- Screening routers Network devices that filter packets to control access and manage traffic between different parts of a network. They are configured with specific rules to block or allow traffic based on factors such as source and destination IP addresses, ports, or protocols. The goal of a screening router is to enhance network security by preventing unauthorized access or traffic, mitigating the risk of network attacks, and managing network load.
- Screen lock A security feature that requires a user to provide authentication, such as a password, pattern, or biometric verification, to access a device after the screen has been idle for a certain period of time. The purpose of a screen lock is to protect the device and its contents from unauthorized access. In scenarios where devices hold sensitive data or can access protected networks, a screen lock serves as a fundamental line of defense against potential breaches.
- Screen scraping A technique used to extract data from the display output of a program or system. It involves capturing bitmap data from the screen and converting it into readable text or structured data. While screen scraping can be legitimately used for tasks such as data aggregation, web indexing, or legacy system integration, it can also be employed in malicious activities, such as harvesting sensitive data for unauthorized use.
- ScrumA framework for implementing agile software development. Scrum provides a structured yet flexible set of principles, practices, roles, and ceremonies that enable teams to work collaboratively to manage work and produce deliverables in short cycles known as sprints. Central to Scrum is the idea of iterative and incremental development, where requirements and solutions evolve through collaborative effort. Key roles in Scrum include the Product Owner, Scrum Master, and Development Team. Scrum enables organizations to adapt to changing requirements, prioritize work effectively, and deliver high-quality products that meet user needs. It is widely used in software development and increasingly applied in other domains requiring a flexible project management approach.
- SEC (Securities and Exchange Commission) A U.S. government agency that regulates the securities industry and oversees the stock and options exchanges. The SEC is responsible for enforcing federal securities laws and protecting investors from fraudulent or misleading practices. For example, the SEC might investigate a company for insider trading or issuing false financial statements.
- Secure communications The use of cryptographic techniques to protect the confidentiality, integrity, and authenticity of communication between two or more parties. It is used to prevent unauthorized access to sensitive information and to protect against man-in-the-middle attacks. Examples include using encryption to protect the contents of an email, using digital signatures to verify the authenticity of a message, and using secure protocols to establish a secure channel between two parties.
- Secure Cryptoprocessors Hardware components designed to securely handle sensitive data such as cryptographic keys and personal identification numbers (PINs). They are embedded in tamper-resistant packaging to prevent physical attacks and are integral to the security of systems processing transactions, authentication credentials, and other critical data.
- Secure defaults (or secure-by-default) The practice of setting security settings to the most secure option as the default so that users do not have to manually adjust them. This is used in software and system design, as well as in network and device configuration. For example, a password manager may have a secure default password length requirement, or a router may have a secure default firewall configuration.
- Secure Electronic Transaction (SET) An early protocol designed to secure electronic credit card transactions. While SET introduced mechanisms to safeguard payment information, it is now considered obsolete and has been largely replaced by more versatile and widely supported standards such as TLS and EMV for online and offline credit card transaction security.
- Secure FTP (SFTP) A secure protocol for transferring files over a network. It is used to protect the confidentiality and integrity of the transferred files and to prevent unauthorized access to sensitive information. Examples include using SFTP to transfer sensitive documents between two parties, using SFTP to transfer financial data between a client and a server, and using SFTP to transfer software updates to a network of devices.
Share our FREE glossary with your friends and study buddies.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions, if you find errors please contact us.