(information) Security measure

Safeguard

Safety integrity level

Safety opportunity

Safety risk

Salt

Salt

Sample

Sandbox

Scenario evaluation

Scrambler

Second preimage resistant hash function

Secondary use

Secrecy (of cryptographic protocol)

Secret

Secret exchange protocol

Secret key

Secret key cryptosystem, symmetric cryptosystem

Secret management

Secret seed

Secret sharing

Secret sharing protocol

Secret sharing scheme

Secure application

Secure by design

Secure coding

Secure electronic signature device, digital signature module

Secure hash standard (SHS)

Secure messaging encryption

Secure multiparty computation

Secure operating system

Secure signature creation device (SSCD)

Secure state

Secure wipe

Security

Security administrator

Security architecture

Security attribute

Security audit

Security by obscurity

Security domain

Security evaluation

Security event management (SEM)

Security flaw

Security function

Security function policy

Security gateway

Security goal

Security governance, risk management and compliance (SGRC)

Security information and event management (SIEM)

Security information management (SIM)

Security kernel

Security kernel

Security label

Security objective

Security objective

Security of a cryptographic primitive

Security operation center (SOC)

Security orchestration, automation and response (SOAR)

Security policy

Security policy

Security policy

Security policy model

Security policy violator

Security policy violator’s model

Security service

Security services

Security strength (level of security) (for the information security task)

Security system violation

Security target

Security token service

Security violation

Selective field integrity

Selective forgery

Selectivity; SEL (N, Т)

Self-synchronizing stream cipher

Semantic computing

Semi-structured data

Semi-structured data

Semi-supervised machine learning

Semiformal

Sender authentication

Sensitive data

Sensitive information

Sensitive personally identifiable information

Sensitivity labеl

Separation of duties

Sequential key search

Sequential key search

Serial test

Sertification authority

Service

Service level agreement, SLA

Service robot

Session encryption

Session key

Session theft, session hijacking

Shadow copy service

Share, secret share

Shared access

Signature generation algorithm

Signature generation algorithm

Signature key

Signature process

Signature space

Signature verification algorithm

Signature verification data

Signed message

Simmons authentication theory

Single sign-on (SSO)

Skimming

Smart contract

Sniffer

Sniffer

Sniffing

Social engineering

Soft computing

Software

Software aspects

Software bill of materials (SBOM)

Software composition analysis (SCA)

Software cryptographic mechanism

Software dissemination

Software encryption

Software modification

Software module

Software product

Software security module

Software weakness

Space complexity

Spam

Split knowledge

Spoofing

Spoofing attack

Spyware

SQL injection

Stack trace

Stage

Stakeholder

Stakeholder

Standard

Standardization

Standardization guidelines

Static application security testing (SAST)

Statistical cryptanalysis

Steganography

Step (of a protocol), protocol action

Stream cipher

Stream cipher ciphering module

Stream cipher control module

Stream ciphering system

Stream encryption algorithm, stream cipher

Strength of function

Structured data

Subject

Subject

Subject

Subject centric implementation

Substitution

Substitution attack

Substitution cipher

Substitution cipher

Subsymbolic AI

Supervised machine learning

Supervisory control and data acquisition (SCADA)

Supplier

Supplier relationship

Supply chain

Support vector machine (SVM)

Syllabary

Symbolic AI

Symmetric cryptosystem

Symmetric encryption system

Symmetric key encryption

Synchronous stream cipher

Synchrosignal

System

System availability

System of protection from unauthorized access to information

System security

System viability

Подписаться на новости BIS Journal / Медиа группы Авангард

Подписаться
Введите ваш E-mail

Отправляя данную форму вы соглашаетесь с политикой конфиденциальности персональных данных

13.01.2026
Личные аккаунты LLM, находящиеся в тени, повышают риски утечки
13.01.2026
Кабмин, «Росатом» и «Россети» изучат потребности ЦОДов
13.01.2026
Роскомнадзор грозит «уголовкой» за пропуск трафика в обход ТСПУ
13.01.2026
Банк России ищет помощи в охоте на инсайдеров
13.01.2026
США выйдут из состава Глобального форума по кибербезопасности
12.01.2026
Индия выдвинула 83 требования для производителей смартфонов
12.01.2026
Небольшие МФО могут не потянуть усиление кибербезопасности
12.01.2026
«Open-source ИИ может функционировать как геополитический инструмент»
12.01.2026
Силами центра ГосСОПКА было закрыто почти 26 тысяч ИБ-инцидентов
12.01.2026
Сбой MFA позволил инфостилеру осуществить взлом систем в 50 компаниях

Стать автором BIS Journal

Поля, обозначенные звездочкой, обязательные для заполнения!

Отправляя данную форму вы соглашаетесь с политикой конфиденциальности персональных данных