-
-
- shadow password file
- In the Linux operating system, a shad...
- Shared Key Authentication
- Shared Key Authentication (...
- Shared Key Authentication (SKA)
- Shared Key Auth...
- sheep
- In biometric verification, a goat is a system end-user who is refus...
- sheep dipping
- In computers, a sheepdip (or, variously, sheep dipp...
- sheepdip
- In computers, a sheepdip (or, variously, sheep dipping or a f...
- sheepdip (sheep dipping or a footbath)
- sheepdip computer
- In computers, a sheepdip (or, variously, sh...
- short messaging service spam
- SMS spam (sometimes c...
- shoulder surfing
- Shoulder surfing is using direct observation ...
- SID
- In Windows NT and 2000 operating systems, the security identifier (SID)...
- SIM
- Security information management (SIM) is the practice of collecting, mo...
- SIM card
- A SIM card, also known as a subscriber identity module, is a ...
- single factor authentication
- Single-factor authent...
- single sign on
- Single sign-on (SSO)is a session/user authenticat...
- single sign-on
- Single sign-on (SSO)is a session/user authenticat...
- single sign-on (SSO)
- Single sign-on (SSO)is a session/user...
- single-factor authentication
- Single-factor authent...
- single-factor authentication (SFA)
- Single-fa...
- SIP trunking
- Session Initiation Protocol (SIP) trunking is the use...
- SIP trunking (Session Initiation Protocol trunk...
- SKA
- Shared Key Authentication (SKA) is a process by which a computer can ga...
- slag code
- In a computer program, a logic bomb, also called slag code,...
- smart building
- A smart home or building is a home or building, u...
- smart card
- A smart card is a plastic card about the size of a credit...
- smart home
- A smart home or building is a home or building, usually a...
- smart home or building
- A smart home or building is a hom...
- smart meter hack
- A smart meter hack is the unauthorized access...
- SMiShing
- SMiShing is a mobile phone security attack in which the user ...
- SMiShing (SMS phishing)
- SMiShing is a mobile phone secu...
- SMS phishing
- SMiShing is a mobile phone security attack in which t...
- SMS spam
- SMS spam (sometimes called cell phone spam) is any junk messa...
- SMS spam (cell phone spam or short messaging se...
- smurf
- A smurf attack is an exploitation of the Internet Protocol (IP) bro...
- smurf attack
- A smurf attack is an exploitation of the Internet Pro...
- smurfing
- A smurf attack is an exploitation of the Internet Protocol (I...
- snake oil
- In cryptographic and other computer products, snake oil is ...
- snarf attack
- Bluesnarfing is the theft of information from a wirel...
- sniffer keystroke logger
- A keylogger, sometimes called...
- snoop server
- A snoop server is a server that uses a packet sniffer...
- snooping
- Snooping, in a security context, is unauthorized access to an...
- Snort
- Snort is an open source network intrusion detection system (NIDS) c...
- SnortSnarf
- SnortSnarf is a program that was designed for use with Sn...
- SOCA
- The Serious Organized Crime Agency (SOCA) is a policing agency dedica...
- social engineering
- Social engineering is a term that describ...
- software piracy
- Software piracy is the illegal copying, distrib...
- spam blog
- A splog (spam blog) is a fake blog created solely to promot...
- spam cocktail
- A spam cocktail (or anti-spam cocktail) is the use ...
- spam cocktail (or anti-spam cocktail)
- A s...
- spam over Internet telephony
- SPIT (spam over Inter...
- spear phishing
- Spear phishing is an e-mail spoofing fraud attemp...
- spear-phishing
- Spear phishing is an e-mail spoofing fraud attemp...
- spearphishing
- Spear phishing is an e-mail spoofing fraud attempt ...
- SPF
- Sender Policy Framework (SPF) is an anti-spam approach in which the Int...
- spim
- Spim is spam delivered through instant messaging (IM) instead of thro...
- spim (instant messaging spam)
- Spim is spam delive...
- SPIT
- SPIT (spam over Internet telephony), sometimes known as vam (voice or...
- SPIT (spam over Internet telephony)
- SPIT (s...
- splog
- A splog (spam blog) is a fake blog created solely to promote affili...
- splog (spam blog)
- A splog (spam blog) is a fake blog created ...
- splogger
- A splog (spam blog) is a fake blog created solely to promote ...
- spoof
- Spoof was a game involving trickery and nonsense that was invented ...
- spoofing
- E-mail spoofing is the forgery of an e-mail header so that th...
- SSH
- Secure Shell (SSH), sometimes known as Secure Socket Shell, is a UNIX-b...
- SSL
- SSL (Secure Sockets Layer) is a commonly-used protocol for managing the...
- SSL card
- A server accelerator card (also known as an SSL card) is a Pe...
- SSO
- Single sign-on (SSO)is a session/user authentication process that permi...
- SST virus
- The Anna Kournikova VBS.SST computer virus, informally know...
- stack overflow
- A stack overflow is an undesirable condition in w...
- stack smashing
- Stack smashing is causing a stack in a computer a...
- stateful inspection
- Stateful inspection is a firewall techn...
- stealth
- In computing, stealth refers to an event, object, or file that ...
- stealth virus
- In computer security, a stealth virus is a computer...
- steganographic
- Steganography (pronounced STEHG-uh-NAH-gruhf-ee, ...
- steganography
- Steganography (pronounced STEHG-uh-NAH-gruhf-ee, fr...
- storage encryption
- Storage encryption is the use of encrypti...
- storage security
- Storage security is the group of parameters a...
- stream cipher
- A stream cipher is a method of encrypting text (to ...
- strong password
- A strong password is one that is designed to be...
- Stuxnet
- The Stuxnet worm is a rootkit exploit that targets Supervisory ...
- subscriber identity module
- A SIM card, also known as...
- symetric key
- A session key is an encryption and decryption key tha...
- symmetric algorithm
- A secret key algorithm (sometimes calle...
- SYN flooding
- SYN flooding is a method that the user of a hostile c...
- SYN scanning
- SYN scanning is a tactic that a malicious hacker (or ...
- system monitor
- A keylogger, sometimes called a keystroke logger,...
- systems management
- Systems management is the management of t...
- TACACS
- TACACS (Terminal Access Controller Access Control System) is an o...
- TACACS (Terminal Access Controller Access Contr...
- TACACS+
- TACACS (Terminal Access Controller Access Control System) is an...
- targeted attack
- A targeted attack is one that seeks to breach t...
- tarpitting
- Tarpitting is the practice of slowing the transmission of...
- TCB
- The trusted computing base (TCB) is everything in a computing system th...
- TCG
- The Trusted Computing Group (TCG) is a not-for-profit organization that...
- TCP session hijacking
- Session hijacking, also known as TC...
- TCP Wrapper
- TCP Wrapper is a public domain computer program that pr...
- tcpdump
- Tcpdump is an open source command-line tool for monitoring (sni...
- TDL-4
- TDL-4 is sophisticated malware that facilitates the creation and ma...
- TDL-4 (TDSS or Alureon)
- TDL-4 is sophisticated malware ...
- tdss
- TDL-4 is sophisticated malware that facilitates the creation and main...
- Tempest
- Tempest was the name of a classified (secret) U.S. government p...
- Tempest-shielding
- Tempest was the name of a classified (secre...