Algorithm)
- SHA-1(Secure Hash Algorithm 1)
- SHA-2(Secure Hash Algorithm 2)
- SHA-256(Secure Hash Algorithm 256-bit)
- SHA-256/192(M)(Secure Hash Algorithm 256-bit truncated to 192 bits)
- SHA-3(Secure Hash Algorithm-3)
- SIEM(Security Information and Event Management)
- SignatureDefinition
- SIGSEDefinition
- Simple Mail Transfer ProtocolDefinition
- Simple Network Time ProtocolDefinition
- Single Sign-On(Single Sign-On)
- Situational AwarenessDefinition
- SkillDefinition
- SkimmingDefinition
- SKL(Simple Key Loader)
- SKU(Stock Keeping Unit)
- SLA(Service Level Agreement)
- SlowLorisDefinition
- Small and Medium-size BusinessDefinition
- Small BusinessDefinition
- Small Business AdministrationDefinition
- Small Business Innovation ResearchDefinition
- Small Computer System Interface(Small Computer System Interface)
- SMAP(Security Management and Analytics Platform)
- Smart CardDefinition
- Smart Card Enabled Physical Access Control SystemDefinition
- SMB(Server Message Block)
- SMBIOS(System Management BIOS)
- SMBus(System Management Bus)
- SME(Subject Matter Expert)
- SMIMEA(S/MIME Association)
- SmishingDefinition
- SMS(Short Message Service)
- SMS ChatDefinition
- SMTP(Simple Mail Transfer Protocol)
- SnapshotDefinition
- SnifferDefinition
- SNMP(Simple Network Management Protocol)
- SO/DEVDefinition
- SoC(Security Operations Center)
- Social EngineeringDefinition
- SoD(Separation of Duties)
- Software AssuranceDefinition
- Software Assurance and Security EngineeringDefinition
- SpamDefinition
- SPDM(Security Protocol and Data Model)
- Spear PhishingDefinition
- SpideringDefinition
- SpillageDefinition
- SpoofingDefinition
- SpywareDefinition
- SQL(Structured Query Language)
- SQL InjectionDefinition
- SRD(Software Requirements Document)
- SSH(Secure Shell)
- SSH Client(Secure Shell Client)
- SSH Key(Secure Shell Key)
- SSH ServerDefinition
- SSID(Service Set Identifier)
- SSL(Secure Sockets Layer)
- SSL/TLS(Secure Sockets Layer / Transport Layer Security)
- SSN(Social Security Number)
- SSO(Single Sign-On)
- SSP(System Security Plan)
- STaaS(Storage as a Service)
- StatefulDefinition
- Stateful InspectionDefinition
- Stateful Protocol AnalysisDefinition
- StatelessDefinition
- Stateless InspectionDefinition
- Stateless Transport TunnelingDefinition
- STEM(Science, Technology, Engineering, and Mathematics)
- Strategic Planning and Policy DevelopmentDefinition
- SubjectDefinition
- SUID(Set User ID)
- superuserDefinition
- Supervisory Control and Data Acquisition(Supervisory Control and Data Acquisition)
- Supply ChainDefinition
- Supply Chain Risk ManagementDefinition
- SVM(Support Vector Machine)
- SwitchDefinition
- Switched Port AnalyzerDefinition
- SwitchportDefinition
- symmetric cryptographyDefinition
- Symmetric Encryption AlgorithmDefinition
- symmetric keyDefinition
- SysOpDefinition
- System AdministrationDefinition
- System IntegrityDefinition
- Systems DevelopmentDefinition
- Systems Requirements PlanningDefinition
- Systems Security AnalysisDefinition
- Systems Security ArchitectureDefinition