Index

Access control lists (ACLs)

Account hijacking

Accounting

Advanced persistent threat (APT)

Agriculture

Anti-malware

Antivirus

Authentication

Availability

Badness-ometer

Bandwidth

Bit

Black hats

Blacklist

Bluetooth

Bogon

Border Gateway Protocol (BGP)

Bot

Botnet

Bug

Business logic

Byte

Carrier

Certificates

Certified Information Security Auditor (CISA)

Certified Information Security Manager (CISM)

Certified Information Systems Security Professional (CISSP)

Chief Information Security Officer (CISO)

Click fraud

Cloud

Compensating control

Computer Emergency Response Team (CERT)

Confidentiality

Content

Content filters

Control activity

Control objectives

Credentials

Crime as a service (CAAS)

Crimeware

Cryptography

Defense Industrial Base (DIB)

Denial of control

Denial of service (DOS)

Denial of view

Department of Homeland Security (DHS)

Dial-back

Discretionary access control (DAC)

Distributed control systems (DCSs)

Distributed denial of service (DDOS)

Distributed Network Protocol (DNP3)

Domain Keys Identified Mail (DKIM)

Domain Name Services (DNSs)

Domain squatting

Do-not-track

Doxing

Email

Encryption see cryptography

End user

End User License Agreements (EULAs)

Energy

Federal Emergency Management Administration (FEMA)

Federal Trade Commission

Field instrumentation

Finance

Firewall

Flaw

Freeware

FUD Factor

Global Positioning System (GPS)

Graphical user interface (GUI)

Hactivism

Health

Host intrusion detection system (HIDS)

Human resources

Improvised explosive device (IED)

Industrial control system (ICS)

Information Systems Audit and Control Association (ISACA)

Integrity

Intelligent electronic device (IED)

Internet Assigned Numbers Authority (IANA)

Internet Corporation for Assigned Names and Numbers (ICANN)

Internet Engineering Task Force (IETF)

Internet protocol (IP)

Internet Registrar

Internet service provider (ISP)

Intrusion detection system (IDS)

Intrusion prevention

Job control technician

Joyride

Key management

Law enforcement

Login

Malvertising

Malware

Mandatory access control (MAC)

Man-in-the-middle

Mash-up

Mean-time-to-repair (MTTR)

Messaging

Metrics, security

Military

MITRE

Multifactor authentication

Mutual identification

Name space

National Infrastructure Advisory Council (NIAC)

National Infrastructure Protection Plan (NIPP)

National Institute of Standards and Technology (NIST)

National Security Telecommunications Advisory Committee (NSTAC)

National Vulnerability Database (NVD)

Net neutrality

Network Address Translation (NAT)

Network listening

Network zone

Node

North Atlantic Treaty Organization (NATO)

Online behavioral advertising

Open source

Operating system

Packet

Patch

Penetration test

Personally identifiable information (PII)

Pharming

Phishing

Phone home

Policy servers

Port

Privacy

Programmable logic controller (PLC)

Proxy servers

Reference monitor

Remote access

Remote access tool (RAT)

Remote terminal unit (RTU)

Repudiate

Requests for comment (RFC)

Reverse engineer

Secure Socket Layer (SSL)

Security information management (SIM)

Security operations center (SOC)

Sender authentication

Smart grid

Smart meters

Social engineer

Social network

Spam

Spoof

Spyware

Standards

Supervisory Control and Data Acquisition (SCADA)

Technology malpractice

TNT

Top-level domain (TLD)

Traffic filters

Transmission Control Protocol (TCP)

Transport Layer Security (TLS)

Transportation

Tripwire

Trust

Unallocated address space

Universal serial bus

Virtual private network (VPN)

Water

White hat

White list

Zero Day

Zone

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset