- S -
Seed Financing Round
Also sometimes referred to as a friends and family round, an early round of financing for a startup company, typically conducted not long after the company is formed. Startups may raise debt and equity capital in multiple rounds of seed financing ...
Series A Financing Round
Typically refers to the first financing round of a startup company led by a Venture Capital fund or other professional institutional investor. Series A financings typically have most or all of these characteristics: The company and the largest ...
Service Provider
An individual or entity that performs services for a service recipient in exchange for compensation or other taxable benefits. Common types of service providers include: Employees. Independent contractors. Outside (non-employee) directors.
Source Code
A collection of computer instructions written in alphanumeric text, using a human-readable computer language such as Ruby on Rails, Java or Python. The source code for a Software program describes specific actions to be performed by a computer or ...
Social Media
Generally, internet or mobile-based applications that allow end-user interaction. While traditional media provided for one-way communication (for example, from a publisher to readers), social media enable bidirectional and multidirectional ...
System Hardening
The process of securing a system by reducing its surface of vulnerability, which is larger when a system performs more functions; in principle, a single-function system is more secure than a multipurpose one. Reducing available ways of attack ...
Switch
A switch serves as a controller, enabling networked devices to talk to each other efficiently. Through information sharing and resource allocation, switches save businesses money and increase employee productivity. What is a Network Switch: ...
Spear Phishing
Phishing attempts directed at specific individuals or companies is known as spear phishing. In contrast to bulk phishing, spear phishing attackers often gather and use personal information about their target to increase their probability of success.
Spam
Email spam, also known as junk email or unsolicited bulk email (UBE), is a subset of spam that involves nearly identical messages sent to numerous recipients by email. Definitions of spam usually include the aspects that email is unsolicited and sent ...
Software-defined security
Software-defined security is a set of the security model in which the information security in a computing environment is regulated and managed by security software. Most of the security controls like segmentation of the network, detection of ...
Software-defined networking
Software-defined networking (SDN) technology is an approach to network management that enables dynamic, programmatically efficient network configuration in order to improve network performance and monitoring, making it more like cloud computing than ...
Software-Defined Data Center
Software-defined data center is a marketing term that extends virtualization concepts such as abstraction, pooling, and automation to all data center resources and services to achieve IT as a service.
Software as a Service (SaaS)
Software as a service is a software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted. It is sometimes referred to as "on-demand software". The remote hosting, management and support ...
Software
Coded instructions that control the operation of a computer or similar electronic device. Software generally exists in one of two forms: Source code. Alphanumeric instructions as originally written by a programmer in any of numerous programming ...
Social Engineering
Social engineering is the art of manipulating people into giving up confidential information, usually through technology. Social engineering aims to take advantage of a potential victim’s natural tendencies and emotional reactions.
SOC-as-a-service
A subscription- or software-based service that manages and monitors your logs, devices, clouds, network and assets for internal IT teams. The service provides companies with the knowledge and skills necessary to combat cyber-security threats.
SMTP
Simple Mail Transfer Protocol; a method of handling outgoing electronic mail.
Smishing
The fraudulent practice of sending text messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords or credit card numbers.
SMB
The Server Message Block Protocol (SMB protocol) provides a method for client applications in a computer to read and write to files on and to request services from server programs in a computer network.
SIEM
Security information and event management (SIEM), software products and services combine security information management (SIM) and security event management (SEM). They provide real-time analysis of security alerts generated by applications and ...
SID
SID is a unique ID number controlled by a computer or domain controller to identify you. The SID is a string of alphanumeric characters set to every user on a windows computer, or to each user, group and computer domain controlled network
Service Level Agreement (SLA)
A service level agreement (SLA) is a contract that establishes a set of deliverables that one party (the service provider) has agreed to provide another (the client). An SLA defines the level of service you can expect from a vendor, laying out the ...
Server
A computer that is responsible for responding to requests made by a client program (e.g., a web browser or an e-mail program) or computer. Also referred to as a “file server”.
Serial port
An interface on a computer that supports transmission of a single bit at a time; can be used for connecting almost any type of external device including a mouse, a modem, or a printer.
Security Operations Center (SOC)
A centralized unit that deals with security issues on an organizational and technical level. A SOC within a building or facility is a central location from where staff supervises the site, using data processing technology. Typically, a SOC is ...
Security Assessment
A cybersecurity risk assessment identifies the various information assets that could be affected by a cyber attack(such as hardware, systems, laptops, customer data, and intellectual property), and then identifies the various risks that could affect ...
SD-WAN
SD-WAN is an acronym for software-defined networking in a wide area network. SD-WAN simplifies the management and operation of a WAN by decoupling the networking hardware from its control mechanism.
SAN
A storage area network (SAN) is a dedicated storage network that provides access to consolidated, block level storage. SANs primarily are used to make storage devices (such as disk arrays, tape libraries, and optical jukeboxes) accessible to servers ...
Search Engine Results Page (SERP)
The page that a search engine returns after a user submits a search query. In addition to organic search results, search engine results pages (SERPs) usually include paid search and pay-per-click (PPC) ads. Thanks to search engine optimization (SEO), ...
Social Media Marketing
Using social media to advertise a brand, products, or services. Social media marketing allows a brand to insert itself into ongoing conversations on channels such as Twitter, Facebook, and Instagram. Best practices for social media marketing include ...
Schema Markup
Bits of code added to a web page that help search engines understand the content of the page. With better understanding comes the ability to format content when it appears on the search engine results page (SERP). Photos of a recipe appear next to ...
Search Engine Marketing (SEM)
Paid advertising on a search engine results page (SERP). This is also called paid search. Search engine marketing (SEM) ads are used to drive traffic to websites but can include other calls to action, such as making a phone call or visiting a local ...
Sitelink
An ad extension that places more than 1 link in a paid search ad. For example, beyond your standard ad copy and call to action, you could add a link to your current sales page or your store hours page. Sitelinks are typically free to use. And just ...
Soft Bounce
An email that is rejected by an email server for a temporary reason. An email may soft bounce if a mailbox is full, the recipient email server is down or offline, or the email message is too large.
Search Engine Optimization (SEO)
Changes made to the content and structure of a website to improve ranking on a search engine results page (SERP). Search engines recommend search engine optimization (SEO) efforts that benefit both the user and page’s ranking (white hat SEO). These ...
SSL
Secure Sockets Layer (SSL) is a method of encryption that protects data being sent between websites. SSL is closely related to Transport Layer Security (TLS), another encryption method, and the two acronyms are often used interchangeably.
Suspense Account
When a transaction with no valid document is recorded, it causes a mismatch in the account balances. These kinds of transactions are recorded under a temporary account called the Suspense Account. After you record such transactions, you can rectify ...
Sundry Debtor
A person who receives goods or services from a business in credit or does not make the payment immediately and is liable to pay the business in the future is called a Sundry Debtor. Businesses use an account to track these transactions and they are ...
Sundry Creditor
A person who gives goods or services to the business in credit or does not receive the payment immediately from the business and is liable to receive the payment from the business in future is called a Sundry Creditor. Businesses use an account to ...
Stock
Goods obtained for resale or manufactured for sale that are yet unsold on any particular date is known as stock. Opening Stock: Value of stock at the beginning of an accounting period. Closing Stock: Value of stock at the end of an accounting period. ...
Next page