(information) Security measure

Safeguard

Safety integrity level

Safety opportunity

Safety risk

Salt

Salt

Sample

Sandbox

Scenario evaluation

Scrambler

Second preimage resistant hash function

Secondary use

Secrecy (of cryptographic protocol)

Secret

Secret exchange protocol

Secret key

Secret key cryptosystem, symmetric cryptosystem

Secret management

Secret seed

Secret sharing

Secret sharing protocol

Secret sharing scheme

Secure application

Secure by design

Secure coding

Secure electronic signature device, digital signature module

Secure hash standard (SHS)

Secure messaging encryption

Secure multiparty computation

Secure operating system

Secure signature creation device (SSCD)

Secure state

Secure wipe

Security

Security administrator

Security architecture

Security attribute

Security audit

Security by obscurity

Security domain

Security evaluation

Security event management (SEM)

Security flaw

Security function

Security function policy

Security gateway

Security goal

Security governance, risk management and compliance (SGRC)

Security information and event management (SIEM)

Security information management (SIM)

Security kernel

Security kernel

Security label

Security objective

Security objective

Security of a cryptographic primitive

Security operation center (SOC)

Security orchestration, automation and response (SOAR)

Security policy

Security policy

Security policy

Security policy model

Security policy violator

Security policy violator’s model

Security service

Security services

Security strength (level of security) (for the information security task)

Security system violation

Security target

Security token service

Security violation

Selective field integrity

Selective forgery

Selectivity; SEL (N, Т)

Self-synchronizing stream cipher

Semantic computing

Semi-structured data

Semi-structured data

Semi-supervised machine learning

Semiformal

Sender authentication

Sensitive data

Sensitive information

Sensitive personally identifiable information

Sensitivity labеl

Separation of duties

Sequential key search

Sequential key search

Serial test

Sertification authority

Service

Service level agreement, SLA

Service robot

Session encryption

Session key

Session theft, session hijacking

Shadow copy service

Share, secret share

Shared access

Signature generation algorithm

Signature generation algorithm

Signature key

Signature process

Signature space

Signature verification algorithm

Signature verification data

Signed message

Simmons authentication theory

Single sign-on (SSO)

Skimming

Smart contract

Sniffer

Sniffer

Sniffing

Social engineering

Soft computing

Software

Software aspects

Software bill of materials (SBOM)

Software composition analysis (SCA)

Software cryptographic mechanism

Software dissemination

Software encryption

Software modification

Software module

Software product

Software security module

Software weakness

Space complexity

Spam

Split knowledge

Spoofing

Spoofing attack

Spyware

SQL injection

Stack trace

Stage

Stakeholder

Stakeholder

Standard

Standardization

Standardization guidelines

Static application security testing (SAST)

Statistical cryptanalysis

Steganography

Step (of a protocol), protocol action

Stream cipher

Stream cipher ciphering module

Stream cipher control module

Stream ciphering system

Stream encryption algorithm, stream cipher

Strength of function

Structured data

Subject

Subject

Subject

Subject centric implementation

Substitution

Substitution attack

Substitution cipher

Substitution cipher

Subsymbolic AI

Supervised machine learning

Supervisory control and data acquisition (SCADA)

Supplier

Supplier relationship

Supply chain

Support vector machine (SVM)

Syllabary

Symbolic AI

Symmetric cryptosystem

Symmetric encryption system

Symmetric key encryption

Synchronous stream cipher

Synchrosignal

System

System availability

System of protection from unauthorized access to information

System security

System viability

Подписаться на новости BIS Journal / Медиа группы Авангард

Подписаться
Введите ваш E-mail

Отправляя данную форму вы соглашаетесь с политикой конфиденциальности персональных данных

30.12.2025
Трамп взял тайм-аут перед введением пошлин на китайские чипы
30.12.2025
Применение дронов-доставщиков отложили из-за правовых коллизий
30.12.2025
Выдавать зарплату в цифровых рублях начнут системно значимые банки
30.12.2025
MWS Cloud: Чем крупнее бизнес, тем больше он внедряет средства ИБ через «облако»
30.12.2025
ГК «Солар» получила патент на бот-фильтр
30.12.2025
Positive Technologies выводит свои продукты на багбаунти
30.12.2025
PT запустила коммерческие продажи антивируса в составе продукта MaxPatrol EPP
30.12.2025
PT Container Security 0.8: публичный API для управления продуктом
29.12.2025
В La Poste «погасли экраны» после крупной DDoS-атаки
29.12.2025
Google забирает из России часть оборудования GGC

Стать автором BIS Journal

Поля, обозначенные звездочкой, обязательные для заполнения!

Отправляя данную форму вы соглашаетесь с политикой конфиденциальности персональных данных