Term
|
Definition
| A port-based authentication protocol. Wireless can use 802.1x. For example, WPA2-Enterprise mode uses an 802.1x server (implemented as a radius server) to add authentication. |
|
|
Term
|
Definition
| Triple Digital Encryption Standard |
|
|
Term
|
Definition
| Authentication, Authorization, and Accounting |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| Advanced Encryption Standard |
|
|
Term
|
Definition
| Advanced Encryption Standard 256 bit |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Annualized Loss Expectancy. Used to measure risk with annualized rate of occurrence (ARO) and single loss expectancy (SLE). The ALE identifies the total amount of loss expected for a given risk. The calculation is SLExARO=ALE |
|
|
Term
|
Definition
| Access point, short for wireless access point (WAP) |
|
|
Term
|
Definition
| Annualized Rate of Occurrence. Used to measure risk with ALE and SLE. The ARO identifies how many times a loss is expected to occur in a year. The calculation is SLExARO=ALE |
|
|
Term
|
Definition
| Address Resolution Protocol |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| Basic Input/output System |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| Counter Mode with Cipher Block Chaining Message Authentication Code Protocol |
|
|
Term
|
Definition
| Closed-circuit Television |
|
|
Term
|
Definition
| Computer Emergency Response Team |
|
|
Term
|
Definition
| Challenge Handshake Authentication Protocol |
|
|
Term
|
Definition
| Confidentiality, Integrity, Availability |
|
|
Term
|
Definition
| Computer Incidence Response Team |
|
|
Term
|
Definition
| Continuity of Operations Plan |
|
|
Term
|
Definition
| Cyclical Redundancy Check |
|
|
Term
|
Definition
| Certification Revocation List |
|
|
Term
|
Definition
| Discretionary Access Control |
|
|
Term
|
Definition
| Discretionary Access Control List |
|
|
Term
|
Definition
| Data Execution Prevention |
|
|
Term
|
Definition
| Digital Encryption Standard |
|
|
Term
|
Definition
| Dynamic Host Configuration Protocol |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| Digital Signature Algorithm |
|
|
Term
|
Definition
| Distributed denial-of-service |
|
|
Term
|
Definition
| Extensible Authentication Protocol |
|
|
Term
|
Definition
| Elliptic Curve Cryptography |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Electromagnetic Interference |
|
|
Term
|
Definition
| Encapsulating Security Protocol |
|
|
Term
|
Definition
|
|
Term
|
Definition
| File Transfer Protocol Secure |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| Global Positioning System |
|
|
Term
|
Definition
| Generic Routing Encapsulation |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| Host-based intrusion detection system |
|
|
Term
|
Definition
| Host-based intrusion prevention system |
|
|
Term
|
Definition
| Hash-based message Authentication Code |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Hypertext Markup Language |
|
|
Term
|
Definition
| Hypertext Transfer Protocol |
|
|
Term
|
Definition
| Hypertext transfer protocol secure |
|
|
Term
|
Definition
| Heating, ventilation and air conditioning. |
|
|
Term
|
Definition
| Infrastructure as a service |
|
|
Term
|
Definition
| Internet Control Message Protocol |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Intrusion Detection System |
|
|
Term
|
Definition
| Institute of Electrical and Electronic Engineers |
|
|
Term
|
Definition
| Internet Group Management Protocol |
|
|
Term
|
Definition
| Internet Information Services |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| Internet Message Access Protocol v4 |
|
|
Term
|
Definition
| Intrusion Prevention Systrm |
|
|
Term
|
Definition
| Internet Protocol Security |
|
|
Term
|
Definition
| Internet Protocol version 4 |
|
|
Term
|
Definition
| Internet Protocol version 6 |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| Internet Service Provider |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| Layer 2 Tunneling Protocol |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Local Area Network Manager |
|
|
Term
|
Definition
| Lightweight Directory Access Protocol |
|
|
Term
|
Definition
| Lightweight Extensible Authentication Protocol |
|
|
Term
|
Definition
Mandatory Access Control Media Access Control Message Authentication Code |
|
|
Term
|
Definition
| Metropolitan Area Network |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| Microsoft Challenge Handshake Authentication Protocol |
|
|
Term
|
Definition
| Maximum Transmission Unit |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Network-based Intrusion Detection System |
|
|
Term
|
Definition
| Network-based Intrusion Prevention System |
|
|
Term
|
Definition
| National Institute of Standards and Technology |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| New Technology File System |
|
|
Term
|
Definition
| Network Address Translation |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| Open Vulnerability Assessment Language |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| Password Authentication Protocol |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| Protected Extensible Authentication Protocol |
|
|
Term
|
Definition
| Personal Electronic Device |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Personally Identifiable Information |
|
|
Term
|
Definition
| Personal Identification Number |
|
|
Term
|
Definition
| Personal Identity Verification Card |
|
|
Term
|
Definition
| Public Key Infrastructure |
|
|
Term
|
Definition
| Post Office Protocol version 3 |
|
|
Term
|
Definition
| Plain old telephone service |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Point-to-point Tunneling Protocol |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| Remote Authentication Dial-In User Service |
|
|
Term
|
Definition
| Redundant Array of Inexpensive (or Independent) Disks |
|
|
Term
|
Definition
| Disk Striping. Raid-0 improves performances but does not provide fault tolerance. |
|
|
Term
|
Definition
| Disk mirroring. RAID-1 uses two disks and provides fault tolerance. |
|
|
Term
|
Definition
| Disk striping with parity. RAID-5 uses three or more disks and provides fault tolerance. |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Role-based Access Control Rule-based Access Control |
|
|
Term
|
Definition
| Ron's code, or Rivest's Cipher. Symmetric Encryption algorithm. |
|
|
Term
|
Definition
| Radio Frequency Interface |
|
|
Term
|
Definition
| RACE Integrity Primitives Evaluation Message Digest. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| An Asymmetric algorithm used to encrypt data and digitally sign transmissions. It is named after it's creates, Rivest, Shamir and Adleman, and RSA is also the name of the company they founded together. RSA relies on the mathematical properties of prime numbers when creating public and private keys. |
|
|
Term
|
Definition
| Rapid Spanning Tree Protocol |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Real-time Transport Protocol |
|
|
Term
|
Definition
| Secure/Multipurpose Internet Mail Extensions |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Security Content Automation Protocol |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Small Computer System Interface |
|
|
Term
|
Definition
| Software Development Life Cycle |
|
|
Term
|
Definition
| Software Development Life Cycle Methodology |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| Secure Hypertext Transfer Protocol |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Subscriber Identity Module |
|
|
Term
|
Definition
| Security Incident Response Team |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| Simple Mail Transfer Protocol |
|
|
Term
|
Definition
| Simple Network Management Protocol |
|
|
Term
|
Definition
| Synchronous Optical Network Technologies |
|
|
Term
|
Definition
| Spam Over Internet Messaging |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Structured query language |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| Secure Socket Tunneling Protocol |
|
|
Term
|
Definition
Spanning Tree Protocol Shielded Twisted Pai |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Terminal Access Controller Access-Control System |
|
|
Term
|
Definition
| Terminal Access Controller Access-Control System+ |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Transmission Control Protocol |
|
|
Term
|
Definition
| Transmission Control Protocol/Internet Protocol |
|
|
Term
|
Definition
| Trivial File Transfer Protocol |
|
|
Term
|
Definition
| Temporal Key Integrity Protocol |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| Uninterruptible Power Supply |
|
|
Term
|
Definition
| Universal Resource Locator |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| Virtual Local Area Network |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| Wireless Intrusion Detection System |
|
|
Term
|
Definition
| Wireless Intrusion Prevention System |
|
|
Term
|
Definition
| Wireless Local Area Network |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Wi-Fi Protected Access version 2 |
|
|
Term
|
Definition
| Wireless Transport Layer Security |
|
|
Term
|
Definition
| Extensible Markup Language |
|
|
Term
|
Definition
| Extended Terminal Access Controller Access-Control System |
|
|
Term
|
Definition
| Cross-site Request Forgery |
|
|
Term
|
Definition
|
|