Screen scraping
Screen scraping: A technique used to extract data from the display output of a program or system. It involves capturing data from a screen interface and converting it into structured datasets. While screen scraping can be used for legitimate purposes like data aggregation and legacy system integration, it can also pose privacy risks if used […]
Secure Socket Layer (SSL)
Secure Socket Layer (SSL): A cryptographic protocol designed to provide secure communications over a computer network. SSL uses a combination of public key and symmetric key encryption to secure a connection between two machines, typically a web server and a client, over the internet. It was widely used for securing data transfer, ensuring the privacy […]
Screened host
Screened host: A host protected from external threats by a screening router to prevent unauthorized access and safeguard sensitive information. Examples include a server, database, or web application situated behind a screening router.
Secure State
Secure State: A condition in which an information system is safeguarded against unauthorized access, use, disclosure, disruption, modification, or destruction. It plays a vital role in security planning and risk management. Examples include maintaining the integrity and confidentiality of a computer system, network, or facility.
Screened subnet architecture
Screened subnet architecture: A network configuration that uses firewalls to create a “demilitarized zone” (DMZ), a separate subnet for public-facing servers. In this setup, one firewall sits between the internal network and the DMZ, and another firewall sits between the DMZ and the external network (e.g., the internet). This configuration allows public traffic to access […]
Secure Subsystem
Secure Subsystem: A subsystem of an information system designed to safeguard against unauthorized access, use, disclosure, disruption, modification, or destruction. It is integral to security architecture and includes components like firewalls, intrusion detection systems, and encryption algorithms.