Safeguard

Sandbox

Scrambler

Second preimage resistant hash function

Secret exchange protocol

Secret key

Secret key cryptosystem, symmetric cryptosystem

Secret sharing protocol

Secret sharing scheme

Secure coding

Secure electronic signature device

Secure hash standard (SHS)

Secure messaging encryption

Secure operating system

Secure signature creation device, SSCD

Secure state

Secure wipe

Security

Security administrator

Security architecture

Security attribute

Security audit

Security domain

Security evaluation

Security event management (SEM)

Security flaw

Security function

Security function policy

Security gateway

Security goal

Security information and event management (SIEM)

Security information management (SIM)

Security kernel

Security kernel

Security label

Security objective

Security objective

Security of a cryptographic primitive

Security operation center, SOC

Security policy

Security policy model

Security policy violator

Security policy violator’s model

Security policys

Security service

Security services

Security system violation

Security target

Security violation

Selective field integrity

Selective forgery

Self-service cash-in terminal

Semiformal

Sender authentication

Sensitive data

Sensitive information

Separation of duties

Sequential key search

Sequential key search

Serial test

Sertification authority

Service

Session encryption

Session key

Shadow copy service

Share, secret share

Shared access

Signature generation algorithm

Signature generation algorithm

Signature key

Signature space

Signature verification algorithm

Signature verification data

Simmons authentication theory

Single sign-on (SSO)

Skimming

Smart contract

Sniffer

Sniffer

Sniffing

Social engineering

Software

Software cryptographic mechanism

Software dissemination

Software encryption

Software modification

Software security module

Solution Свойство документа, определяющее, что ни в его содержательную, ни в реквизитную части не вносилось никаких изменений [ ГОСТ 2.051-2013 ].

Space complexity

Spam

Split knowledge

Spoofing

Spoofing attack

Spyware

SQL injection

Standard

Standardization

Standardization guidelines

Statistical cryptanalysis

Steganography

Step (of a protocol), protocol action

Stream cipher ciphering module

Stream cipher control module

Stream ciphering system

Stream encryption algorithm, stream cipher

Strength of function

Subject

Subject

Subject

Substitution

Substitution cipher

Supervisory control and data acquisition (SCADA)

Synchrosignal

System

System availability

System of protection from unauthorized access to information

System security

System viability