Target

Target: A specific entity or system that is the focus of an attack or a security measure. It is a common term in the field of cybersecurity, where targets can include individuals, organizations, networks, or devices. Examples include targeting a specific individual’s email account for a phishing attack or targeting a company’s network for a […]

Structured walkthrough

Structured walkthrough: A comprehensive review process where the creators of a product or solution present it to their peers for critique and validation. In the context of security, it might involve walking through a new security protocol, a system design, or a piece of code to identify potential flaws or vulnerabilities. This practice promotes quality […]

Supervisory Control and Data Acquisition (SCADA)

Supervisory Control and Data Acquisition (SCADA): A type of industrial control system that is used to monitor and control infrastructure processes. It is widely used in industries like water treatment, energy, oil and gas, and transportation to gather and analyze real-time data. Given the critical nature of these systems, SCADA security is a major concern, […]

Suppression measures

Suppression measures: Actions or techniques designed to prevent, reduce, or eliminate unwanted behavior or occurrences. In a security context, it can include methods used to counteract potential threats or to minimize the impact of a security incident. These measures could range from firewalls and antivirus software that suppress malicious activity to disaster recovery plans that […]

Surge suppressor

Surge suppressor: A device that protects electronic equipment from voltage spikes or surges. It is commonly used in homes and businesses to protect computers and other sensitive equipment from damage. Examples include a surge protector strip for a computer, a whole-house surge protector for a home’s electrical system, and a surge protector for a commercial […]

Structured Query Language (SQL) Injection Attack

Structured Query Language (SQL) Injection Attack: A type of cyber-attack that exploits vulnerabilities in a website’s database by injecting malicious SQL code. It is used to gain unauthorized access to sensitive data, modify or delete it, or create new user accounts with elevated privileges. Examples of SQL injection attacks include inserting a malicious query into […]