Chapter Opener Photo

© -strizh-/Shutterstock, Inc.

APPENDIX
B

Standard Acronyms

3DES

triple data encryption standard

ACD

automatic call distributor

AES

Advanced Encryption Standard

ANSI

American National Standards Institute

AP

access point

API

application programming interface

B2B

business-to-business

B2C

business-to-consumer

BBB

Better Business Bureau

BCP

business continuity planning

C2C

consumer-to-consumer

CA

certificate authority

CAP

Certification and Accreditation Professional

CAUCE

Coalition Against Unsolicited Commercial Email

CCC

CERT Coordination Center

CCNA

Cisco Certified Network Associate

CERT

Computer Emergency Response Team

CFE

Certified Fraud Examiner

CISA

Certified Information Systems Auditor

CISM

Certified Information Security Manager

CISSP

Certified Information System Security Professional

CMIP

Common Management Information Protocol

COPPA

Children’s Online Privacy Protection

CRC

cyclic redundancy check

CSI

Computer Security Institute

CTI

Computer Telephony Integration

DBMS

database management system

DDoS

distributed denial of service

DES

Data Encryption Standard

DMZ

demilitarized zone

DoS

denial of service

DPI

deep packet inspection

DRP

disaster recovery plan

DSL

digital subscriber line

DSS

Digital Signature Standard

DSU

data service unit

EDI

electronic data interchange

EIDE

Enhanced IDE

FACTA

Fair and Accurate Credit Transactions Act

FAR

false acceptance rate

FBI

Federal Bureau of Investigation

FDIC

Federal Deposit Insurance Corporation

FEP

front-end processor

FRCP

Federal Rules of Civil Procedure

FRR

false rejection rate

FTC

Federal Trade Commission

FTP

File Transfer Protocol

GIAC

Global Information Assurance Certification

GLBA

Gramm-Leach-Bliley Act

HIDS

host-based intrusion detection system

HIPAA

Health Insurance Portability and Accountability Act

HIPS

host-based intrusion prevention system

HTTP

hypertext transfer protocol

HTTPS

HTTP over Secure Socket Layer

HTML

hypertext markup language

IAB

Internet Activities Board

IDEA

International Data Encryption Algorithm

IDPS

intrusion detection and prevention

IDS

intrusion detection system

IEEE

Institute of Electrical and Electronics Engineers

IETF

Internet Engineering Task Force

InfoSec

information security

IPS

intrusion prevention system

IPSec

IP Security

IPv4

Internet Protocol version 4

IPv6

Internet Protocol version 6

IRS

Internal Revenue Service

(ISC)2

International Information System Security Certification Consortium

ISO

International Organization for Standardization

ISP

Internet service provider

ISS

Internet security systems

ITRC

Identity Theft Resource Center

IVR

interactive voice response

LAN

local area network

MAN

metropolitan area network

MD5

Message Digest 5

modem

modulator demodulator

NFIC

National Fraud Information Center

NIDS

network intrusion detection system

NIPS

network intrusion prevention system

NIST

National Institute of Standards and Technology

NMS

network management system

OS

operating system

OSI

open system interconnection

PBX

private branch exchange

PCI

Payment Card Industry

PGP

Pretty Good Privacy

PKI

public key infrastructure

RAID

redundant array of independent disks

RFC

Request for Comments

RSA

Rivest, Shamir, and Adleman (algorithm)

SAN

storage area network

SANCP

Security Analyst Network Connection Profiler

SANS

SysAdmin, Audit, Network, Security

SAP

service access point

SCSI

small computer system interface

SET

secure electronic transaction

SGC

server-gated cryptography

SHA

Secure Hash Algorithm

S-HTTP

secure HTTP

SLA

service-level agreement

SMFA

specific management functional area

SNMP

Simple Network Management Protocol

SOX

Sarbanes-Oxley Act of 2002 (also Sarbox)

SSA

Social Security Administration

SSCP

Systems Security Certified Practitioner

SSL

Secure Sockets Layer

SSO

single sign-on

STP

shielded twisted cable

TCP/IP

Transmission Control Protocol/ Internet Protocol

TCSEC

Trusted Computer System Evaluation Criteria

TFTP

Trivial File Transfer Protocol

TNI

Trusted Network Interpretation

UDP

User Datagram Protocol

UPS

uninterruptible power supply

UTP

unshielded twisted cable

VLAN

virtual local area network

VOIP

Voice over Internet Protocol

VPN

virtual private network

WAN

wide area network

WLAN

wireless local area network

WNIC

wireless network interface card

W3C

World Wide Web Consortium

WWW

World Wide Web

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.119.104.160