Ransomware Glossary (S)

  • Ransomware Glossary (S)

This glossary is from Learning Ransomware Response & Recovery by W. Curtis Preston and Dr. Mike Saylor. Browse all letters of the glossary or get the book.

SaaS (Software as a Service) – Cloud computing service delivering applications over the internet on a subscription basis.

SAN (Storage Area Network) – High-speed network providing block-level storage access to multiple servers.

Sandbox – Isolated environment for safely executing suspicious code or testing systems without risking production environments.

Sandbox Environment – Isolated network environment used to safely restore, test, and verify systems without risk of reinfecting production.

Sandbox/Sandboxing – Isolated environment for safely executing and analyzing malicious software without risking production systems.

SANITIZE – Advanced storage device command that performs even more thorough data clearing than SECURE ERASE.

Scheduled Tasks – Automated jobs in operating systems where malware can install persistence mechanisms to restart after cleaning attempts.

Scientific Working Group on Digital Evidence (SWGDE) – Organization establishing standards for digital evidence handling.

Security Account Manager (SAM) – Windows database storing user passwords and security information.

Security Information and Event Management (SIEM) – Platform that aggregates and analyzes security logs from across an environment to detect threats.

Security Orchestration Automation and Response (SOAR) – Platform that automates security responses based on predefined playbooks.

Segregation/Segmentation – Separating systems, networks, or data into isolated sections to improve security and limit attack spread.

SEM (Security Event Management) – Real-time monitoring and analysis of security events; combined with SIM to create SIEM.

Service Account – Account used by applications or services to access resources, distinct from user accounts.

Service Level Agreement (SLA) – Formal agreement defining expected service levels, response times, and performance metrics.

SFTP (Secure File Transfer Protocol) – Encrypted file transfer protocol often monitored for data exfiltration attempts.

SHA256 – Cryptographic hash algorithm producing unique 256-bit fingerprints for verifying file integrity.

SIEM (Security Information and Event Management) – Platform combining log collection, normalization, correlation, and compliance reporting across entire IT environment.

SIM (Security Information Management) – Long-term log storage and analysis for compliance; combined with SEM to create SIEM.

SLA (Service Level Agreement) – Contract defining expected service quality, response times, and responsibilities with vendors or MSPs.

SMB (Server Message Block) – Common file-sharing protocol and frequent target for ransomware spread; SMBv1 has well-known vulnerabilities.

SMB/SMBv1 (Server Message Block) – Protocol for file sharing in Windows networks; SMBv1 has known vulnerabilities exploited by ransomware.

Snapshot – Point-in-time copy of a virtual machine or storage volume that captures the exact state including memory and disk contents.

SOAR (Security Orchestration, Automation, and Response) – Platform that automates and coordinates security responses across multiple tools and systems.

SOC (Security Operations Center) – Team or facility where security monitoring, detection, and incident response activities occur 24/7.

Social Engineering – Manipulation techniques that trick people into divulging confidential information or taking harmful actions.

SOX (Sarbanes-Oxley Act) – U.S. financial regulation requiring controls over financial reporting systems and data.

Static Analysis – Security analysis examining files on disk without executing them, versus dynamic analysis which runs the code.

Stolen Credentials – Usernames and passwords obtained through phishing, breaches, or other means, used for unauthorized access.

Supply Chain Attack – Attack compromising trusted software updates or third-party tools to distribute malware.

SWOT Analysis – Framework examining Strengths, Weaknesses, Opportunities, and Threats to understand situations and plan improvements.

Synthetic Full Backup – A backup created by combining existing full and incremental backups without re-copying data from source systems.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.