“Access Control in Support of Information Systems, Security Technical Implementation Guide.” (DISA-STIG, Version 2 and Release 2). December 2008. Defense Information Systems Agency (DISA), The U.S. Department of Defense (DOD).
Garcia, Mary Lynn. 2001.
National Fire Protection Association (NFPA) 10, 1998. Quincy, MA.
National Fire Protection Association (NFPA) 25, 1998.Quincy, MA.
Patterson, David G., III. 2004.
“Security Requirements for Cryptographic Modules” (NIST FIPS PUB 140-3 draft), July 2007. National Institute of Standards and Technology (NIST), U.S. Department of Commerce, Gaithersburg, Maryland.
Tyska, Louis A. and Fennelly, Lawrence J. 2000.
This appendix provides a glossary of key information systems and information technology security terms useful to the CISSP Exam candidates. Reading the glossary terms prior to reading the practice chapters (domains) can help the candidate understand the chapter contents better. More than one definition of a key term is provided to address multiple meanings and contexts in which the term is used or applied.
The glossary is provided for a clear understanding of technical terms used in the ten domains of this book. The CISSP Exam candidates should know these terms for a better comprehension of the subject matter presented.
Numbers and Letters
The first generation of analog-based wireless technology.
The second generation of digital wireless technology that supports voice and text.
The third generation of digital wireless technology that supports video.
The fourth generation of digital wireless technology that provides faster display of multimedia.
The IEEE standard for virtual local-area networks (VLANs).
The IEEE standard for logical link control. (IEEE is Institute of Electrical and Electronics Engineers.)
The IEEE standard for carrier sense multiple access with collision detection (CSMA/CD) access method and physical layer specifications for Ethernet local-area networks (LANs).
The IEEE standard for Token bus access method and physical layer specifications for LANs.
The IEEE standard for Token ring access method and physical layer specifications for LANs.
The IEEE standard for Distributed queue dual bus access method and physical layer specifications for wired metropolitan-area networks (MANs).
The IEEE standard for wireless LAN medium access control (MAC) sublayer and physical layer specifications. It uses a path-sharing protocol.
The IEEE standard for radio band that is faster than 80211b but has a smaller range.
The IEEE standard that is inexpensive and popular with sufficient speed but with interference problems.
The IEEE standard for providing quality of service (QoS).
The IEEE standard for achieving access point interoperability.
The IEEE standard that is fast but expensive and is mostly used by businesses.
The IEEE standard for providing improved security over wired equivalent privacy (WEP).
The IEEE standard for improving throughput rates.
The IEEE standard for improving the amount of time for data connectivity.
The IEEE standard for providing performance metrics.
The IEEE standard for providing data integrity, data origination authenticity, replay protection, and data confidentiality.
The IEEE standard for wireless personal-area networks (e.g., Bluetooth).
The IEEE standard for air interface for fixed broadband wireless access systems such as wireless MANs.
A
(1) It is related to stepwise refinement and modularity of computer programs. (2) It is presented in levels such as high-level dealing with system/program requirements and low-level dealing with programming issues.
(1) The ability to make use of any information system (IS) or information technology (IT) resources. (2) The ability to do something with information in a computer. (3) Access refers to the technical ability to do something (e.g., read, create, modify, or delete a file or execute a program).