Chapter Opener Photo

APPENDIX
B

Standard Acronyms

3DES triple data encryption standard
ACD automatic call distributor
AES Advanced Encryption Standard
ANSI American National Standards Institute
AP access point
API application programming interface
BSD Berkeley Software Distribution
B2B business to business
B2C business to consumer
BBB Better Business Bureau
BCP business continuity planning
C2C consumer to consumer
CA certificate authority
CAP Certification and Accreditation Professional
CAUCE Coalition Against Unsolicited Commercial Email
CCC CERT Coordination Center
CCNA Cisco Certified Network Associate
CCPA California Consumer Privacy Act
CERT Computer Emergency Response Team
CFE Certified Fraud Examiner
CISA Certified Information Systems Auditor
CISM Certified Information Security Manager
CISSP Certified Information System Security Professional
CMIP Common Management Information Protocol
COPPA Children’s Online Privacy Protection Act
CRC cyclic redundancy check
CSI Computer Security Institute
CSIRT Computer security incident response team
CTI Computer Telephony Integration
DBMS database management system
DDoS distributed denial of service
DES Data Encryption Standard
DMZ demilitarized zone
DoS denial of service
DPI deep packet inspection
DRP disaster recovery plan
DSL digital subscriber line
DSS Digital Signature Standard
DSU data service unit
EDI Electronic Data Interchange
EIDE Enhanced IDE
FACTA Fair and Accurate Credit Transactions Act
FAR false acceptance rate
FBI Federal Bureau of Investigation
FDIC Federal Deposit Insurance Corporation
FEP front-end processor
FRCP Federal Rules of Civil Procedure
FRR false rejection rate
FTC Federal Trade Commission
FTP file transfer protocol
GDPR General Data Protection Regulation
GIAC Global Information Assurance Certification
GLBA Gramm-Leach-Bliley Act
GRE Generic Routing Encapsulation
GUI Graphical User Interface
HIDS host-based intrusion detection system
HIPAA Health Insurance Portability and Accountability Act
HIPS host-based intrusion prevention system
HTML hypertext markup language
HTTP hypertext transfer protocol
HTTPS HTTP over Secure Socket Layer
HVAC Heating, Ventilation, and Air Conditioning
IAB Internet Activities Board
IDEA International Data Encryption Algorithm
IDPS intrusion detection and prevention
IDS intrusion detection system
IEEE Institute of Electrical and Electronics Engineers
IETF Internet Engineering Task Force
InfoSec information security
IP Internet Protocol
IPS intrusion prevention system
IPSec IP Security
IPv4 Internet protocol version 4
IPv6 Internet protocol version 6
IRS Internal Revenue Service
(ISC)2 International Information System Security Certification Consortium
ISO International Organization for Standardization
ISP Internet service provider
ISS Internet security systems
ITRC Identity Theft Resource Center
ITU-T International Telecommunications Union
IVR interactive voice response
LAN local area network
MAN metropolitan area network
MD5 Message Digest 5
MMC Microsoft Management Console
modem modulator demodulator
NAS Network attached storage
NFIC National Fraud Information Center
NIDS network intrusion detection system
NIPS network intrusion prevention system
NIST National Institute of Standards and Technology
NMS network management system
NTFS New Technology File System
OS operating system
OSI open system interconnection/online software inspector
PBX private branch exchange
PCI Payment Card Industry
PGP Pretty Good Privacy
PKI public key infrastructure
RAID redundant array of independent disks
RFC Request for Comments
RSA Rivest, Shamir, and Adleman (algorithm)
SAN storage area network
SANCP Security Analyst Network Connection Profiler
SANS SysAdmin, Audit, Network, Security
SAP service access point
SCSI small computer system interface
SCT Security Compliance Toolkit
SEC Securities and Exchange Commission
SET Secure electronic transaction
SGC server-gated cryptography
SHA Secure Hash Algorithm
S-HTTP secure HTTP
SLA service level agreement
SMFA specific management functional area
SNMP Simple Network Management Protocol
SOAR Security Orchestration and Automation Response
SOX Sarbanes-Oxley Act of 2002 (also Sarbox)
SSA Social Security Administration
SSCP Systems Security Certified Practitioner
SSD Solid State Drives
SSL Secure Sockets Layer
SSO single system sign-on
STP shielded twisted cable
TCP/IP Transmission Control Protocol/ Internet Protocol
TCSEC Trusted Computer System Evaluation Criteria
TFTP Trivial File Transfer Protocol
TNI Trusted Network Interpretation
UDP User Datagram Protocol
UPS uninterruptible power supply
UTP unshielded twisted cable
VLAN virtual local area network
VOIP Voice over Internet Protocol
VPN virtual private network
WAN wide area network
WLAN wireless local area network
WNIC wireless network interface card
W3C World Wide Web Consortium
WWW World Wide Web
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.117.71.211