Sect. S


Safeguard
Salami technique
Sampling risk
Sampling stratification
Scheduling
Scope creep
Scoping process
Screening routers
Secure Electronic Transaction [SET]

"Secure Multipurpose Internet Mail
Extensions" [S/MIME]
Secure Shell [SSH]
Secure Sockets Layer [SSL]
Security administrator
Security as a Service [SecaaS]
Security awareness
Security awareness campaign
Security awareness coordinator

Security awareness program
Security forum
Security incident
Security management
Security metrics
Security perimeter
Security policy

Security procedures
Security software
Security standards
Security testing
Security/transaction risk
Segregation/separation of duties [SoD]
Sensitivity
Sequence check

Sequential file
Service bureau
Service catalogue
Service delivery objective [SOD]
Service desk
Service level agreement [SLA]
Service provider
Service Set Identifier [SSID]
Service user
Service-oriented architecture [SOA]

Servlet
Session border controller [SBC]
Shell
Shell programming
Significant deficiency
Sign-on procedure




Simple fail-over
Simple Mail Transfer Protocol [SMTP]
Simple Object Access Protocol [SOAP]
Single factor authentication [SFA]
Single point of failure
Skill
Slack time (float)

SMART
Smart card
Sniff
Sniffing
Social engineering
Software
Software as a service [SaaS]
"Software as a service, platform as a service
and infrastructure as a service" [SPI]
Source code
Source code compare program

Source document
Source lines of code [SLOC]
Source routing specification
Spam
Spanning port
Spear phishing
Split data systems
Split domain name system [DNS]
Split knowledge/split key
Spoofing

"SPOOL (simultaneous peripheral
operations online)"
Spyware
SQL injection
Stage-gate
Stakeholder
Standard
Standing data

Star topology
Stateful inspection
Static analysis
Statistical sampling
Statutory requirements
Storage area networks [SANs]
Strategic planning
"Strengths, weaknesses, opportunities and
threats" [SWOT]
Structured programming
Structured Query Language [SQL]

Subject matter
Substantive testing
Sufficient audit evidence
Sufficient evidence
Sufficient information
Suitable information
Supervisory control and data acquisition [SCADA]
Supply chain management [SCM]
Surge suppressor
Suspense file




Switches
Symmetric key encryption
Synchronize [SYN]
Synchronous transmission
System development life cycle [SDLC]
System exit
System flowchart
System hardening
System narrative

System of internal control
System software
System testing
Systems acquisition process
Systems analysis