SSL 3.0: The latest revision of SSL that was deprecated in 2015
SSL/TLS Client Certificate: Certificates that are bound to clients and are used to authenticate the client to the server, allowing access control to a SSL/TLS service
SSL/TLS Server Certificate: A certificate that a web server presents to a client as part of the initial secure setup of an SSL, TLS connection
StartTLS: It permits a client to communicate using LDAP v3 over TLS
Steganography: The practice of hiding information from observers, but not encoding it
Stream ciphers: It takes a stream of input and encrypts the stream one character or one digit at a time, outputting one encrypted character or digit at a time
Subject: This field contains identifying information about the entity the certificate was issued to
Subject Public Key Info: These two subfields define the algorithm of the public key along with the public key itself
Substitution cipher:An encryption mechanism that replaces parts of your plaintext with ciphertext
Symmetric key algorithm: Encryption algorithms that use the same key to encrypt and decrypt messages
SYN flood: The server is bombarded with SYN packets
T
TACACS+: It is a device access AAA system that manages who has access to your network devices and what they do on them
Tailgating:Gaining access into a restricted area or building by following a real employee in
Tcpdump: It's a super popular, lightweight command-line based utility that you can use to capture and analyze packets
Threat: The possibility of danger that could exploit a vulnerability
Threats & password policies: Protects Data & IP, Data Protection, Infrastructure Defense, Identity Management, and users
Ticket granting service (TGS):It decrypts the Ticket Granting Ticket using the Ticket Granting Service secret key, which provides the Ticket Granting Service with the client Ticket Granting Service session key