The title for the appendix section of the book.

Description

© SidorArt/Shutterstock.

Appendix B
Standard Acronyms

ACDautomatic call distributor
AESAdvanced Encryption Standard
ALEannual loss expectancy
ANSIAmerican National Standards Institute
AOauthorizing official
APaccess point
APIapplication programming interface
APTadvanced persistent threat
AROannual rate of occurrence
ATMasynchronous transfer mode
AUPacceptable use policy
AVantivirus
B2Bbusiness to business
B2Cbusiness to consumer
BBBBetter Business Bureau
BCbusiness continuity
BCPbusiness continuity plan
BGP4Border Gateway Protocol 4 for IPv4
BIAbusiness impact analysis
BYODBring Your Own Device
C2Cconsumer to consumer
CAcertificate authority
CACCommon Access Card
CAN-SPAMControlling the Assault of Non-Solicited Pornography and Marketing Act
CAPCertification and Accreditation Professional
CAUCECoalition Against Unsolicited Commercial Email
CBAcost-benefit analysis
CBFcritical business function
CBKcommon body of knowledge
CCCCERT Coordination Center
CCNACisco Certified Network Associate
CDRcall-detail recording
CERTComputer Emergency Response Team
CFECertified Fraud Examiner
C-I-Aconfidentiality, integrity, availability
CIPAChildren’s Internet Protection Act
CIRcommitted information rate
CIRTcomputer incident response team
CISACertified Information Systems Auditor
CISMCertified Information Security Manager
CISSPCertified Information System Security Professional
CMIPCommon Management Information Protocol
CMMICapability Maturity Model Integration
CNAcomputer network attack
CNDcomputer network defense
CNEcomputer network exploitation
COPPAChildren’s Online Privacy Protection Act
COSclass of service
CRCcyclic redundancy check
CSACloud Security Alliance
CSFcritical success factor
CSIComputer Security Institute
CSPcloud service provider
CTIComputer Telephony Integration
CVECommon Vulnerabilities and Exposures
DACdiscretionary access control
DBMSdatabase management system
DCSdistributed control system
DDoSdistributed denial of service
DEPdata execution prevention
DESData Encryption Standard
DHCPv6Dynamic Host Configuration Protocol v6 for IPv6
DHSDepartment of Homeland Security
DIADefense Intelligence Agency
DISAdirect inward system access
DMZdemilitarized zone
DNSDomain Name Service OR Domain Name System
DoDDepartment of Defense
DoSdenial of service
DPIdeep packet inspection
DRdisaster recovery
DRPdisaster recovery plan
DSLdigital subscriber line
DSSDigital Signature Standard
DSUdata service unit
EDIElectronic Data Interchange
EIDEEnhanced IDE
ELINTelectronic intelligence
EPHIelectronic protected health information
EULAEnd-User License Agreement
FACTAFair and Accurate Credit Transactions Act
FARfalse acceptance rate
FCCFederal Communications Commission
FDICFederal Deposit Insurance Corporation
FEPfront-end processor
FERPAFamily Educational Rights and Privacy Act
FIPSFederal Information Processing Standard
FISMAFederal Information Security Management Act
FRCPFederal Rules of Civil Procedure
FRRfalse rejection rate
FTCFederal Trade Commission
FTPFile Transfer Protocol
GAAPgenerally accepted accounting principles
GIACGlobal Information Assurance Certification
GigEGigibit Ethernet LAN
GLBAGramm-Leach-Bliley Act
HIDShost-based intrusion detection system
HIPAAHealth Insurance Portability and Accountability Act
HIPShost-based intrusion prevention system
HTMLHypertext Markup Language
HTTPHypertext Transfer Protocol
HTTPSHypertext Transfer Protocol Secure
HUMINThuman intelligence
IaaSInfrastructure as a Service
IABInternet Activities Board
ICMPInternet Control Message Protocol
IDEAInternational Data Encryption Algorithm
IDPSintrusion detection and prevention
IDSintrusion detection system
IEEEInstitute of Electrical and Electronics Engineers
IETFInternet Engineering Task Force
IGPInterior Gateway Protocol
IMINTimagery intelligence
InfoSecinformation security
IPintellectual property OR Internet Protocol
IPSintrusion prevention system
IPSecInternet Protocol Security
IPv4Internet Protocol version 4
IPv6Internet Protocol version 6
IS-ISintermediate system-to-intermediate system
(ISC)2International Information System Security Certification Consortium
ISOInternational Organization for Standardization
ISPInternet service provider
ISSInternet security systems
ITILInformation Technology Infrastructure Library
ITRCIdentity Theft Resource Center
IVRinteractive voice response
L2TPLayer 2 Tunneling Protocol
LANlocal area network
MACmandatory access control
MANmetropolitan area network
MAOmaximum acceptable outage
MASINTmeasurement and signals intelligence
MD5Message Digest 5
modemmodulator demodulator
MP-BGPMultiprotocol Border Gateway Protocol
MPLSmultiprotocol label switching
MSTIMultiple spanning tree instance
MSTPMultiple Spanning Tree Protocol
NACnetwork access control
NATnetwork address translation
NFICNational Fraud Information Center
NICnetwork interface card
NIDSnetwork intrusion detection system
NIPSnetwork intrusion prevention system
NISTNational Institute of Standards and Technology
NMSnetwork management system
NOCnetwork operations center
NSANational Security Agency
NVDnational vulnerability database
OPSECoperations security
OSoperating system
OSIOpen Systems Interconnection
OSINTopen source intelligence
OSPFv2Open Shortest Path First v2 for IPv4
OSPFv3Open Shortest Path First v3 for IPv6
PaaSPlatform as a Service
PBXprivate branch exchange
PCIPayment Card Industry
PCI DSSPayment Card Industry Data Security Standard
PGPPretty Good Privacy
PIIpersonally identifiable information
PINpersonal identification number
PKIpublic key infrastructure
PLCprogrammable logic controller
POAMplan of action and milestones access tool
PoEpower over Ethernet
POSpoint-of-sale
PPTPPoint-to-Point Tunneling Protocol
PSYOPspsychological operations
RAregistration authority OR risk assessment
RAIDredundant array of independent disks
RATremote access Trojan OR remote for IPv6
RFCRequest for Comments
RIPngRouting Information Protocol next generation for IPv6
ROIreturn on investment
RPOrecovery point objective
RSARivest, Shamir, and Adleman (algorithm)
RSTPRapid Spanning Tree Protocol
RTOrecovery time objective
SAsecurity association
SaaSSoftware as a Service
SANstorage area network
SANCPSecurity Analyst Network Connection Profiler
SANSSysAdmin, Audit, Network, Security
SAPservice access point
SCADAsupervisory control and data acquisition
SCSIsmall computer system interface
SDSLsymmetric digital subscriber line
SETsecure electronic transaction
SGCserver-gated cryptography
SHAsecure hash algorithm
S-HTTPsecure HTTP
SIEMSecurity Information and Event Management system
SIGINTsignals intelligence
SIPSession Initiation Protocol
SLAservice level agreement
SLEsingle loss expectancy
SMFAspecific management functional area
SNMPSimple Network Management Protocol
SOXSarbanes-Oxley Act of 2002 (also Sarbox)
SPOFsingle point of failure
SQLStructured Query Language
SSASocial Security Administration
SSCPSystems Security Certified Practitioner
SSIDservice set identifier (name assigned to a Wi-Fi network)
SSLSecure Sockets Layer
SSL-VPNSecure Sockets Layer virtual private network
SSOsingle system sign-on
STPshielded twisted pair OR Spanning Tree Protocol
TCP/IPTransmission Control Protocol/ Internet Protocol
TCSECTrusted Computer System Evaluation Criteria
TFAtwo-factor authentication
TFTPTrivial File Transfer Protocol
TGARtrunk group access restriction
TNITrusted Network Interpretation
TPMtechnology protection measure OR trusted platform module
UCunified communications
UDPUser Datagram Protocol
UPSuninterruptible power supply
USBuniversal serial bus
UTPunshielded twisted pair
VAvulnerability assessment
VBACview-based access control
VLANvirtual local area network
VoIPVoice over Internet Protocol
VPNvirtual private network
W3CWorld Wide Web Consortium
WANwide area network
WAPwireless access point
WEPWired Equivalent Privacy
Wi-FiWireless Fidelity
WLANwireless local area network
WNICwireless network interface card
WPAWi-Fi Protected Access
WPA2Wi-Fi Protected Access 2
XMLExtensible Markup Language
XSScross-site scripting
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.220.106.241