S-BGP je prijedlog arhitekture koja bi trebala povećati sigurnost BGP protokola koji u svojoj osnovnoj inačici nema mehanizme autentikacije. U S-BGP arhitekturi koristi se infrastruktura javnog ključa (PKI) i razni certifikati za povećanje sigurnosti.
S-BGP is proposed architecture which should increase the security of the BGP protocol because BGPm in its basic versionm has no authentication mechanisms. The S-BGP architecture uses public key infrastructure (PKI) and various certificates for increased security.
http://www.ir.bbn.com/sbgp/
http://zvon.org/comp/r/ref-Security_Glossary.html#Terms~Secure_BGP_%28S-BGP%29

S/MIME je sigurnosni standard koji koristi arhitekturu javnog ključa za šifriranje i potpisivanje MIME podataka. S/MIME omogućuje autentikaciju, čuva integritet poruka, privatnost i sigurnost poruka.
S/MIME is a standard for public key encryption and signing of MIME data. S/MIME provides the following cryptographic security services for electronic messaging applications: authentication, message integrity, privacy and data security (using encryption).
http://www.rsa.com/rsalabs/node.asp?id=2292
http://www.imc.org/smime-pgpmime.html
http://datatracker.ietf.org/wg/smime/charter/

Kriptografska metoda koja se koristi za otežavanje napada rječnikom prilikom pogađanja lozinke. Nasumični niz bitova se dodaje lozinki prije nego što se proizvede sažetak (koristeći SHA1, MD5 ili neki drugi algoritam). Napadač mora postojeći rječnik ponovno proizvesti sa odgovarajućom salt vrijednošću (spomenuti nasumični niz bitova) što produljuje vrijeme potrebno za otkrivanje lozinke.
A cryptographic method used to restrict dictionary attacks against an encoded value. A random array of bits is added to the original value before a one way hash is produced (using a one way hash function like MD5 or SHA1). The attacker must then compute his dictionary again with the new bits (or salt value).
http://www.ucertify.com/article/salt-cryptography.html
http://www.bookrags.com/wiki/Salt_%28cryptography%29
http://www.enotes.com/topic/Salt_%28cryptography%29

Security Assertion Markup Language(SAML) je XML zasnovani otvoreni standard za razmjenu autentikacijskih i autorizacijskih podataka između sigurnosnih domena, odnosno između pružatelja identiteta i pružatelja usluga.
Security Assertion Markup Language (SAML) is an XML based open standard for exchanging authentication and authorization data between security domains, that is, between an identity provider and a service provider.
http://xml.coverpages.org/saml.html
http://searchfinancialsecurity.techtarget.com/definition/SAML
http://sigurnost.lss.hr/documents/LinkedDocuments/CCERT-PUBDOC-2009-10-279.pdf
http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=security

Protokol za objavu sjednice i njenog opisa. Pokretač sjednice periodički šalje objavu sjednice, a potencijali sudionici sjednice osluškuju unaprijed poznatu priključnicu i IP adresu. Ukoliko su zainteresirani, mogu se pridružiti sjednici.
Protocol for broadcasting session and session description. Session initiator periodically sends session announcement and potential participants listen to wel-known port and IP adress. If they are interested, they can join the session.
http://tools.ietf.org/html/rfc2974
http://www.cl.cam.ac.uk/~jac22/books/mm/book/node184.html
http://www.protocolbase.net/protocols/protocol_SAP.php

U telekomunikacijama i programskom inženjerstvu, razmjerni rast je sposobnost sustava, mreže ili procesa da obradi rastući količinu zadataka na zadovoljavajući način, odnosno na njegovu sposobnost da bude dovoljno velik da smjesti taj porast.
In telecommunications and software engineering, scalability is the ability of a system, network or process to handle growing amounts of work in a graceful manner or its ability to be enlarged to accommodate that growth.
http://searchdatacenter.techtarget.com/definition/scalability
http://www.royans.net/arch/what-is-scalability/

Protokol koji definira format za opis sjednice. Ne koristi se za pokretanje sjednice i dostavu medijskih paketa nego za pregovaranje o tipovima medijskih podataka, formatima i ostalim parametrima.
Protocol that defines format for session description. SDP does not iniciate sessions and deliver media itself but is used for negotiation between end points of media type, format, and all associated properties.
http://searchunifiedcommunications.techtarget.com/definition/SDP
http://www.ietf.org/rfc/rfc2327.txt
http://tools.ietf.org/html/rfc4566

Opisuje sekundarni mehanizam autentifikacije koji se koristi kada korisnik ne može koristiti primarni mehanizam autentikacije. Na primjer, ako korisnik zaboravi svoju lozinku, sustav može korisnika zatražiti da otkriju svoje tajno pitanje/odgovor. U ovom slučaju, tajno pitanje/odgovor je sekundarni mehanizam autentifikacije.
Describes a secondary authentication mechanisms which is used when the user is unable to use the primary authentication mechanism. For example, if a user forgets their password, the system can ask them to reveal their secret question/answer. In this case, the secret question/answer would be the fallback authentication mechanism.
http://sawaal.ibibo.com/computers-and-accessories/what-fallback-authentication-that-how-set-up-authentication-among-computers-not-running-same-domain-544798.html

Označava jedinstveni identifikator koji se razlikuje od svojih prethodnika i sljedbenika za određenu vrijednost. Danas se često koristi u autentifikaciji programskih proizvoda, a vrijednosti samog serijskog broja poprimaju i alfanumeričke znakove kako bi se povećao broj mogućih identifikatora.
A serial number is a unique number assigned for identification which varies from its successor or predecessor by a fixed discrete integer value. Common usage has expanded the term to refer to any unique alphanumeric identifier for one of a large set of objects.
http://pcsupport.about.com/od/termss/g/serial-number.htm

Simetrični kriptografski algoritam za šifriranje blokova podataka. Bio je jedan od kandidata prilikom odabira AES algoritam, bio je na drugom mjestu, dok je prvo mjesto pripalo algoritmu Rijndael. Algoritam Serpent su napravili Ross Anderson, Eli Biham i Lars Knudsen. Algoritam koristi ključeve veličine 128, 192 i 256 bita te blokove veličine 128 bita.
Serpent is a symmetric key block cipher which was a finalist in the Advanced Encryption Standard (AES) contest, where it came second to Rijndael. Serpent was designed by Ross Anderson, Eli Biham, and Lars Knudsen. Serpent has a block size of 128 bits and supports a key size of 128, 192 or 256 bits.
http://neohumanism.org/s/se/serpent_encryption_algorithm.html

SGML (eng. Standard Generalized Markup Language) je ISO-standardna tehnologija (ISO 8879:1986 SGML) za definiranje standardnog označnog jezika za formatiranje dokumenata.
SGML (Standard Generalized Markup Language) is an ISO-standard technology (ISO 8879:1986 SGML) for defining generalized markup languages for documents.
http://www.shorelinerecordsmanagement.com/customer-service/education-center/a-guide-to-sgml---standard-generalized-markup-language/
http://www.webopedia.com/TERM/S/SGML.html
http://www.w3.org/MarkUp/SGML/

SHA-1 je jedan od najpopularnijih hashing algoritama, a služi za provjeru autentičnosti datoteka ili poruke prilikom prijenosa između pošiljaoca i primatelja. Koristi se za generiranje sažetaka poruka, kao izlaz daje 160-bitni sažetak dobiven miješanjem 512-bitnih blokova. SHA-1 je nasljednik MD-5 i koristi se u raznim sigurnosnim programima ili u protokolima kao što su: TLS, SSL, PGP, SSH, S/MIME, i IPsec.
In cryptography, SHA-1 is a cryptographic hash function that produces a 160-bit message digest based on principles similar to those used the MD5 algorithm. SHA-1 produces a 160-bit (20 byte) message digest. Although slower than MD5, this larger digest size makes it stronger against brute force attacks.
http://www.zemris.fer.hr/predmeti/os2/SHA-1.html
http://www.secure-hash-algorithm-md5-sha-1.co.uk/
http://www.faqs.org/rfcs/rfc3174.html

U kriptografiji označava proces obrade podataka (izvorni tekst) koristeći kriptografski algoritam kako bi podatci bili nečitljivi svima osim onome tko posjeduje tajni ključ za dešifriranje podataka.
In cryptography, encryption is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key.
http://www.webopedia.com/TERM/E/encryption.html
http://searchsecurity.techtarget.com/definition/encryption

Sigurnosna stijena (engl. Firewall) je skup komunikacijskih nakupina koji služe kako bi odvojili privatnu mrežu od javne. Sastoje se od programa koji služe kako bi pratili i upravljali promet između računala i mreža. Sigurnosne stijene mogu propuštati, blokirati, šifrirati promet na temelju pravila koja korisnik postavlja.
A firewall is a set of related programs, located at a network gateway server, that protects the resources of a private network from users from other networks. Basically, a firewall, working closely with a router program, examines each network packet to determine whether to forward it toward its destination.
http://searchsecurity.techtarget.com/definition/firewall
http://kb.iu.edu/data/aoru.html

Čip tehnologija koja se koristi u mobilnim uređajima, a sadrži podatke i aplikacijsku logiku za pristup uslugama koje nudi davatelj. Sadrži jedinstveni identifikator IMSI koji identificira pretplatnika kojem pripada kartica. Koristi se u GSM mrežama, a danas je zamijenjena USIM i 3G karticama.
A subscriber identity module or subscriber identification module (SIM) is an integrated circuit which securely stores the service-subscriber key (IMSI) used to identify a subscriber on mobile telephony devices.
http://www.tech-faq.com/subscriber-identity-module-sim.html
http://searchmobilecomputing.techtarget.com/definition/SIM-card
http://www.wisegeek.com/what-is-a-sim-card.htm

Konstrukcijski oblikovni obrazac koji se koristi kada je potrebno osigurati da uvjek postoji samo jedna instanca objekta za vrijeme izvođenja aplikacije. Korištenjem jedne instance je pogodno kada postoje različite konkurentne operacije (npr. zapisivanje u datoteku) jer se time sprječavaju "sudari" budući da samo jedna instanca radi upis.
A constructional design pattern used to restrict the number of instances for a given class. Using one instance is useful when one wishes to avoid concurrences or deadlocks.
http://www.dofactory.com/Patterns/PatternSingleton.aspx
http://www.fluffycat.com/Java-Design-Patterns/Singleton/

SIP protokol se koristi za uspostavu, izmjenu i raskid sjednice između dva ili više sudionika koje koriste jedan ili više medijskih struja podataka. SIP koristi mehanizam zahtjeva i odgovora slično kao HTTP, a može raditi zajedno s nekoliko drugih protokola poput SDP protokola.
SIP protocol can be used for creating, modifying and terminating two-party or multiparty sessions consisting of one or several media streams. SIP employs design elements similar to the HTTP request/response transaction model and works in concert with several other protocols such as SDP protocol.
http://searchunifiedcommunications.techtarget.com/definition/Session-Initiation-Protocol
http://www.ietf.org/rfc/rfc3261.txt

Zasebna organizacija u IEEE organizaciji koja se bavi sigurnosnim rješenjima za zaštitu podataka na mediju i upravljanjem ključevima.
The IEEE Security in Storage work group (SISWG) is working on standards related to encrypted storage media, including both encryption and key management.
http://siswg.net/index.php

Prisluškivanje mreže, prometa ili paketa. Prisluškivanjem bežične ili žične mreže napadač analizira pakete kako bi došao do željene informacije. Protiv toga se može boriti zaštitom pristupa fizičkoj mreži ili kriptiranjem sadržaja paketa. Problem s kriptiranjem je da se zaglavlja paketa ne kriptiraju, a sadrže informacije korisne napadaču.
Network, traffic or packet sniffing is an attack technique to acquire useful information from target system by eavesdropping of physical communication lines or ether of wireless networks. Protection is either by restricting physical access to cables or by encrypting the content of the packages. The problem with encrypting is that packet headers are not encrypted, although they contain valuable information for an attacker.
http://www.iss.net/security_center/advice/Underground/Hacking/Methods/Technical/Packet_sniffing/default.htm http://computer.howstuffworks.com/carnivore2.htm

SNR je mjera koja uspoređuje razinu željenog signala u odnosu na pozadinski šum. Računa se kao omjer snage signala i snage šuma, najčešće u logaritamskoj skali. U pravilu su poželjne veće vrijednosti SNR.
SNR is a measure that compares the level of a desired signal to the level of background noise. It is calculated as the ratio of signal power to the noise power usually in logarithmic scale. Typically, higher values of SNR are desirable.
http://searchnetworking.techtarget.com/definition/signal-to-noise-ratio
http://stereos.about.com/od/faqs/f/SNratio.htm
http://www.bcae1.com/sig2nois.htm

Protokol koji služi za izmjenu strukturiranih informacija web usluga u računalnim mrežama. Za prijenos sadržaja se koristi jezik XML i koristi protokole na aplikacijskom sloju za prijenos podataka.
A protocol used for exchanging information between web services across a network. XML is used as a means of communication.
http://www.w3.org/TR/soap/
http://www.w3schools.com/soap/default.asp

SOAP (eng. Simple Object Access Protocol) je protokol za razmjenu strukturiranih podataka u implementaciji Web servisa u računalnim mrežama. Oslanja se na XML (eng. Extensible Markup Language) za definiranje oblika poruke te se obično oslanja na druge protokole aplikacijskog sloja, od kojih su najpoznatiji RPC (eng. Remote Procedure Call) i HTTP (eng. Hypertext Transfer Protocol), za pregovaranje i prijenos poruka.
SOAP (Simple Object Access Protocol) is a protocol specification for exchanging structured information in the implementation of Web Services in computer networks. It relies on XML (Extensible Markup Language) for its message format, and usually relies on other Application Layer protocols, most notably RPC (Remote Procedure Call) and HTTP (Hypertext Transfer Protocol), for message negotiation and transmission.
http://hrcak.srce.hr/55559
http://www.w3schools.com/soap/default.asp
http://www.soapuser.com/basics1.html

Arhitektura soBGP povećava sigurnost BGP protokola, koji u svojoj osnovnoj inačici, nema mehanizme autentikacije. U soBGP arhitekturi koristi se hijerarhijska infrastruktura javnog ključa i razni certifikati za povećanje sigurnosti.
Architecture soBGP increases security of BGP protocol, which in its basic version, has no authentication mechanisms. The soBGP architecture uses a hierarchical public key infrastructure and various certificates for increased security.
http://www.networkworld.com/details/6485.html
http://tools.ietf.org/html/draft-weis-sobgp-certificates-01

Društveni inženjering je oblik zavaravanja ljudi (a ne računala) kako bi obavili određene radnje ili izdali povjerljive informacije. Glavni cilj društvenog inženjeringa je prikupljanje informacija pomoću kojih će napadač lakše napasti informacijskih sustav ili ostvariti neovlašten pristup.
Social engineering is the act of manipulating people into performing actions or divulging confidential information, rather than by breaking in or using technical cracking techniques. While similar to a confidence trick or simple fraud, the term typically applies to trickery or deception for the purpose of information gathering, fraud, or computer system access; in most cases the attacker never comes face-to-face with the victim.
http://searchsecurity.techtarget.com/definition/social-engineering
http://www.social-engineer.org/
http://www.webopedia.com/TERM/S/social_engineering.html

Zakon o zaustavljanju online piratstva (SOPA) je zakon predložen u američkom Predstavničkom domu u listopadu 2011. godine s ciljem provođenja borbe protiv nedopuštenog online trgovanja intelektualnim vlasništvom i krivotvorenom robom.
SOPA is a law proposed in the U.S. House of Representatives in October 2011. with the aim of conducting the fight against unauthorized online trading of intellectual property and counterfeit goods.
http://gizmodo.com/5877000/what-is-sopa
http://en.wikipedia.org/wiki/Stop_Online_Piracy_Act

SPIT ili VoIP spam su neželjeni, automatski i unaprijed snimljeni pozivi koji koriste IP mrežu za prijenos govora (VoIP). SPIT je sličan e-mail spamu.
SPIT or VoIP spam is unwanted, automatically dialed, pre-recorded phone calls using Voice over Internet Protocol (VoIP). SPIT is similar to e-mail spam.
http://searchunifiedcommunications.techtarget.com/definition/SPIT
http://blog.tmcnet.com/blog/rich-tehrani/voip/preventing-spam-over-internet-telephony.html

Špijunski program (engl. Spyware) je program koji se tajno instalira na računalu kako bi presretao ili potpuno preuzeo kontrolu nad računalom bez dozvole korisnika. Iako bi se iz naziva moglo zaključiti da samo špijunira rad korisnika, većina Spyware-a radi puno više od toga. Mogu služiti kako bi sakupljali informacije o korisniku, mijenjali početnu stranicu u Internet pregledniku, instalirali dodatne programe na računalo i drugo.
Spyware is any technology that aids in gathering information about a person or organization without their knowledge. On the Internet (where it is sometimes called a spybot or tracking software), spyware is programming that is put in someone's computer to secretly gather information about the user and relay it to advertisers or other interested parties.
http://os2.zemris.fer.hr/ns/2008_Mackovic/Spyware.htm
http://searchsecurity.techtarget.com/definition/spyware
http://www.cexx.org/whatis.htm

SQL je programski jezik za pohranu, upravljanje i dohvat podataka pohranjenih u relacijskoj bazi podataka. SQL je najrašireniji programskih jezik za upravljanje bazama podataka.
SQL is a computer language designed for storing, manipulating and querying data stored in relational databases. SQL is most widely used database language.
http://www.1keydata.com/sql/sql.html
http://searchsqlserver.techtarget.com/definition/SQL
http://www.webmajstori.net/clanci/programiranje/uvod-u-baze-podataka-i-sql/92/

Napadačka tehnika koja koristi sigurnosnu ranjivost kod pristupa web programa bazi podataka. Na taj način moguće je ugroziti sigurnost web programa koji konstruira SQL upite iz podataka koje su unijeli korisnici.
SQL injection is a code injection technique that exploits a security vulnerability occurring in the database layer of an application. The vulnerability is present when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and thereby unexpectedly executed. It is an instance of a more general class of vulnerabilities that can occur whenever one programming or scripting language is embedded inside another.
https://www.owasp.org/index.php/SQL_Injection
http://os2.zemris.fer.hr/ns/malware/2007_zelanto/sql.html
http://msdn.microsoft.com/en-us/library/ms161953.aspx

Sigurnosna ljuska (eng. Secure Shell, SSH) je mrežni protokol za siguran prijenos podataka, udaljeno upravljanje i prijavljivanje te pružanje ostalih sigurnih mrežnih usluga između dva računala povezana sigurnim kanalom preko nesigurne mreže. SSH koristi kriptografiju javnog ključa za autentikaciju udaljenog računala te omogućuje autentikaciju korisnika, ako je to potrebno.
Secure Shell (SSH) is a network protocol for secure data transmission, remote controlling, remote logging and for other secure network services between two computers connected with secure channel over an insecure network. SSH uses public key cryptography for both connection and authentication of remote user and computer.
http://searchsecurity.techtarget.com/definition/Secure-Shell
http://www.techterms.com/definition/ssh
http://en.wikipedia.org/wiki/Secure_Shell

Single sign-on (SSO) je način kontrole pristupa s više povezanih, ali neovisnih softverskih sustava. Uz ovakvu kontrolu pristupa korisnik se mora prijaviti samo jednom i dobiva pristup svim sustavima bez potrebe prijavljivanja u svakog od njih.
Single sign-on (SSO) is a property of access control of multiple related, but independent software systems. With this property a user logs in once and gains access to all systems without being prompted to log in again at each of them.
http://searchsecurity.techtarget.com/definition/single-sign-on
http://www.opengroup.org/security/sso/
http://www.authenticationworld.com/Single-Sign-On-Authentication/

Metoda autentifikaciju korisnika na temelju prethodno registriranih pitanja i odgovora. Tijekom registracije korisnik mora odabrati pitanje te odgovoriti na isto. Tijekom procesa autentikacije, korisnik mora dati istu odgovor kao prilikom registracije.
A user authentication method based on previously registered questions and answers. During registration, a user must answer a chosen question. During the authentication process, the user must provide the same answer.
http://security.stackexchange.com/questions/31711/static-vs-dynamic-vs-challenge-response

Preklopnik je uređaj koji upravlja protokom podataka između dijelova lokalne računalne mreže. Za razliku od usmjeritelja, preklopnik dijeli mrežni promet te ga šalje na određena odredišta, dok usmjeritelj šalje podatke na sve uređaje koji su u mreži.
Switch is a device that manages data flow between parts of a local network. Unlike hub, switch divides network traffic and sends it to a particular destination, while hub sends data to all devices in the network.
http://en.wikipedia.org/wiki/Network_switch
http://www.phy.hr/~dandroic/nastava/rm/hub_vs_switch.pdf
