SAN: A storage area network (SAN) is a dedicated storage network that provides access to consolidated, block level storage. SANs primarily are used to make storage devices (such as disk arrays, tape libraries, and optical jukeboxes) accessible to servers so that the devices appear as locally attached to the operating system. A SAN typically has its own network of storage devices that are generally not accessible through the regular network by regular devices.
SD-WAN: SD-WAN is an acronym for software-defined networking in a wide area network. SD-WAN simplifies the management and operation of a WAN by decoupling the networking hardware from its control mechanism.
Security Assessment: A cybersecurity risk assessment identifies the various information assets that could be affected by a cyber attack(such as hardware, systems, laptops, customer data, and intellectual property), and then identifies the various risks that could affect those assets.
Security Operations Center (SOC): A centralized unit that deals with security issues on an organizational and technical level. A SOC within a building or facility is a central location from where staff supervises the site, using data processing technology.Typically, a SOC is equipped for access monitoring, and controlling of lighting, alarms, and vehicle barriers.
Serial port: An interface on a computer that supports transmission of a single bit at a time; can be used for connecting almost any type of external device including a mouse, a modem, or a printer.
Server: A computer that is responsible for responding to requests made by a client program (e.g., a web browser or an e-mail program) or computer. Also referred to as a “file server”.
Service Level Agreement (SLA): A service level agreement (SLA) is a contract that establishes a set of deliverables that one party (the service provider) has agreed to provide another (the client). An SLA defines the level of service you can expect from a vendor, laying out the metrics by which service is measured, as well as remedies or penalties should agreed-upon service levels not be achieved. It is a critical component of any technology vendor contract.
SID: Service Set Identifier; a name that identifies a wireless network.
SIEM: Security information and event management (SIEM), software products and services combine security information management (SIM) and security event management (SEM). They provide real-time analysis of security alerts generated by applications and network hardware.
SMB: The Server Message Block Protocol (SMB protocol) provides a method for client applications in a computer to read and write to files on and to request services from server programs in a computer network.
SMPT: Simple Mail Transfer Protocol is an Internet standard for e-mail transmission.
Smishing: The fraudulent practice of sending text messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords or credit card numbers.
SMTP: Simple Mail Transfer Protocol; a method of handling outgoing electronic mail.
SOC-as-a-service: A subscription- or software-based service that manages and monitors your logs, devices, clouds, network and assets for internal IT teams. The service provides companies with the knowledge and skills necessary to combat cyber-security threats.
Social Engineering: Social engineering is the art of manipulating people into giving up confidential information, usually through technology. Social engineering aims to take advantage of a potential victim’s natural tendencies and emotional reactions.
Software: Any program that performs a specific function. Examples: word processing, spreadsheet calculations, or electronic mail.
Software as a Service (SaaS): Software as a service is a software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted. It is sometimes referred to as "on-demand software".
Software-defined data center: Software-defined data center is a marketing term that extends virtualization concepts such as abstraction, pooling, and automation to all data center resources and services to achieve IT as a service.
Software-defined networking: Software-defined networking (SDN) technology is an approach to network management that enables dynamic, programmatically efficient network configuration in order to improve network performance and monitoring, making it more like cloud computing than traditional network management.
Software-defined security: Software-defined security is a set of the security model in which the information security in a computing environment is regulated and managed by security software. Most of the security controls like segmentation of the network, detection of intrusions, and access control are automated and they are controlled through security software. Software-defined security is utilized in IT environments that utilize services of the cloud.
Spam: Email spam, also known as junk email or unsolicited bulk email (UBE), is a subset of spam that involves nearly identical messages sent to numerous recipients by email. Definitions of spam usually include the aspects that email is unsolicited and sent in bulk. Spammers collect email addresses from chatrooms, websites, customer lists, newsgroups, and viruses which harvest users’ address books, and are sold to other spammers.
Spear Phishing: Phishing attempts directed at specific individuals or companies is known as spear phishing. In contrast to bulk phishing, spear phishing attackers often gather and use personal information about their target to increase their probability of success.
SSL: Small data files that digitally bind a cryptographic key to an organization’s details. When installed on a web server, it activates the padlock and the https protocol (over port 443) and allows secure connections from a web server to a browser. Typically, SSL is used to secure credit card transactions, data transfer and logins, and more recently is becoming the norm when securing browsing of social media sites. SSL Certificates bind together:
A domain name, server name or hostname.
An organizational identity (i.e. company name) and location.
An organization needs to install the SSL Certificate onto its web server to initiate secure sessions with browsers. Depending on the type of SSL Certificate applied for, the organization will need to go through differing levels of vetting. Once installed, it is possible to connect to the website over https://www.domain.com, as this tells the server to establish a secure connection with the browser. Once a secure connection is established, all web traffic between the web server and the web browser will be secure. To view the details of an SSL Certificate, go to a secure site, click on the padlock and select “View Certificate”. All browsers are slightly different, but the Certificate always contains the same information.
Switch: A switch serves as a controller, enabling networked devices to talk to each other efficiently. Through information sharing and resource allocation, switches save businesses money and increase employee productivity.
What is a Network Switch: Unmanaged Switches: An unmanaged switch works right out of the box. It’s not designed to be configured, so you don’t have to worry about installing or setting it up correctly. Unmanaged switches have less network capacity than managed switches. You’ll usually find unmanaged switches in home networking equipment.
What is a Network Switch: Managed Switches: A managed network switch is configurable, offering greater flexibility and capacity than an unmanaged switch. You can monitor and adjust a managed switch locally or remotely, to give you greater network control.
System Hardening: The process of securing a system by reducing its surface of vulnerability, which is larger when a system performs more functions; in principle, a single-function system is more secure than a multipurpose one. Reducing available ways of attack typically includes changing default passwords, the removal of unnecessary software, unnecessary usernames or logins, and the disabling or removal of unnecessary services.