© Digital_Art/Shutterstock

Standard Acronyms

APPENDIX
B

3DES triple data encryption standard

AAA authentication, authorization, and accounting

ACD automatic call distributor

ACK acknowledgment

ACL access control list

ADS alternate data streams

AES Advanced Encryption Standard

AH Authentication Header

ALE annualized loss expectancy

ANSI American National Standards Institute

AP access point

API application programming interface

APT advanced persistent threat

ARO annualized rate of occurrence

ARP Address Resolution Protocol

ASAv Adaptive Security Virtual Appliance

ATM asynchronous transfer mode

AUP acceptable use policy

AV asset value

B2B business to business

B2C business to consumer

BBB Better Business Bureau

BCP business continuity planning

BGP BGP Border Gateway Protocol

BIOS basic input/output system

BYOD Bring Your Own Device

C2C consumer to consumer

CA certificate authority

CAP Certification and Accreditation Professional

CAUCE Coalition Against Unsolicited Commercial Email

CCC CERT Coordination Center

CCNA Cisco Certified Network Associate

CCPA California Consumer Privacy Act

CERT Computer Emergency Response Team

CFE Certified Fraud Examiner

CGI Common Gateway Interface

C-I-A confidentiality, integrity, and availability

CIDR classless inter-domain routing

CISA Certified Information Systems Auditor

CISM Certified Information Security Manager

CISSP Certified Information System Security Professional

CLI command line interface

CMIP common management information protocol

COPPA Children’s Online Privacy Protection Act

CPE customer premise equipment

CPU central processing unit

CRC cyclic redundancy check

CSI Computer Security Institute

CTI computer telephony integration

DBMS database management system

DCOM distributed component object model

DDoS distributed denial of service

DD-WRT DresDren-Wireless RouTer

DES Data Encryption Standard

devfs device file system

DHCP dynamic host configuration protocol

DLLs dynamic link libraries

DLP data leakage prevention

DMZ demilitarized zone

DNS domain name system

DoS denial of service

DPI deep packet inspection

DRP disaster recovery plan

DSL digital subscriber line

DSS digital signature standard

DSU data service unit

ECC elliptical curve cryptography

EDI electronic data interchange

EF exposure factor

EHR electronic health record

EIDE enhanced integrated development environment 

EIGRP Enhanced Interior Gateway Routing Protocol

EPHI electronic protected health information 

EPIC Electronic Privacy Information Center

ESD electrostatic discharge

ESP encapsulating security payload

EU European Union

EULA end-user license agreement

FACTA Fair and Accurate Credit Transactions Act

FAR false acceptance rate

FBI Federal Bureau of Investigation

FCC Federal Communications Corporation

FDIC Federal Deposit Insurance Corporation

FEP front-end processor

FERPA Family Educational Rights and Privacy Act

FIPS Federal Information Processing Standards

FQDN fully qualified domain names

FRCP Federal Rules of Civil Procedure

FRR false rejection rate

FTC Federal Trade Commission

FTP file transfer protocol

GDRP general data protection regulation

GIAC Global Information Assurance Certification

GLBA Gramm-Leach-Bliley Act

GLBP gateway load balancing protocol

GRC governance, risk, and compliance

GUI graphical user interface

HIDS host-based intrusion detection system

HIPAA Health Insurance Portability and Accountability Act

HIPS host-based intrusion prevention system

HITECH Health Information Technology for Economic and Clinical Health 

HSRP hot standby router protocol

HTML hypertext markup language

HTTP hypertext transfer protocol

HTTPS HTTP over secure socket layer

HVAC heating, ventilation, and cooling

IAB Internet Activities Board

IAM identity and access management

IANA Internet Assigned Numbers Authority

ICMP Internet control message protocol

ICS industrial control system

IDEA international data encryption algorithm

IDPS intrustion detection and prevention system

IDS intrusion detection system

IEEE Institute of Electrical and Electronics Engineers

IEMI intentional electromagnetic interference

IETF Internet Engineering Task Force

IGMP Internet group management protocol

IGRP Interior Gateway Routing Protocol

IKE Internet key exchange

IKEv2 Internet key exchange v2

IM instant messaging

IMS IP Multimedia Subsystem

InfoSec information security

IoT Internet of Things

IP Internet Protocol

IPS intrusion prevention system

IPSec IP Security

IPv4 Internet protocol version 4

IPv6 Internet protocol version 6

IPX/SPX Internetwork Packet Exchange/Sequenced Packet Exchange

IRC Internet relay chat

IRS Internal Revenue Service

(ISC)2 International Information System Security Certification Consortium

ISDN Integrated Services Digital Network

ISO International Organization for Standardization

ISP Internet service provider

ISS Internet security systems

IT information technology

ITIL Information Technology Infrastructure Library

ITRC Identity Theft Resource Center

IVR interactive voice response

LAN local area network

LCD Liquid Crystal Display

LDAP lightweight directory access protocol

L2F layer 2 forwarding

L2TP layer 2 tunneling protocol

MAC Mandatory access code. Also Media Access Control.

MAN metropolitan area network

MD5 Message Digest 5

MitM man-in-the-middle

modem MOdulator DEModulator

MPLS multi-protocol label switching

MPPE Microsoft point-to-point encryption

MTBF mean time between failures

MTTF mean time to failure

MTU maximum transmission unit

NAC network access control

NAS network access server

NAT network access translation

NII National Information Infrastructure

NAT-PT network address translation–protocol translation

NetBEUI NetBios extended user interface

NFIC National Fraud Information Center

NGFV next-generation firewall virtual

NGFW next-generation firewall

NGIPS next-generation intrusion prevention system

NIC network interface card

NIDS network intrusion detection system

NIPS network intrusion prevention system

NIST National Institute of Standards and Technology

NMS network management system

NNTP network news transfer protocol

NPAS network policy and access services

NSA National Security Agency

NTFS new technology file system

OBM out-of-band management

OC optical carrier

OpenVPN open source virtual private network

Open WRT Open Wireless RouTer

OS operating system

OSI open systems interconnection

OSPF Open Shortest Path First

OWASP Open Web Application Security Project

P2P person to person

PAT port address translation

PBX private branch exchange

PC personal computer

PCI Payment Card Industry

PCI DSS Payment Card Industry Data Security Standard

PGP pretty good privacy

PHI protected health information

PII personally identifiable information

PKI public key infrastructure

PNAC port-based network access (admission) control

POP Post Office Protocol

PPP point-to-point protocol

PPTP point-to-point tunneling protocol

PRNG pseudo random number generator

QoS quality of service

RADIUS remote authentication dial-in user service

RAID redundant array of independent disks

RAM random access memory

RAS remote access server

RBAC role-based access system

RDC remote desktop connection

RDP remote desktop protocol

RDS remote desktop services

RFC request for comments

RFID radio-frequency identification

RIP Routing Information Protocol

RIR regional Internet registry

ROI return on investment

RRAS routing and remote access service

RSA Rivest, Shamir, and Adleman (algorithm)

SAN storage area network

SANCP security analyst network connection profiler

SANS SysAdmin, Audit, Network, Security

SAP service access point

SCSI small computer system interface

SDD Software Design Document

SED static-electric discharge

SEM security event management

SEO search engine optimization

SET secure electronic transaction

SGC server-gated cryptography

SHA secure hash algorithm

S-HTTP secure HTTP

SIEM security information and event management

SIM security information management

SIRT security incident response team

SLA service level agreement

SLE single loss expectancy

SMAC social, mobile, analytics and cloud

SMFA specific management functional area

SMTP simple mail transfer protocol

SNA systems network architecture

SNMP simple network management protocol

SOHO small office/home office

SOX Sarbanes-Oxley Act of 2002 (also Sarbox)

SQL Structured Query Language

SSA Social Security Administration

SSCP Systems Security Certified Practitioner

SSH secure shell

SSID service set identifier

SSL secure sockets layer

SSL/TLS secure sockets layer/transport layer security

SSO single sign-on

STP shielded twisted cable

STIG Security Technical Implementation Guide

SYN synchronize

SYN/ACK synchronization acknowledged

TACACS Terminal Access Controller Access-Control System

TCP Transmission Control Protocol

TCP/IP Transmission Control Protocol/Internet Protocol

TCSEC trusted computer system evaluation criteria

TFTP trivial file transfer protocol

TLS Transport Layer Security

TNI trusted network interpretation

TPM trusted platform module

UDP user datagram protocol

UNIX Uniplexed Information and Computer Systems

UPS uninterruptible power supply

URL uniform resource locator

USB universal serial bus

UTM unified threat management

UTP unshielded twisted cable

VLAN virtual local area network

VOIP Voice over Internet Protocol

VPN virtual private network

VRRP virtual router redundancy protocol

WAN wide area network

WAN wide area network virtual

VPN private network

WAP wireless accent point

WebGUI web-based graphical user interface

WLAN wireless local area network

WNIC wireless network interface card

WORM write-once read-many

W3C World Wide Web Consortium

WWW World Wide Web

XXS Cross-site scripting

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.145.36.233