Safeguard

Safeguard: A measure or procedure designed to protect against loss, damage, or unauthorized access to information or assets. It is used in security to prevent or mitigate risks to an organization’s assets or information. Examples of safeguards include implementing firewalls to protect against cyber-attacks or installing security cameras to deter theft.

Salami technique

Salami technique: A type of fraud that involves the slicing off of small amounts of money from multiple transactions to create a larger sum. It is often used in financial crimes to steal money from a large number of victims. Examples of salami techniques include a bank employee taking small amounts of money from multiple […]

Sandbox

Sandbox: A controlled environment used for testing or running potentially dangerous or suspicious code. It is used in cybersecurity to prevent malicious software from damaging systems or networks. Examples include a web browser’s sandbox for running untrusted code, a malware analysis sandbox for studying malware behavior, and a network sandbox for testing new security protocols.

Sanitize

Sanitize: The process of removing or neutralizing sensitive data or information from a system or database to protect privacy and prevent unauthorized access. Examples include removing personally identifiable information from a database before sharing it, wiping a computer’s hard drive before disposal, and sanitizing sensitive documents.

SCADA (Supervisory Control And Data Acquisition)

SCADA (Supervisory Control And Data Acquisition): A system used to monitor and control industrial processes and infrastructure, such as power plants, water treatment facilities, and transportation networks. It is used to automate and remotely manage complex systems and processes. Examples include a SCADA system for monitoring and controlling a power grid, a SCADA system for […]

Scavenging

Scavenging: The practice of searching for and reusing discarded or abandoned data, often involving combing through discarded hardware devices, network traffic, or public domains for residual data. Unprotected data or insufficiently sanitized storage media can be exploited, emphasizing the need for robust data disposal practices and secure data transmission to prevent unauthorized access.