(information) Security measure

Safeguard

Safety integrity level

Safety opportunity

Safety risk

Salt

Salt

Sample

Sandbox

Scenario evaluation

Scrambler

Second preimage resistant hash function

Secondary use

Secrecy (of cryptographic protocol)

Secret

Secret exchange protocol

Secret key

Secret key cryptosystem, symmetric cryptosystem

Secret management

Secret seed

Secret sharing

Secret sharing protocol

Secret sharing scheme

Secure application

Secure by design

Secure coding

Secure electronic signature device, digital signature module

Secure hash standard (SHS)

Secure messaging encryption

Secure multiparty computation

Secure operating system

Secure signature creation device (SSCD)

Secure state

Secure wipe

Security

Security administrator

Security architecture

Security attribute

Security audit

Security by obscurity

Security domain

Security evaluation

Security event management (SEM)

Security flaw

Security function

Security function policy

Security gateway

Security goal

Security governance, risk management and compliance (SGRC)

Security information and event management (SIEM)

Security information management (SIM)

Security kernel

Security kernel

Security label

Security objective

Security objective

Security of a cryptographic primitive

Security operation center (SOC)

Security orchestration, automation and response (SOAR)

Security policy

Security policy

Security policy

Security policy model

Security policy violator

Security policy violator’s model

Security service

Security services

Security strength (level of security) (for the information security task)

Security system violation

Security target

Security token service

Security violation

Selective field integrity

Selective forgery

Selectivity; SEL (N, Т)

Self-synchronizing stream cipher

Semantic computing

Semi-structured data

Semi-structured data

Semi-supervised machine learning

Semiformal

Sender authentication

Sensitive data

Sensitive information

Sensitive personally identifiable information

Sensitivity labеl

Separation of duties

Sequential key search

Sequential key search

Serial test

Sertification authority

Service

Service level agreement, SLA

Service robot

Session encryption

Session key

Session theft, session hijacking

Shadow copy service

Share, secret share

Shared access

Signature generation algorithm

Signature generation algorithm

Signature key

Signature process

Signature space

Signature verification algorithm

Signature verification data

Signed message

Simmons authentication theory

Single sign-on (SSO)

Skimming

Smart contract

Sniffer

Sniffer

Sniffing

Social engineering

Soft computing

Software

Software aspects

Software bill of materials (SBOM)

Software composition analysis (SCA)

Software cryptographic mechanism

Software dissemination

Software encryption

Software modification

Software module

Software product

Software security module

Software weakness

Space complexity

Spam

Split knowledge

Spoofing

Spoofing attack

Spyware

SQL injection

Stack trace

Stage

Stakeholder

Stakeholder

Standard

Standardization

Standardization guidelines

Static application security testing (SAST)

Statistical cryptanalysis

Steganography

Step (of a protocol), protocol action

Stream cipher

Stream cipher ciphering module

Stream cipher control module

Stream ciphering system

Stream encryption algorithm, stream cipher

Strength of function

Structured data

Subject

Subject

Subject

Subject centric implementation

Substitution

Substitution attack

Substitution cipher

Substitution cipher

Subsymbolic AI

Supervised machine learning

Supervisory control and data acquisition (SCADA)

Supplier

Supplier relationship

Supply chain

Support vector machine (SVM)

Syllabary

Symbolic AI

Symmetric cryptosystem

Symmetric encryption system

Symmetric key encryption

Synchronous stream cipher

Synchrosignal

System

System availability

System of protection from unauthorized access to information

System security

System viability

Подписаться на новости BIS Journal / Медиа группы Авангард

Подписаться
Введите ваш E-mail

Отправляя данную форму вы соглашаетесь с политикой конфиденциальности персональных данных

19.12.2025
НСПК — о едином пространстве для проведения транзакций
19.12.2025
Пентагон видит в ISACA глобальный орган по контролю за ИБ-стандартами
19.12.2025
«Слишком жёсткие правила могут замедлить темпы внедрения ИИ»
19.12.2025
В Amazon предупреждают: опасайтесь российских хакеров
19.12.2025
«Здесь востребованы люди, которые умеют совмещать системное мышление с прикладной инженерией»
19.12.2025
NCSC стремится внедрить передовые методы защиты в цепочки поставок
19.12.2025
Рекордные DDoS-атаки инициированы теми же, кто год назад атаковал бизнес в рекламных целях
19.12.2025
Исследование «Телеком биржи»: спрос на услуги резервного копирования вырос вдвое
19.12.2025
Cloud.ru запустил новый сервис для визуализации и анализа данных в облаке
18.12.2025
Эксперт: Продление жизни карт «Мир» грозит ростом скамерской активности

Стать автором BIS Journal

Поля, обозначенные звездочкой, обязательные для заполнения!

Отправляя данную форму вы соглашаетесь с политикой конфиденциальности персональных данных