АБВГДЕЖЗИКЛМНОПРСТУФХЦЧШЭЯ ABCDEFGHIKLMNOPQRSTUVWZ (information) Security measureSafeguardSafety integrity levelSafety opportunitySafety riskSaltSaltSampleSandboxScenario evaluationScramblerSecond preimage resistant hash functionSecondary useSecrecy (of cryptographic protocol)SecretSecret exchange protocolSecret keySecret key cryptosystem, symmetric cryptosystemSecret managementSecret seedSecret sharingSecret sharing protocolSecret sharing schemeSecure applicationSecure by designSecure codingSecure electronic signature device, digital signature moduleSecure hash standard (SHS)Secure messaging encryptionSecure multiparty computationSecure operating systemSecure signature creation device (SSCD)Secure stateSecure wipeSecuritySecurity administratorSecurity architectureSecurity attributeSecurity auditSecurity by obscuritySecurity domainSecurity evaluationSecurity event management (SEM)Security flawSecurity functionSecurity function policySecurity gatewaySecurity goalSecurity governance, risk management and compliance (SGRC)Security information and event management (SIEM)Security information management (SIM)Security kernelSecurity kernelSecurity labelSecurity objectiveSecurity objectiveSecurity of a cryptographic primitiveSecurity operation center (SOC)Security orchestration, automation and response (SOAR)Security policySecurity policySecurity policySecurity policy modelSecurity policy violatorSecurity policy violator’s modelSecurity serviceSecurity servicesSecurity strength (level of security) (for the information security task)Security system violationSecurity targetSecurity token serviceSecurity violationSelective field integritySelective forgerySelectivity; SEL (N, Т)Self-synchronizing stream cipherSemantic computingSemi-structured dataSemi-structured dataSemi-supervised machine learningSemiformalSender authenticationSensitive dataSensitive informationSensitive personally identifiable informationSensitivity labеlSeparation of dutiesSequential key searchSequential key searchSerial testSertification authorityServiceService level agreement, SLAService robotSession encryptionSession keySession theft, session hijackingShadow copy serviceShare, secret shareShared accessSignature generation algorithmSignature generation algorithmSignature keySignature processSignature spaceSignature verification algorithmSignature verification dataSigned messageSimmons authentication theorySingle sign-on (SSO)SkimmingSmart contractSnifferSnifferSniffingSocial engineeringSoft computingSoftwareSoftware aspectsSoftware bill of materials (SBOM)Software composition analysis (SCA)Software cryptographic mechanismSoftware disseminationSoftware encryptionSoftware modificationSoftware moduleSoftware productSoftware security moduleSoftware weaknessSpace complexitySpamSplit knowledgeSpoofingSpoofing attackSpywareSQL injectionStack traceStageStakeholderStakeholderStandardStandardizationStandardization guidelinesStatic application security testing (SAST)Statistical cryptanalysisSteganographyStep (of a protocol), protocol actionStream cipherStream cipher ciphering moduleStream cipher control moduleStream ciphering systemStream encryption algorithm, stream cipherStrength of functionStructured dataSubjectSubjectSubjectSubject centric implementationSubstitutionSubstitution attackSubstitution cipherSubstitution cipherSubsymbolic AISupervised machine learningSupervisory control and data acquisition (SCADA)SupplierSupplier relationshipSupply chainSupport vector machine (SVM)SyllabarySymbolic AISymmetric cryptosystemSymmetric encryption systemSymmetric key encryptionSynchronous stream cipherSynchrosignalSystemSystem availabilitySystem of protection from unauthorized access to informationSystem securitySystem viability