Shoulder surfing

Shoulder surfing: The act of obtaining sensitive information such as passwords, PINs, or security codes by directly observing someone as they enter the information into a device. This could be done at close range (literally looking over someone’s shoulder) or from a distance using binoculars or cameras. In the digital context, shoulder surfing is a […]

SIEM (Security Information and Event Management)

SIEM (Security Information and Event Management): A type of software that collects and analyzes security-related data from multiple sources, such as network devices and security appliances. This concept is used in IT security to provide a centralized view of an organization’s security posture and identify potential threats. For example, a SIEM system might monitor network […]

Signal jamming

Signal jamming: A technique used to disrupt or block wireless signals, such as radio or wireless internet signals. It is often used in electronic warfare, and jamming devices can be used to disrupt GPS, cellular, and other wireless communications. For instance, an attacker may use signal jamming to disrupt communications during a military operation or […]

Signature detection

Signature detection: A method of identifying known threats or malicious software by comparing their characteristics, such as code or behavior, to a database of known signatures. It is commonly used in antivirus software and other security tools to quickly identify and remove known threats. Examples include signature detection, used to identify and remove malware from […]

Simian army

Simian army: A collection of open-source tools developed by Netflix to test the resilience and reliability of cloud-based systems. The Simian Army includes tools for simulating failures and other challenges, such as network outages or high levels of traffic. For example, a company might use the Simian Army to test its cloud-based e-commerce platform for […]

Simple failover

Simple failover: A disaster recovery strategy where a backup system is automatically activated to take over the operations of a primary system during a failure or outage, ensuring continued availability and minimizing downtime. This approach is often used for systems with single points of failure, like web servers or database servers.