- KB >>
- Glossary Terms >>
- GLOSSARY - S
SaaS
SaaS stands for Software as a Service. Is it a new software delivery service in which the program is not hosted in a client's physical location, but directly on a cloud. The software is usually accessible via a web browser. Our HACKAVERT product is an SaaS solution.
SAN Certificate
Subject Alternative Names are extra
domains or subdomains, local domains or IP addresses you can add to your certificate. SAN SSL certificates are also known as multi-domain SSL or Unified Communications (UC) SSL. Unified Communications SSL certificates are especially useful for securing Microsoft Exchange where multiple subdomains and/or machine names need securing. SAN/UC can also save you time and money compared to multiple, single-domain SSL certificates.
Seal-in-Search technology
Developed by Symantec, Seal-in-Search™ technology displays the Norton Secured Seal next to your company’s details when you pop up in search engine results. The Norton Secured Seal gives visitors, customers and potential customers the confidence they need to click through to your secured site. .
Secure Multi-purpose Internet Mail Extensions (S/MIME)
A standard for signing of MIME data. Designed to add security to e-mail messages in MIME format via authentication (using digital signatures) and privacy (using encryption). Learn more about SSL247® Personal IDs.
Secure Site Seal
Secure Site Seal is a symbol (clickable or not), which your visitors can see on your website (on condition that your website is protected by a SSL certificate). It enables you to gain the trust of your customers by showing you invest in SSL to protect them and their information. The best seals will reduce bounce/abandonment rates, improve conversion rates and encourage more visitors to transact with you/your website. It is a false economy not to invest in the best SYMANTEC
Security Check
A Security Check is required for access to certain Government establishments and for jobs involving access to sensitive information which is classified as 'secret'. Our special partner's Penetration Testers have all been Security Checked cleared, proving their capability to work with sensitive information.
SGC
SGC (Server-Gated Cryptography), also known as 'Step-up encryption', is a technology guaranteeing a minimum of 128-bit encryption even in old 40-60 bit capable web browsers. It is the most powerful SSL encryption commercially available today. Without an SGC certificate on the web server, web browsers and operating systems that do not support 128-bit strong encryption will receive only 40- or 56-bit encryption which is weak, insecure encryption. Learn more about SGC technology.
SHA-2 / SHA-254
SHA-2 (and by extension (SHA-224, SHA-256, SHA-384, SHA-512) is a set of cryptographic hash functions. A hash function is an algorithm that transforms (hashes) an arbitrary set of data elements, such as a text file, into a single fixed length value (the hash). SHA-2 is commonly used for encrypting SSL certificates.
Single Root
A single root does not require the installation of an intermediate CA certificate on your server. This kind of certificate is easiest to install and is the only type some appliances will currently accept - but single root certs are being gradually phased out for chained-root SSL certificates.
Smartphone
A smartphone is a cellular telephone built on a mobile computing platform with more advanced computing ability and connectivity than a feature phone. For instance, a smartphone includes an operating system, Web browsing and the ability to run software applications. If you need SSL compatible with smartphones, contact one of our SSL consultants.
SMD file
SMD stands for Signed Mark Data. It is a specific file issued by the TMCH only. You receive it when you register a brand in the TMCH's database. An SMD file is required when you wish to register a domain name with a new extension during a Sunrise Period.
SMTP
SMTP (Simple Mail Transfer Protocol) is a protocol for sending and receiving e-mail messages between servers.
Spam
A spam is an unsolicited e-mail sent to a large number of addresses. It often contains advertising for some products or services and can be used in phishing attacks and other online fraud.
Spim or instant spam
A spim or instant spam is an unsolicited instant message, usually sent in bulk to a large number of Instant Messaging (IM) accounts. Like a spam, it often contains advertising and can be used in phishing attacks or to spread a malware.
Spyware
Spyware is software that collects information about your computer and how you use it and relays that information to someone else over the Internet. Spyware ordinarily runs in the background, and in some cases installs itself on your computer without your knowledge or permission.
SQL Injection
An abbreviation of Structured Query Language, SQL is a programming language used to interact with databases. A code injection is an unwanted request for a website to run malicious code. Hackers usually exploit a weakness in the way a website handles user input to steal information stored in databases or infect visitors to the website.
SSL Accelerator
Normally the SSL handshake and subsequent encryption of data between a browser and the web server is handled by the web server itself. However, for some heavily trafficked sites, the amount of data being sent over SSL means that the web server either becomes overloaded or it simply cannot handle the required number of SSL connections. For such sites an SSL accelerator can help improve the number of concurrent connections and speed of the SSL handshake. SSL accelerators offer the same support for SSL as web servers.
SSL Certificate
An SSL certificate is a file that attests the identity of an internet common name, server or organisation. It is used to encrypt data being exchanged over a network. As well as ensuring data is encrypted and from the intended source, it also ensures integrity - data cannot be modified in transit either. As Web Security Consultants, we offer a large choice of SSL certificates suitable for your security needs.
SSL Encryption
Encryption is the process of transforming information using an algorithm to make it unreadable to anyone except those possessing the matching key.
SSL Handshake
At the beginning of an SSL session, an SSL handshake is performed. This handshake produces the cryptographic parameters of the session.
SSL Port
A port is the "logical connection place" where a browser will connect to a web server. The https port or the SSL port is the port assigned to your web server for SSL traffic. The industry standard port to use for SSL is 443 - that is to say most networks and firewalls expect port 443 to be used for SSL. It is of course possible to use other SSL ports / https ports if required. The standard port used for non-secure (http) traffic is 80.
SSL Proxy
SSL Proxy allows non-SSL aware applications to be secured by SSL.
Step-up encryption
'Step-up encryption' refers to SGC (Server-Gated Cryptography). It's a technology enabling a 128-bit encryption minimum on more than +99% web browsers. It is the most powerful SSL encryption commercially available today. Without an SGC certificate on the web server, web browsers and operating systems that do not support 128-bit strong encryption will receive only 40- or 56-bit encryption.
Subdomains
A subdomain, also called a child domain, is a lower-level component of a domain name. It precedes the domain name. For instance, in the domain name “intranet.ssl247.co.uk”, "intranet" is a subdomain of the domain "ssl247.co.uk". To secure multiple subdomains with just one SSL certificate, choose a Wildcard SSL certificate.
Sunrise Period
Each time a new gTLD is released, there is a first registration phase called Sunrise period. It is a precise period of time during which only trademark owners who registered their brands to the Trademark Clearinghouse (TMCH) database can register a domain name with the newly released extension.
Symantec
Symantec SSL, formerly VeriSign SSL, is a Certification Authority. As the most trusted online security provider, this Authority has been chosen by all Fortune 500 companies to secure their businesses and their customers. SYMANTEC
Symmetric encryption or Symmetric cryptography
Symmetric encryption or Symmetric cryptography is a form of encryption using the same secret key to encrypt and decrypt messages (contrary to asymmetric encryption which uses two different keys).
Explorar la Knowledge Base
Cookies
SSL247® utiliza cookies para proporcionarle una experiencia de usuario sin fisuras. Para obtener más información, por favor lea nuestras Condiciones de Venta
Continuar