-
3DES
Triple Digital Encryption Standard
-
AAA
Authentication, Authorization, and Accounting
-
-
AES
Advanced Encryption Standard
-
AES256
Advanced Encryption Standard 256bit
-
-
ALE
Annualized Loss Expectancy
-
-
ARO
Annualized Rate of Occurrence
-
ARP
Address Resolution Protocol
-
AUP
Acceptable Use Policy
-
BCP
Business Continuity Planning
-
BIOS
Basic Input / Output System
-
-
-
-
CAN
Controller Area Network
-
CCMP
Counter-Mode/CBC-Mac Protocol
-
CCTC
Closed-circuit Television
-
CERT
Computer Emergency Response Team
-
CHAP
Challenge Handshake Authentication Protocol
-
CIRT
Computer Incident Response Team
-
CRC
Cyclical Redundancy Check
-
CRL
Certification Revocation List
-
DAC
Discretionary Access Control
-
DDOS
Distributed Denial of Services
-
DEP
Data Execution Prevention
-
DHCP
Dynamic Host Configuration Protocol
-
-
-
-
DNS
Domain Name Service (Server)
-
-
DRP
Disaster Recovery Plan
-
DSA
Digital Signature Algorithm
-
EAP
Extensible Authentication Protocol
-
ECC
Elliptic Curve Cryptography
-
EFS
Encrypted File System
-
EMI
Electromagnetic Interference
-
ESP
Encapsulated Security Payload
-
FTP
File Transfer Protocol
-
GPU
Graphic Processing Unit
-
GRE
Genereic Routing Encapsulation
-
-
HIDS
Host Based Intrusion Detection System
-
HIPS
Host Based Intrusion Prevention System
-
HMAC
Hashed Message Authentication Code
-
HSM
Hardware Security Module
-
HTTP
Hypertext Transfer Protocol
-
HTTPS
Hypertext Transfer Protocol over SSL
-
HVAC
Heating, Ventilation Air Conditioning
-
IaaS
Infrastructure as a Service
-
ICMP
Internet Control Message Protocol
-
-
IKE
Internet Key Exchange
-
-
IMAP4
Internet Message Access Protocol v4
-
-
IPSEC
Internet Protocol Security
-
-
ISP
Internet Service Provider
-
-
KDC
Key Distribution Center
-
L2TP
Layer 2 Tunneling Protocol
-
LANMAN
Local Area Network Manager
-
LDAP
Lightweight Directory Access Protocol
-
LEAP
Lightweight Extensible Authentication Protocol
-
MAC
Mandatory Access Control / Media Access Control
-
MAN
Metropolitan Area Network
-
-
-
MSCHAP
Microsoft Challenge Handshake Authentication Protocol
-
MTU
Maximum Transmission Unit
-
NAC
Network Access Conrol
-
NAT
Network Address Translation
-
NIDS
Network Based Intrustion Detection System
-
NIPS
Network Based Intrusion Prevention System
-
NIST
National Institute of Standards & Technology
-
NOS
Network Operating System
-
NTFS
New Technology File System
-
NTLM
New Technology LANMAN
-
NTP
Network Time Protocol
-
-
OVAL
Open Vulnerability Assessment Language
-
PAT
Port Address Translation
-
PAP
Password Authentication Protocol
-
PBX
Private Branch Exchange
-
PEAP
Protected Extensible Authentication Protocol
-
PED
Personal Electronic Devices
-
-
PII
Personally Identifiable Information
-
PKI
Public Key Infrastructure
-
POTS
Plain Old Telephone Service
-
PPP
Point-to-Point Protocol
-
PPTP
Point-to-Point Tunneling Protocol
-
-
-
-
RAD
Rapid Application Development
-
RADIUS
Remote Authentication Dial-In User
-
RAID
Redundant Array of Inexpensive Disks
-
-
RBAC
- Rule Based Access Control
- Role Based Access Control
-
RSA
Rivest, Shamir, and Adleman
-
RTO
Recovery Time Objective
-
RTP
Real-Time Transport Protocol
-
S/MIME
SecureĀ / Multipurpose Internet Mail Extensions
-
Saas
Software as a Service
-
SCAP
Security Content Automation Protocol
-
SCSI
Small Computer System Interface
-
SDLC
Software Development Life Cycle
-
SDLM
Software Development Life Cycle Methodology
-
SHA
Secure Hashing Algorithm
-
SHTTP
Secure Hypertext Transfer Protocol
-
SIM
Subscriber Identity Module
-
SLA
Service Level Agreement
-
SLE
Single Loss Expectancy
-
SMS
Short Message Service
-
SMTP
Simple Mail Transfer Protocol
-
SNMP
Simple Network Management Protocol
-
SONET
Synchronized Optical Network Technologies
|
|