© fandijki/ShutterStock, Inc.

APPENDIX
B

Standard Acronyms

3DES triple data encryption standard

ACD automatic call distributor

AES Advanced Encryption Standard

ANSI American National Standards Institute

AP access point

API application programming interface

B2B business to business

B2C business to consumer

BBB Better Business Bureau

BCP business continuity planning

C2C consumer to consumer

CA certificate authority

CAP Certification and Accreditation Professional

CAUCE Coalition Against Unsolicited Commercial Email

CCC CERT Coordination Center

CCNA Cisco Certified Network Associate

CERT Computer Emergency Response Team

CFE Certified Fraud Examiner

CISA Certified Information Systems Auditor

CISM Certified Information Security Manager

CISSP Certified Information System Security Professional

CMIP Common Management Information Protocol

COPPA Children’s Online Privacy Protection

CRC cyclic redundancy check

CSI Computer Security Institute

CTI Computer Telephony Integration

DBMS database management system

DDoS distributed denial of service

DES Data Encryption Standard

DMZ demilitarized zone

DoS denial of service

DPI deep packet inspection

DRP disaster recovery plan

DSL digital subscriber line

DSS Digital Signature Standard

DSU data service unit

EDI Electronic Data Interchange

EIDE Enhanced IDE

FACTA Fair and Accurate Credit Transactions Act

FAR false acceptance rate

FBI Federal Bureau of Investigation

FDIC Federal Deposit Insurance Corporation

FEP front-end processor

FRCP Federal Rules of Civil Procedure

FRR false rejection rate

FTC Federal Trade Commission

FTP file transfer protocol

GIAC Global Information Assurance Certification

GLBA Gramm-Leach-Bliley Act

HIDS host-based intrusion detection system

HIPAA Health Insurance Portability and Accountability Act

HIPS host-based intrusion prevention system

HTTP hypertext transfer protocol

HTTPS HTTP over Secure Socket Layer

HTML hypertext markup language

IAB Internet Activities Board

IDEA International Data Encryption Algorithm

IDPS intrusion detection and prevention

IDS intrusion detection system

IEEE Institute of Electrical and Electronics Engineers

IETF Internet Engineering Task Force

InfoSec information security

IPS intrusion prevention system

IPSec IP Security

IPv4 Internet protocol version 4

IPv6 Internet protocol version 6

IRS Internal Revenue Service

(ISC)2 International Information System Security Certification Consortium

ISO International Organization for Standardization

ISP Internet service provider

ISS Internet security systems

ITRC Identity Theft Resource Center

IVR interactive voice response

LAN local area network

MAN metropolitan area network

MD5 Message Digest 5

modem modulator demodulator

NFIC National Fraud Information Center

NIDS network intrusion detection system

NIPS network intrusion prevention system

NIST National Institute of Standards and Technology

NMS network management system

OS operating system

OSI open system interconnection

PBX private branch exchange

PCI Payment Card Industry

PGP Pretty Good Privacy

PKI public key infrastructure

RAID redundant array of independent disks

RFC Request for Comments

RSA Rivest, Shamir, and Adleman (algorithm)

SAN storage area network

SANCP Security Analyst Network Connection Profiler

SANS SysAdmin, Audit, Network, Security

SAP service access point

SCSI small computer system interface

SET Secure electronic transaction

SGC server-gated cryptography

SHA Secure Hash Algorithm

S-HTTP secure HTTP

SLA service level agreement

SMFA specific management functional area

SNMP Simple Network Management Protocol

SOX Sarbanes-Oxley Act of 2002 (also Sarbox)

SSA Social Security Administration

SSCP Systems Security Certified Practitioner

SSL Secure Sockets Layer

SSO single system sign-on

STP shielded twisted cable

TCP/IP Transmission Control Protocol/Internet Protocol

TCSEC Trusted Computer System Evaluation Criteria

TFTP Trivial File Transfer Protocol

TNI Trusted Network Interpretation

UDP User Datagram Protocol

UPS uninterruptible power supply

UTP unshielded twisted cable

VLAN virtual local area network

VOIP Voice over Internet Protocol

VPN virtual private network

WAN wide area network

WLAN wireless local area network

WNIC wireless network interface card

W3C World Wide Web Consortium

WWW World Wide Web

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
13.59.236.219