APPENDIX B
Acronyms

μC
Microcontroller
AAA
Authentication, Authorization, and Accounting
ACK
Acknowledge
ACL
Access Control List
AES
Advanced Encryption Standard
AFHSS
Adaptive Frequency Hopping Spread Spectrum
AH
Authentication Header
AIM
Apple/IBM/Motorola
ASLR
Address Space Layout Randomization
ASP
Application Service Provider
ARM
Acorn RISC Machine/Advanced RISC Machine
ARP
Address Resolution Protocol
B2B
Business-to-Business
B2C
Business-to-Customer
BAA
Business Associate Agreement
BeEF
Browser Exploitation Framework
BES
Bulk Electric System
BIOS
Basic Input/Output System
BPDU
Bridge Protocol Data Units
BSD
Berkley Software Distribution
BYOD
Bring-Your-Own-Device
CA
Certificate Authority
CAM
Content Addressable Memory
CANs
Campus Area Networks or Corporate Area Networks
CAPTCHA
Completely Automated Public Turing test to tell Computers and Humans Apart
CATV
Commercial Cable Television
CCD
Charged Coupled Device
CCTV
Closed-Circuit Television
CDFS
Compact Disc File System
CDP
Cisco Discovery Protocol
CHAP
Challenge-Handshake Authentication Protocol
CIA
Confidentiality, Integrity, and Availability
CIFS
Common Internet File System
CIP
Critical Infrastructure Protection
CISC
Complex Instruction Set Computing
CMS
Centers for Medicare and Medicaid Services
CPE
Common Platform Enumeration
CPTED
Crime Prevention Through Environmental Design
CRAM
Challenge Response Authentication Mechanism
CRL
Certificate Revocation List
CSMA/CD
Carrier Sense Multiple-Access with Collision Detection
CSP
Cloud Storage Provider
CSR
Certificate Signing Request
CVE
Common Vulnerabilities and Exposures
CVSS
Common Vulnerability Scoring System
DAC
Discretionary Access Control
DACL
Discretionary Access Control List
DAI
Dynamic ARP Inspection
DAS
Direct-Attached Storage
DCS
Distributed Control System
DDoS
Distributed Denial of Service
DEA
Drug Enforcement Administration
DEP
Data Execution Prevention
DES
Data Encryption Standard
DHA
Directory Harvest Attack
DHCP
Dynamic Host Configuration Protocol
DHE
Diffie-Hellman Key Exchange
DHT
Distributed Hash Table
DMZ
Demilitarized Zone
DNP3
Distributed Network Protocol
DNS
Domain Name Service
DOS
Denial of Service
DOS
Disk Operating System
DRDoS
Distributed Reflection and Amplification Denial of Service
DRP
Disaster Recovery Plan
DS4P
Data Segmentation for Privacy
DTP
Dynamic Trunking Protocol
DVR
Digital Video Recorder
EAP
Extensible Authentication Protocol
EAL
Evaluation Assurance Levels
EFL
Effective Focal Length
EFS
Encrypting File System
eSATA
External Serial AT Attachment
ESIGN
Electronic Signatures in Global and National Commerce Act
ESP
Encapsulating Security Payload
EV
Extended Validation
FAT
File Allocation Table
FIPS
Federal Information Processing Standard
FMS
File Management System
FREAK
Factoring attack on RSA-EXPORT Keys
FTA
Fault Tree Analysis
FTP
File Transfer Protocol
GBDE
GEOM-Based Disk Encryption
GPRS
General Packet Radio System
GUI
Graphical User Interface
HAN
Home Area Network
HBIDS
Host-Based IDS
HFS
Hierarchical File Systems
HTTP
Hypertext Transfer Protocol
IANA
Internet Assigned Numbers Authority
IC
Integrated Circuit
ICANN
Internet Corporation for Assigned Names and Numbers
ICCP
Inter-Control Center Communications Protocol
ICMP
Internet Control Message Protocol
ICT
Information Communication and Technology
ID
Identify
IDF
Intermediate Distribution Frame
IDPS
Intrusion Detection and Prevention System
IDS
Intrusion-Detection Systems
IED
Intelligent Electronic Device
IEEE
International Electrical and Electronic Association
IETF
Internet Engineering Task Force
IGD
Internet Gateway Device
IKE
Internet Key Exchange
IoT
Internet of Things
IP
Internet Protocol
IPsec
Internet Protocol Security
IRP
Incident Response Policy
ISP
Internet Service Provider
IT
Information Technology
IV
Initialization Vector
L2TP
Layer 2 Tunneling Protocol
LAN
Local Area Network
LDAP
Lightweight Directory Access Protocol
LOIC
Low Orbit Ion Cannon
LOPA
Layer of Protection Analysis
MAC
Mandatory Access Control
MAC
Media Access Control
MAN
Metropolitan Area Network
MDF
Main Distribution Frame
MIT
Massachusetts Institute of Technology
MITM
Man-in-the-Middle
NAN
Neighborhood Area Network
NAS
Network Attached Storage
NAT
Network Address Translation
NAT-T
Network Address Translation-Traversal
NBIDS
Network-Based IDS
NFC
Near Field Communication
NIST
National Institute of Standards and Technology
NOS
Network Operating System
NS
Name Servers
NVT
Network Vulnerability Tests
NX
No Execution
OCIL
Open Checklist Interactive Language
OCSP
Online Certificate Status Protocol
OPC
Open Platform Connectivity
OSI
Open Systems Interconnection
OS
Operating System
OTP
One-Time Passwords
OVAL
Open Vulnerability and Assessment Language
PAKE
Password-Authenticated Key Agreement
PAN
Personal Area Network
PAP
Password Authentication Protocol
PC
Personal Computer
PEFS
Private Encrypted File System
PF
Packet Filter
PGP
Pretty Good Privacy
PIN
Password or Personal Identification Number
PIR
Passive Infrared
PKE
Public Key Encryption
PKI
Public Key Infrastructure
PnP
Plug and Play
PoE
Power over Ethernet
POODLE
Padding Oracle on Downgraded Legacy Encryption
POS
Point-of-Sale
POSIX
Portable Operating System Interface
PR
Protect
PSTN
Public Switched Telephone Network
PTZ
Pan/Tilt/Zoom
PVLAN
Private VLAN
QoS
Quality of Service
RADIUS
Remote Authentication Dial-In User Service
RARP
Reverse ARP
RAT
Remote Access Trojan
RBAC
Role-Based Access Control
RC
Recover
RDC
Remote Desktop Connection
RF
Radio Frequency
RFC
Request for Comments
RFID
Radio Frequency Identification
RISC
Reduced Instruction Set Computing
RS
Respond
SA
Security Association
SAAS
Software as a Service
SAN
Storage Area Network
SATA
Serial AT Attachment
SBS
Small Business Server
SCP
Secure Copy Protocol
SDN
Software-Defined Networking
SDO
Standards Development Organization
SET
Social Engineering Toolkit
SFTP
SSH File Transfer Protocol
SiIQ
Silicon Intelligence
SLE
Single Loss Expectancy
SMBFS
Server Message Block File System
SMTP
Simple Mail Transfer Protocol
SNMP
Simple Network Management Protocol
SQLi
SQL injection
SRK
Storage Root Key
SRP
Secure Remote Password
SSH
Secure Shell
SSL
Secure Socket Layer
SSO
Single Sign-on
STA
Spanning-Tree Algorithm
STP
Shielded Twisted Pair
STP
Spanning-Tree Protocol
SYN
Synchronize
SYN/ACK
Synchronize/Acknowledge
TCP
Transmission Control Protocol
TCP/IP
Transmission Control Protocol/Internet Protocol
TGS
Ticket Granting Server
TKIP
Temporary Key Integrity Protocol
TLD
Top-Level Domain
TLS
Transport Layer Security
TO
Transmission Owner
TOCTOU
Time Of Check-Time Of Use
TOP
Transmission Operator
TOU
Time of Use
TPID
Tag Protocol Identifier
TPM
Trusted Platform Module
TTL
Time-To-Live
UDP
User Datagram Protocol
UETA
Uniform Electronic Transactions Act
UL
Underwriters Laboratories
UPnP
Universal Plug and Play
USB
Universal Serial Bus
UTM
Unified Threat Management
UTP
Unshielded Twisted Pair
VACL
Virtual Access Control List
VCR
Videocassette Recorder
VLAN
Virtual Local Area Network
VMD
Video Motion Detection
VMPS
VLAN Management Policy Server
VNA
Vendor Neutral Archive
VoIP
Voice over IP
VPLS
Virtual Private LAN Service
VQP
VLAN Query Protocol
VTP
VLAN Trunking Protocol
WAN
Wide Area Network
WAP
Wireless Access Point
WBAN
Wireless Body-Area Network
WEP
Wired Equivalent Privacy
Wi-Fi
Wireless Fidelity
WLAN
Wireless Local Area Network
WPA
Wi-Fi Protected Access
WSDL
Web Services Description Language
XD
eXecute Disable
XN
Execute Never
XSS
Cross-Site Scripting
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset