JavaScriptMessages
APEC
Asia Pacific Economic Cooperation
News
SiteMap
Login
Glossary
Filter:
#
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
All
Return to List
S
S
S Interface
S&T
S/MIME (Secure MIME)
S/N Ratio
SA (Security association)
Sabotage
Sacred
Safe harbor
Safeguard
Safeguarding
Safeguarding Statement
Safeguards
Safety
Sagan
SAIL
SAISS
Salami Technique
Salescritter
Salt
Salt Mines
Salt Substrate
Same-Day Service
Samizdat
Sample Key
SAMS
Samurai
Sandbender
Sandbox
Sanitization
Sanitize
Sanitizing
Sanity Check
SAO
SAP
SARK
Satellite Communications Security
Saturday-Night Special
SAV
Say
Scag
Scanner
Scanning
Scanning attacks
Scanning Line
Scanning Line Frequency
Scanning Line Length
Scanning Pitch
Scanning Rate
Scanning Spot
Scanno
Scavenging
Scenario
Scenario Analysis
SCG
Schematic
Schroedinbug
SCI
Science-Fiction Fandom
Scientific And Technical Information
Scientific And Technical Intelligence
SCIF
SCOMP
Scope of an asset
SCP
Scram Switch
Scratch
Scratch Monkey
Scratch Pad Store
Scream And Die
Screaming Tty
Screen saver password
Screening firewall
Screening router
Scribble
Script kiddie
Scripting language
Scripts
Scrog
Scrool
Scrozzle
Scrubbing
Scruffies
SCSI
ScumOS
SDLC
SDNRIU
SDNS
SDR
Search-And-Destroy Mode
SEC (Securities and Exchange Commission)
SecDef
Second
Secondary Channel
Secondary Damage
Secondary Distribution
Secondary RED Conductor
Secondary Station
Second-System Effect
Secretary Of Commerce
Secretary Of Defense
Secretary Of State
Section 1030
Sector
Secure Communications
Secure Communications Processor
Secure Configuration Management
Secure MIME (S/MIME)
Secure Operating System
Secure Path
Secure Shell (SSH)
Secure Sockets Layer (SSL)
Secure State
Secure Subsystem
Secure System Operations
Secure Telecommunications And Information Handling Equipment
Secure Telephone Unit
Secure Working Area
Securities and Exchange Commission (SEC)
Security
Security Administrator
Security Advisory/information Memorandum
Security And Privacy Advisory Board
Security Architecture
Security Area
Security association (SA)
Security Audit
Security Audit Trail
Security audits
Security awareness
Security Awareness And Training
Security baseline
Security breach
Security center
Security Classification Guide
Security Cost Benefit Analysis
Security Countermeasures
Security Criteria
Security Critical
Security Critical Mechanisms
Security department
Security Design Review
Security Directives
Security Domains
Security Education
Security Engineering
Security Environment
Security Evaluation
Security Fault Analysis
Security Features
Security Features Users' Guide
Security Filter
Security Flaw
Security Flow Analysis
Security Functional Testing
Security Incident
Security Inspection
Security Inspections
Security Interest
Security Kernel
Security Label
Security Level
Security Measures
Security Mechanisms
Security Mode
Security Module
Security Officer
Security Officers
Security Parameters
Security patches
Security Perimeter
Security policies
Security Policy
Security Policy Model
Security Product Integration
Security Product Testing/Evaluation
Security Products
Security Range
Security Relevant Event
Security Relevant Portion
Security Requirements
Security Requirements Baseline
Security Requirements For Automatic Information Systems (AISs)
Security Reviews
Security Safeguards
Security Service
Security Specification
Security Specifications
Security Staffing Requirements
Security Test And
Security Test And Evaluation
Security Testing
Security Threat
Security Through Obscurity
Security Training
Security Violation
Security Violations Reporting Process
Security-Enhanced LINUX
Security-Relevant Event
Security-Relevant Functions
Seed Key
Seek
Seek Time
Seepage
Segfault
Segment
Segmentation Fault
Segmented Encoding Law
Segments
Segregation
Selective Field Protection
Self-Authentication
Self-Certification
Self-defense training
Sender
Sendmail
Sensitive
Sensitive Application
Sensitive Business Data
Sensitive But Unclassified
Sensitive Compartmented Information
Sensitive Compartmented Information Facility
Sensitive Compartmented Intelligence
Sensitive Data
Sensitive Defence Information
Sensitive Defense Information
Sensitive Information
Sensitive Nuclear Material Production Information
Sensitive personal information
Sensitive Software
Sensitive System
Sensitive Unclassified Information
Sensitivity
Sensitivity And Criticality
Sensitivity And Criticality Assessment
Sensitivity Assessment
Sensitivity Label
Sensitivity Level
Sensor
Sentinel
Separation Of Duties
Separation Of Privilege
Separation of responsibilities
Sequence
Sequence number
Sequential Access
Sequential Logic Element
Sequential processing
Serial
Serial Access
Serial Digital Computer
Serial Transmission
Serializer
Serial-To-Parallel Converter
Server
Server room
Server-side programming
Service
Service Feature
Service Interruption Hazard
Service Set Identifier (SSID)
Service ticket
Services
Services and Applications
Session
Session hijacking
Session key
Session Layer
Session Security Level
Set
Seven-Bit Byte
Severity
Sexadecimal
Sextet
S-F
SFA
SFUG
SFUG:D1
SFUG:D2
SHA-1
Shadow password file
Shambolic Link
Shar File
Shared password
Shared secret
Shareware
Sharing
Sharing Of Software
Shelfware
Shell
Shielded Enclosure
Shielded Enclosures
Shift Left (or Right) Logical
Shift Register
Shim
Short Card
Short Range Plan
Short Title
Shotgun Debugging
Shoulder Surfing
Shovelware
Showstopper
Shredding tools
Shriek
Shub-Internet
SI
Side effect
Sidecar
Sieve
SIG
Sig Block
Sig Quote
Sig Virus
SIGINT
Signal
Signal Intelligence
Signal Security
Signals Intelligence
Signals Security
Signal-To-Noise Ratio
Signature
Signature recognition
Significant Change
Significant Computer Security Incident
Significant Condition
Significant Digit
Significant Instant
Significant Modification
Significant Risk Of Telecommunications Exploitation
SIGNIN
Signing
SIGNON
SIGSEC
SIGSEC Signals Analysis
Silicon
Silly Walk
Silo
Silver Book
Simple Buffering
Simple Mail Transfer Protocol (SMTP)
Simple Scanning
Simple Security
Simple Security Condition
Simple Security Property
Simplex Operation
Simulate
Since Time T Equals Minus Infinity
Single Integrated Operational Plan-Extremely Sensitive Information (SIOP-ESI)
Single Point Keying
Single points of vulnerability
Single Sign-On
Single sign-on (SSO)
Single-Level Device
Single-message break-in
Single-User Hosts
SIOP-ESI
SISS
Site
Site sharing
Sitename
Site-to-site VPNs
Six-Bit Byte
Skrog
Skulker
Slab
Slack
Slap On The Side
Slash
Sleep
Slim
Slop
Slopsucker
Slot
Slurp
Smart
Smart Card
Smart Terminal
Smartcards/Token Authentication
Smash Case
Smash The Stack
Smiley
SMM
SMO
Smoke
Smoke And Mirrors
Smoke Test
Smoking Clover
SMOP
SMTP (Simple Mail Transfer Protocol)
SMTP relay proxy server
SMU
Smurf
SNAFU Principle
Snail
Snail-Mail
Snap
Snap-in
Snarf
Snarf & Barf
Snarf Down
Snark
Sneaker
Sneakernet
Sniff
Sniffer
Snivitz
SO
Social Engineering
Social Science Number
Socket
SOCKS
Soft Boot
Soft Copy
Soft Sectoring
Softcopy
Softlifting
Software
Software Architecture Study
Software Asset Management
Software Bloat
Software Development Methodologies
Software Engineering
Software Interface Functions
Software Laser
Software Licensing
Software Piracy
Software Rot
Software Security
Software System Test
Software System Test And Evaluation Process
Softwarily
Softy
SOH
SOHO
SOIC
Solaris
Solid-State Scanning
Some Random X
SON
Sorcerer's Apprentice Mode
SORD
Sort
SOS
Source
Source Code
Source Of All Good Bits
Source quench
Source User
SOW
Space
Space Systems Security
Space-Cadet Keyboard
SPACEWAR
Spaghetti Code
Spaghetti Inheritance
Spam
Spam filtering
Spare
Special Access Program(s) (SAP)
Special Markings
Special Mission
Special Mission Modification
Special permissions
Special Purpose Computer
Special-Case
Specification
Speech Privacy
Speed Calling
Speed Dialing
Speedometer
Spell
Spelling Flame
Spelling Table
Spiffy
Spike
Spill Forward
Spin
SPK
Spl
Splash Screen
Splat
Split Knowledge
SPO
Spod
Spoiler
Sponge
Sponsor Of Data
Spoofing
Spool
Spool File
Spooling
Spread Spectrum
Spread Spectrum Analysis
SPS
Spy
Spyware
Squirrelcide
Squirrelcided. Stack
SRI
SRP
SRR
SSE
SSH (Secure Shell)
SSID
SSL (Secure Sockets Layer)
SSMP
SSO
SSO (single sign-on)
SSR
ST&E
ST&E Tools And Equipment
Stack entry
Stack Puke
Staging server
Stand Alone Security Mode
Stand Alone Security Mode Of Operation
Stand Alone, Shared Automated Information System
Stand Alone, Single-User Automated Information System
Stand-alone NIDS
Stand-Alone Systems And Remote Terminals
Stand-Alone, Shared System
Stand-Alone, Single-User System
Standard
Standard Measurement Point
Standard permissions
Standards
Standards architecture
Standards Of Conduct
STAPLE
STAR
Star (*) Property
Star Network
Star Out
Star Property
Star Property (* Property)
Star Topology
START
Start-Stop Character
Start-Stop Modulation
Start-Stop System
Start-Stop Transmission
Start-Stop TTY Distortion
Start-Up KEK
State
State Delta Verification System
State table
State Variable
Stateful firewall
Stateful inspection
Statement
Statement Of Need
Statement Of Work
Static packet filtering
Static webpages
Station
Statistical analysis
STD
Steam-Powered
Steganography
STI
Stiffy
Stir-Fried Random
Stomp On
Stone Age
Stone Knives And Bearskins
Stop Element
Stop Signal
Stoppage
Stop-Record Signal
Storage
Storage Area Controls
Storage Cell
Storage Element
Storage Media Protection And Control
Storage Object
Storage Register
Storage Resource
Store
Store-And-Forward
Stored-Program Computer
Stream encryption
Streamer
Streaming Tape Drive
Streaming Tape Recording
Strided
String
Stroke
Strong keys
Structured Programming
Structured Protection
Strudel
STS
STU
Stubroutine
Studly
Studlycaps
Stuffing
Stunning
Stunt Box
Stupids
Stupid-Sort
Sturgeon's Law
STX
Su (switch user)
SUB
Subassembly
Subcommittee On Automated Information Systems Security (SAISS)
Subcommittee On Automated Information Sytemse Security (SAISS)
Subcommittee On Compromising Emanations
Subcommittee On Telecommunications Security
Subject
Subject Security Level
Subject Sensitivity Level
Subject's Security Level
Subnet
Subnet mask
Subnet part
Subroutine
Subscriber Sets And End Terminal Equipments
Subset-Domain
Subsystem
Successful Block Delivery
Successful Block Transfer
Successful Disengagement
Sucking Mud
Suit
Suitably Small
Sum Check
Summation Check
Sunspots
Sun-Stools
Super account
Super Source Quench
Superencryption
Supergroup
Superprogrammer
Supersession
Supershell
Superuser
Supervisor
Supervisor State
Supervisory Control
Supervisory Program
Supervisory Routine
Supervisory Signals
Supplicant
Supplies
Support
Suppression
Suppression Measure
Surf
Surreptitious scanning
Surveillance
Survivability
Survivable Operation
Susceptibility
Suzie COBOL
SVRR
Swab
Swap
Swap Space
Swapped In
Swapped Out
Switch NIDS
Switchboard
Swizzle
Syllabary
Syllable
Symbolic Language
Symbolic Logic
Symmetric key encryption
SYN
SYN Flooding DoS attacks
SYN/ACK
Sync
Synchronism
Synchronization
Synchronization Bit
Synchronization Code
Synchronization Flags
Synchronized Network
Synchronous
Synchronous Communication
Synchronous Crypto-Operation
Synchronous Data Link Control
Synchronous Data Network
Synchronous Idle Character
Synchronous Network
Synchronous TDM
Synchronous Transfer Mode
Synchronous Transmission
Syntactic Salt
Syntactic Sugar
Syntax
Sys admin
SYSADM
Sysadmin
Sysape
Sys-Frog
SYSGEN
Syslog
Sysop
System
System Administration
System Administrator
System Analysis
System Architecture
System Design
System Development
System Development Methodologies
System Documentation
System Environment
System Generation
System High
System High Mode
System High Mode Or System High Security Mode
System High Security Mode
System Indicator
System Integration
System Integrity
System Integrity Procedures
System Life Cycle
System Loading
System Low
System Manager
System Mangler
System Of Records
System Operational Threshold
System Operator
System Overhead Information
System Programmer
System Report
System Security
System Security Architecture Study
System Security Engineering
System Security Evaluation
System Security Management Plan
System Security Map
System Security Officer
System Software
System Software Controls
System Support
System Test Time
System Testing And Evaluation Process
System Tests
System Users
Systematic monitoring
System-High Mode
Systems administration
Systems administrator
Systems Analysis
Systems Design
Systems penetration
Systems Security Steering Group
SysVile
Secondary Distribution
Release of technical documents provided after primary distribution. It includes loaning, allowing the reading of, or releasing a document outright, in whole or in part. (DODD 5230. 24;)