S - Definitions

Search Definitions
  • S

    salt

    In password protection, salt is a random string of data used to modify a password hash.

  • Same Origin Policy (SOP)

    The Same Origin Policy (SOP), also called Single Origin Policy, is a security measure used in Web browser programming languages such as JavaScript and Ajax to protect the confidentiality and integrity of information.

  • SAML (Security Assertion Markup Language)

    The Security Assertion Markup Language (SAML) is an open standard for sharing security information about identity, authentication and authorization across different systems.

  • sandbox (computer security)

    A sandbox is an isolated testing environment that enables users to run programs or execute files without affecting the application, system or platform on which they run.

  • screened subnet (triple-homed firewall)

    A screened subnet (also known as a 'triple-homed firewall') is a network architecture that uses a single firewall with three network interfaces... (Continued)

  • secret key algorithm (symmetric algorithm)

    A secret key algorithm (sometimes called a symmetric algorithm) is a cryptographic algorithm that uses the same key to encrypt and decrypt data.

  • Secure Shell (SSH)

    SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system administrators, a secure way to access a computer over an unsecured network.

  • security

    Security, in information technology (IT), is the defense of digital information and IT assets against internal and external, malicious and accidental threats.

  • security analytics

    Security analytics is an approach to cybersecurity that uses data collection, data aggregation and analysis tools for threat detection and security monitoring.

  • Security as a Service (SaaS)

    Security-as-a-service (SaaS) is an outsourcing model for security management. Typically, Security as a Service involves applications such as anti-virus software delivered over the Internet but the term can also refer to security management provided in-house by an external organization.

  • security awareness training

    Security awareness training is a formal process for educating employees about corporate policies and procedures for working with information technology (IT).

  • security clearance

    A security clearance is an authorization that allows access to information that would otherwise be forbidden.

  • security debt

    Security debt is a variant of technical debt that occurs when organizations do not invest enough money or resources into security efforts upfront. The term compares the pressures of monetary debt with the long-term burden developers and IT teams face when security shortcuts are taken.

  • security identifier (SID)

    In Windows NT and 2000 operating systems, the security identifier (SID) is a unique alphanumeric character string that identifies each operating system and each user in a network of NT/2000 systems.

  • security information and event management (SIEM)

    Security information and event management (SIEM) is an approach to security management that combines SIM (security information management) and SEM (security event management) functions into one security management system.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close