-
-
- screened subnet
- A screened subnet (also known as a 'triple-home...
- screened subnet (triple-homed firewall)
- script kiddie
- Script kiddy (sometimes spelled kiddie) is a deroga...
- script kiddy
- Script kiddy (sometimes spelled kiddie) is a derogati...
- script kiddy (or script kiddie)
- Script kiddy (s...
- SDDL
- Security Descriptor Definition Language (SDDL) is a formal way to spe...
- seat management
- Seat management is a method of coordinating all...
- Seclore Technology (Seclore)
- Seclore Technology is...
- secret key
- In cryptography, a private or secret key is an encryption...
- secret key algorithm
- A secret key algorithm (sometimes cal...
- secret key algorithm (symmetric algorithm)
- Secure Electronic Transaction
- Secure Electronic T...
- Secure Electronic Transaction (SET)
- Secure ...
- Secure HTTP
- S-HTTP (Secure HTTP) is an extension to the Hypertext T...
- Secure Shell
- Secure Shell (SSH), sometimes known as Secure Socket ...
- Secure Shell (SSH)
- Secure Shell (SSH), sometimes known as Se...
- Secure Socket Shell
- Secure Shell (SSH), sometimes known as ...
- Secure Sockets Layer virtual private network
- security
- In information technology, security is the protection of info...
- Security Accounts Manager
- The Security Accounts Manag...
- Security Accounts Manager (SAM)
- The Security Ac...
- Security as a Service
- Security-as-a-service (SaaS) is an ...
- Security as a Service (SaaS)
- Security-as-a-service...
- Security Assertion Markup Language
- SAML (Sec...
- security audit
- A security audit is a systematic evaluation of th...
- security awareness training
- Security awareness trai...
- security certification
- The Certified Information Systems...
- security clearance
- A security clearance is an authorization ...
- Security definitions
- This is a WhatIs.com glossary for som...
- Security Descriptor Definition Language
- Security Descriptor Definition Language (SDDL)
- security event (security incident)
- A securit...
- security ID
- In Windows NT and 2000 operating systems, the security ...
- security identifier
- In Windows NT and 2000 operating system...
- security identifier (SID)
- In Windows NT and 2000 oper...
- security information and event management (SIEM)
- security information management
- Security inform...
- security information management (SIM)
- Sec...
- Security Learning Guides
- We've gathered a collection o...
- security policy
- In business, a security policy is a document th...
- Security Quizzes
- We've gathered a collection of our quizzes on...
- security token
- A security token (sometimes called an authenticat...
- security token (authentication token)
- A s...
- Security Trust and Assurance Registry
- The...
- Security, Trust and Assurance Registry (STAR)
- Sender ID
- Sender ID is Microsoft's proposed e-mail sender authenticat...
- sender permitted from
- Sender Policy Framework (SPF) is an...
- Sender Policy Framework
- Sender Policy Framework (SPF) i...
- Sender Policy Framework (SPF)
- Sender Policy Frame...
- Sensitive Personal Data
- Consumer privacy, also known as...
- Serious Organized Crime Agency
- The Serious Organ...
- Serious Organized Crime Agency (SOCA)
- The...
- server accelerator card
- A server accelerator card (also...
- server accelerator card (SSL card)
- A server ...
- session ID
- A session ID is a unique number that a Web site's server ...
- session key
- A session key is an encryption and decryption key that ...
- SET
- Secure Electronic Transaction (SET) is a system for ensuring the securi...
- SFA
- Single-factor authentication (SFA) is the traditional security process ...
- shadow IT (shadow information technology)
- shadow password file
- In the Linux operating system, a shad...
- Shared Key Authentication
- Shared Key Authentication (...
- Shared Key Authentication (SKA)
- Shared Key Auth...
- sheep
- In biometric verification, a goat is a system end-user who is refus...
- sheep dipping
- In computers, a sheepdip (or, variously, sheep dipp...
- sheepdip
- In computers, a sheepdip (or, variously, sheep dipping or a f...
- sheepdip (sheep dipping or a footbath)
- sheepdip computer
- In computers, a sheepdip (or, variously, sh...
- shell command injection
- Command injection is the insert...
- short messaging service spam
- SMS spam (sometimes c...
- shoulder surfing
- Shoulder surfing is using direct observation ...
- SID
- In Windows NT and 2000 operating systems, the security identifier (SID)...
- SIM
- Security information management (SIM) is the practice of collecting, mo...
- single factor authentication
- Single-factor authent...
- single sign on
- Single sign-on (SSO)is a session/user authenticat...
- single sign-on
- Single sign-on (SSO)is a session/user authenticat...
- single sign-on (SSO)
- Single sign-on (SSO)is a session/user...
- single-factor authentication
- Single-factor authent...
- single-factor authentication (SFA)
- Single-fa...
- SKA
- Shared Key Authentication (SKA) is a process by which a computer can ga...
- slag code
- In a computer program, a logic bomb, also called slag code,...
- smart building
- A smart home or building is a home or building, u...
- smart card
- A smart card is a plastic card about the size of a credit...
- smart home
- A smart home or building is a home or building, usually a...
- smart home or building
- A smart home or building is a hom...
- smart label
- A smart label is a slip of paper, plastic or other mate...
- smart meter hack
- A smart meter hack is the unauthorized access...
- SMS spam
- SMS spam (sometimes called cell phone spam) is any junk messa...
- SMS spam (cell phone spam or short messaging se...
- smurf
- A smurf attack is an exploitation of the Internet Protocol (IP) bro...
- smurf attack
- A smurf attack is an exploitation of the Internet Pro...
- smurfing
- A smurf attack is an exploitation of the Internet Protocol (I...
- snake oil
- In cryptographic and other computer products, snake oil is ...
- snarf attack
- Bluesnarfing is the theft of information from a wirel...
- sniffer keystroke logger
- A keylogger, sometimes called...
- sniper-sniffing robot
- A sniper-sniffing robot is a tactic...
- snoop server
- A snoop server is a server that uses a packet sniffer...
- snooping
- Snooping, in a security context, is unauthorized access to an...
- Snort
- Snort is an open source network intrusion detection system (NIDS) c...
- SnortSnarf
- SnortSnarf is a program that was designed for use with Sn...
- SOCA
- The Serious Organized Crime Agency (SOCA) is a policing agency dedica...
- softlifting
- Softlifting is a common type of software piracy in whic...
- software piracy
- Software piracy is the illegal copying, distrib...
- SOP
- The Same Origin Policy (SOP), also called Single Origin Policy, is a se...