Terms Beginning with S

Satellite Bandwidth

Frequency bandwidth of satellite channels.

SCADA

Systems that contain computers and applications that are key to monitoring and controlling critical services.

SCSI

It is the standard that controls devices such as Hard Drive, CD drive, scanner, printer, in a more compatible and advanced way than parallel interface standards.

Secure Shell (SSH)

A cryptographic network protocol that is used to secure network services over an unsecured network. SSH provides a secure channel on an unsecured network within the client-server architecture framework by connecting an SSH client to an SSH server.

Secure Sockets Layer Virtual Private Network (SSL VPN)

It is used to securely access any network from a distance. SSL encrypted encrypted communication is provided through SSL VPN. IPSec VPN has been replaced by SSL VPN because of the difficulties experienced in IPSec VPN.

Security Information and Event Management (SIEM)

They provide real-time analysis of security alerts generated by applications and network hardware.

Session Layer

The session layer is the layer in which the connection is established, used and terminated between the computers that will communicate. For example: SQL, NFS, Netbios

Simple Mail Transfer Protokol

SMTP is an e-mail sending protocol that determines the way in which the server communicates with the client to send e-mails.

Simple Network Management Protocol (SNMP)

In particular, FastEthernet Switch and Hubs are bundle or optional. Thanks to this feature, the management of the Hub or Switch can be made remotely, allowing logging about the status of the ports, allowing you to discover and solve any problems in your network.

Sniffing

It is the process of capturing the data packets on the network and reading the contents.

Software as a Service

The software is presented as a service. In this model, the software is hosted on the service provider’s servers.

Spanning Tree Protocol (STP)

The STP is an IEEE 802.1 standard, and it uses some of the bridging devices, including the switcher, to block some ports to remain only one active connection between any LAN segment (collision domain) using a software-based spanning-tree algorithm. It also prevents cycles that may occur when there are multiple active routes between stops.

Spyware

Malicious software that transfers data on a computer to a different person or persons without the consent of a computer user. Spyware viruses are mostly used for advertising purposes and stored in a downloaded software and the user is not aware of it.

SQL Injection

Taking advantage of Web application vulnerabilities, it is an attack type that allows SQL queries and commands to be run on the server where the related web application is hosted.

Star Topology

The star topology is the result of a direct connection of each terminal (servers, workstations and other peripherals) to the central connectors called switches or hubs. The data passes through the switch or hub to go to the destination address.

Static ARP

Learning the computer MAC addresses with ARP requests can create a security weakness. The manual processing of MAC Addresses and IP Address equivalents to the computer is called Static ARP.

Static NAT

It is a one-to-one dial-up to the public IP that will be used outside the private (virtual) IP used in the local network. It synchronizes all ports of the local IP exactly to the actual IP.

Static Routing

Router is the system administrator defined fixed routing rules. Static Routing is done if there is only one way to reach the target networks.

Subnet

It is used to divide subnets into class A, B and C IP addresses. That is, the process of allocating the IP address to smaller address groups.

Supervisor Engine

It is the module that controls the device on chassis-based switches and makes the L3 guidance.

Switch

It does the same with hubs. The switch looks at the address of the incoming data, establishes a virtual connection between the sender and the recipient of the data, without the awareness of other computers. Provides a dedicated path.

ePati Cyber Security Co.

Mersin Üniversitesi Çiftlikköy Kampüsü
Teknopark İdari Binası Kat:4 No: 411
Posta Kodu: 33343
Yenişehir / Mersin / TURKEY

Web: www.epati.com.tr
e-Mail: info@epati.com.tr
Tel: +90 324 361 02 33
Fax: +90 324 361 02 39