Security policy
Security Operation Centre (SOC)
Security monitoring
Security Information & Event Monitoring (SIEM)
Secure Shell (SSH)
Scareware
Sabotage
Rootkit
Rogue Software
Remote Access Trojan (RAT)