АБВГДЕЖЗИКЛМНОПРСТУФХЦЧШЭЯ ABCDEFGHIKLMNOPQRSTUVWZ SafeguardSandboxScramblerSecond preimage resistant hash functionSecret exchange protocolSecret keySecret key cryptosystem, symmetric cryptosystemSecret sharing protocolSecret sharing schemeSecure codingSecure electronic signature deviceSecure hash standard (SHS)Secure messaging encryptionSecure operating systemSecure signature creation device, SSCDSecure stateSecure wipeSecuritySecurity administratorSecurity architectureSecurity attributeSecurity auditSecurity domainSecurity evaluationSecurity event management (SEM)Security flawSecurity functionSecurity function policySecurity gatewaySecurity goalSecurity information and event management (SIEM)Security information management (SIM)Security kernelSecurity kernelSecurity labelSecurity objectiveSecurity objectiveSecurity of a cryptographic primitiveSecurity operation center, SOCSecurity policySecurity policy modelSecurity policy violatorSecurity policy violator’s modelSecurity policysSecurity serviceSecurity servicesSecurity system violationSecurity targetSecurity violationSelective field integritySelective forgerySelf-service cash-in terminalSemiformalSender authenticationSensitive dataSensitive informationSeparation of dutiesSequential key searchSequential key searchSerial testSertification authorityServiceSession encryptionSession keyShadow copy serviceShare, secret shareShared accessSignature generation algorithmSignature generation algorithmSignature keySignature spaceSignature verification algorithmSignature verification dataSimmons authentication theorySingle sign-on (SSO)SkimmingSmart contractSnifferSnifferSniffingSocial engineeringSoftwareSoftware cryptographic mechanismSoftware disseminationSoftware encryptionSoftware modificationSoftware security moduleSolution Свойство документа, определяющее, что ни в его содержательную, ни в реквизитную части не вносилось никаких изменений [ ГОСТ 2.051-2013 ].Space complexitySpamSplit knowledgeSpoofingSpoofing attackSpywareSQL injectionStandardStandardizationStandardization guidelinesStatistical cryptanalysisSteganographyStep (of a protocol), protocol actionStream cipher ciphering moduleStream cipher control moduleStream ciphering systemStream encryption algorithm, stream cipherStrength of functionSubjectSubjectSubjectSubstitutionSubstitution cipherSupervisory control and data acquisition (SCADA)SynchrosignalSystemSystem availabilitySystem of protection from unauthorized access to informationSystem securitySystem viability