- μC
- Microcontroller
- AAA
- Authentication, Authorization, and Accounting
- ACK
- Acknowledge
- ACL
- Access Control List
- AES
- Advanced Encryption Standard
- AFHSS
- Adaptive Frequency Hopping Spread Spectrum
- AH
- Authentication Header
- AIM
- Apple/IBM/Motorola
- ASLR
- Address Space Layout Randomization
- ASP
- Application Service Provider
- ARM
- Acorn RISC Machine/Advanced RISC Machine
- ARP
- Address Resolution Protocol
- B2B
- Business-to-Business
- B2C
- Business-to-Customer
- BAA
- Business Associate Agreement
- BeEF
- Browser Exploitation Framework
- BES
- Bulk Electric System
- BIOS
- Basic Input/Output System
- BPDU
- Bridge Protocol Data Units
- BSD
- Berkley Software Distribution
- BYOD
- Bring-Your-Own-Device
- CA
- Certificate Authority
- CAM
- Content Addressable Memory
- CANs
- Campus Area Networks or Corporate Area Networks
- CAPTCHA
- Completely Automated Public Turing test to tell Computers and Humans Apart
- CATV
- Commercial Cable Television
- CCD
- Charged Coupled Device
- CCTV
- Closed-Circuit Television
- CDFS
- Compact Disc File System
- CDP
- Cisco Discovery Protocol
- CHAP
- Challenge-Handshake Authentication Protocol
- CIA
- Confidentiality, Integrity, and Availability
- CIFS
- Common Internet File System
- CIP
- Critical Infrastructure Protection
- CISC
- Complex Instruction Set Computing
- CMS
- Centers for Medicare and Medicaid Services
- CPE
- Common Platform Enumeration
- CPTED
- Crime Prevention Through Environmental Design
- CRAM
- Challenge Response Authentication Mechanism
- CRL
- Certificate Revocation List
- CSMA/CD
- Carrier Sense Multiple-Access with Collision Detection
- CSP
- Cloud Storage Provider
- CSR
- Certificate Signing Request
- CVE
- Common Vulnerabilities and Exposures
- CVSS
- Common Vulnerability Scoring System
- DAC
- Discretionary Access Control
- DACL
- Discretionary Access Control List
- DAI
- Dynamic ARP Inspection
- DAS
- Direct-Attached Storage
- DCS
- Distributed Control System
- DDoS
- Distributed Denial of Service
- DEA
- Drug Enforcement Administration
- DEP
- Data Execution Prevention
- DES
- Data Encryption Standard
- DHA
- Directory Harvest Attack
- DHCP
- Dynamic Host Configuration Protocol
- DHE
- Diffie-Hellman Key Exchange
- DHT
- Distributed Hash Table
- DMZ
- Demilitarized Zone
- DNP3
- Distributed Network Protocol
- DNS
- Domain Name Service
- DOS
- Denial of Service
- DOS
- Disk Operating System
- DRDoS
- Distributed Reflection and Amplification Denial of Service
- DRP
- Disaster Recovery Plan
- DS4P
- Data Segmentation for Privacy
- DTP
- Dynamic Trunking Protocol
- DVR
- Digital Video Recorder
- EAP
- Extensible Authentication Protocol
- EAL
- Evaluation Assurance Levels
- EFL
- Effective Focal Length
- EFS
- Encrypting File System
- eSATA
- External Serial AT Attachment
- ESIGN
- Electronic Signatures in Global and National Commerce Act
- ESP
- Encapsulating Security Payload
- EV
- Extended Validation
- FAT
- File Allocation Table
- FIPS
- Federal Information Processing Standard
- FMS
- File Management System
- FREAK
- Factoring attack on RSA-EXPORT Keys
- FTA
- Fault Tree Analysis
- FTP
- File Transfer Protocol
- GBDE
- GEOM-Based Disk Encryption
- GPRS
- General Packet Radio System
- GUI
- Graphical User Interface
- HAN
- Home Area Network
- HBIDS
- Host-Based IDS
- HFS
- Hierarchical File Systems
- HTTP
- Hypertext Transfer Protocol
- IANA
- Internet Assigned Numbers Authority
- IC
- Integrated Circuit
- ICANN
- Internet Corporation for Assigned Names and Numbers
- ICCP
- Inter-Control Center Communications Protocol
- ICMP
- Internet Control Message Protocol
- ICT
- Information Communication and Technology
- ID
- Identify
- IDF
- Intermediate Distribution Frame
- IDPS
- Intrusion Detection and Prevention System
- IDS
- Intrusion-Detection Systems
- IED
- Intelligent Electronic Device
- IEEE
- International Electrical and Electronic Association
- IETF
- Internet Engineering Task Force
- IGD
- Internet Gateway Device
- IKE
- Internet Key Exchange
- IoT
- Internet of Things
- IP
- Internet Protocol
- IPsec
- Internet Protocol Security
- IRP
- Incident Response Policy
- ISP
- Internet Service Provider
- IT
- Information Technology
- IV
- Initialization Vector
- L2TP
- Layer 2 Tunneling Protocol
- LAN
- Local Area Network
- LDAP
- Lightweight Directory Access Protocol
- LOIC
- Low Orbit Ion Cannon
- LOPA
- Layer of Protection Analysis
- MAC
- Mandatory Access Control
- MAC
- Media Access Control
- MAN
- Metropolitan Area Network
- MDF
- Main Distribution Frame
- MIT
- Massachusetts Institute of Technology
- MITM
- Man-in-the-Middle
- NAN
- Neighborhood Area Network
- NAS
- Network Attached Storage
- NAT
- Network Address Translation
- NAT-T
- Network Address Translation-Traversal
- NBIDS
- Network-Based IDS
- NFC
- Near Field Communication
- NIST
- National Institute of Standards and Technology
- NOS
- Network Operating System
- NS
- Name Servers
- NVT
- Network Vulnerability Tests
- NX
- No Execution
- OCIL
- Open Checklist Interactive Language
- OCSP
- Online Certificate Status Protocol
- OPC
- Open Platform Connectivity
- OSI
- Open Systems Interconnection
- OS
- Operating System
- OTP
- One-Time Passwords
- OVAL
- Open Vulnerability and Assessment Language
- PAKE
- Password-Authenticated Key Agreement
- PAN
- Personal Area Network
- PAP
- Password Authentication Protocol
- PC
- Personal Computer
- PEFS
- Private Encrypted File System
- PF
- Packet Filter
- PGP
- Pretty Good Privacy
- PIN
- Password or Personal Identification Number
- PIR
- Passive Infrared
- PKE
- Public Key Encryption
- PKI
- Public Key Infrastructure
- PnP
- Plug and Play
- PoE
- Power over Ethernet
- POODLE
- Padding Oracle on Downgraded Legacy Encryption
- POS
- Point-of-Sale
- POSIX
- Portable Operating System Interface
- PR
- Protect
- PSTN
- Public Switched Telephone Network
- PTZ
- Pan/Tilt/Zoom
- PVLAN
- Private VLAN
- QoS
- Quality of Service
- RADIUS
- Remote Authentication Dial-In User Service
- RARP
- Reverse ARP
- RAT
- Remote Access Trojan
- RBAC
- Role-Based Access Control
- RC
- Recover
- RDC
- Remote Desktop Connection
- RF
- Radio Frequency
- RFC
- Request for Comments
- RFID
- Radio Frequency Identification
- RISC
- Reduced Instruction Set Computing
- RS
- Respond
- SA
- Security Association
- SAAS
- Software as a Service
- SAN
- Storage Area Network
- SATA
- Serial AT Attachment
- SBS
- Small Business Server
- SCP
- Secure Copy Protocol
- SDN
- Software-Defined Networking
- SDO
- Standards Development Organization
- SET
- Social Engineering Toolkit
- SFTP
- SSH File Transfer Protocol
- SiIQ
- Silicon Intelligence
- SLE
- Single Loss Expectancy
- SMBFS
- Server Message Block File System
- SMTP
- Simple Mail Transfer Protocol
- SNMP
- Simple Network Management Protocol
- SQLi
- SQL injection
- SRK
- Storage Root Key
- SRP
- Secure Remote Password
- SSH
- Secure Shell
- SSL
- Secure Socket Layer
- SSO
- Single Sign-on
- STA
- Spanning-Tree Algorithm
- STP
- Shielded Twisted Pair
- STP
- Spanning-Tree Protocol
- SYN
- Synchronize
- SYN/ACK
- Synchronize/Acknowledge
- TCP
- Transmission Control Protocol
- TCP/IP
- Transmission Control Protocol/Internet Protocol
- TGS
- Ticket Granting Server
- TKIP
- Temporary Key Integrity Protocol
- TLD
- Top-Level Domain
- TLS
- Transport Layer Security
- TO
- Transmission Owner
- TOCTOU
- Time Of Check-Time Of Use
- TOP
- Transmission Operator
- TOU
- Time of Use
- TPID
- Tag Protocol Identifier
- TPM
- Trusted Platform Module
- TTL
- Time-To-Live
- UDP
- User Datagram Protocol
- UETA
- Uniform Electronic Transactions Act
- UL
- Underwriters Laboratories
- UPnP
- Universal Plug and Play
- USB
- Universal Serial Bus
- UTM
- Unified Threat Management
- UTP
- Unshielded Twisted Pair
- VACL
- Virtual Access Control List
- VCR
- Videocassette Recorder
- VLAN
- Virtual Local Area Network
- VMD
- Video Motion Detection
- VMPS
- VLAN Management Policy Server
- VNA
- Vendor Neutral Archive
- VoIP
- Voice over IP
- VPLS
- Virtual Private LAN Service
- VQP
- VLAN Query Protocol
- VTP
- VLAN Trunking Protocol
- WAN
- Wide Area Network
- WAP
- Wireless Access Point
- WBAN
- Wireless Body-Area Network
- WEP
- Wired Equivalent Privacy
- Wi-Fi
- Wireless Fidelity
- WLAN
- Wireless Local Area Network
- WPA
- Wi-Fi Protected Access
- WSDL
- Web Services Description Language
- XD
- eXecute Disable
- XN
- Execute Never
- XSS
- Cross-Site Scripting
..................Content has been hidden....................
You can't read the all page of ebook, please click
here login for view all page.