Читаем CISSP Practice полностью

Advanced intelligent networks

AK

Authorization key

ALE

Annual loss expectancy

ALG

Application layer gateway

ANI

Automatic number identification

ANN

Artificial neural network

AP

Access point

APDU

Application protocol data unit

API

Application programming interface

ARP

Address resolution protocol

AS

Authentication server/authentication service/autonomous system

ASCII

American standard code for information interchange

ASP

Active server page

ATA

Advanced technology attachment

ATM

Asynchronous transfer mode/automated teller machine

AV

Anti-virus

AVP

Attribute-value par

B

B2B

Business-to-business electronic commerce model

B2B2C

Business-to-business-to-consumer electronic commerce model

B2C

Business-to-consumer electronic commerce model

B2E

Business-to-employees electronic commerce model

BCP

Business continuity plan

BGP

Border gateway protocol

BIA

Business impact analysis

BIOS

Basic input/output system

BITS

Bump-in-the-stack

BOOTP

Bootstrap protocol

BPI

Business process improvement

BPR

Business process reengineering

BRP

Business recovery (resumption) plan

BS

Base station

BSS

Basic service set

C

C2B

Consumer-to-business electronic commerce model

C2C

Consumer-to-consumer electronic commerce model

C&A

Certification and accreditation

CA

Certification authority

CAC

Common access card

CAN

Campus-area network

CASE

Computer-aided software engineering

CBC

Cipher block chaining

CBC-MAC

Cipher block chaining-message authentication code

CC

Common Criteria

CCE

Common configuration enumeration

CCMP

Cipher block chaining message authentication code protocol

CCTV

Closed circuit television

CDMA

Code division multiple access

CDN

Content delivery network

CEO

Chief executive officer

CER

Crossover error rate (biometrics)

CERT

Computer emergency response team

CFB

Cipher feedback

CGI

Common gateway interface

CHAP

Challenge-handshake authentication protocol

CHIPS

Clearing house interbank payment system

CIDR

Classless inter-domain routing

CIO

Chief information officer

CIRC

Computer incident response center

CIRT

Computer incident response team

CISO

Corporate information security officer

CKMS

Cryptographic key management systems

CM

Configuration management

CMAC

Cipher-based method authentication code

CMM

Capability maturity model

CMS

Configuration management system

CMVP

Cryptographic module validation program

CONOP

Concept of operations (i.e., only one document)

COOP

Continuity of operations

COTS

Commercial off-the-shelf

CP

Certificate policy

CPE

Common platform enumeration

CPS

Certification practice statement

CPU

Central processing unit

CRAM

Challenge-response authentication mechanism

CRC

Cyclic redundancy check

CRL

Certificate revocation list

CRM

Customer relationship management

CS

Client/server

CSIRC

Computer security incident response capability

CSIRT

Computer security incident response team

CSMA/CA

Carrier sense multiple access with collision avoidance

CSMA/CD

Carrier sense multiple access with collision detection

CSRC

Computer security resource center

CSO

Chief security officer

CSP

Credentials service provider/critical security parameter

CTO

Chief technology officer

CTR

Counter mode encryption

CVE

Common vulnerabilities and exposures

CVSS

Common vulnerability scoring system

D

DA

Data administration/administrator/destination address

DAA

Designated approving authority/designated accrediting authority

DAC

Discretionary access control

DAD

Duplicate address detection

DASD

Direct access storage device

DBA

Database administrator

DBMS

Database management system

DC

Domain controller

DCE

Distributed computing environment/data circuit terminating equipment

DCL

Data control language

DD

Data dictionary

DDL

Data definition language

DDP

Distributed data processing

DDOS

Distributed denial-of-service

DEA

Data encryption algorithm

DES

Data encryption standard

DESX

Extended data encryption standard

DFD

Data flow diagram

DH

Diffie-Hellman

DHCP

Dynamic host configuration protocol

DISA

Direct inward system access/U.S. Defense Information Systems Agency

DML

Data manipulation language

DMZ

Demilitarized zone

DNS

Domain name system

DNP

Distributed network protocol

DNS

Domain name system

DOM

Document object model

DoS

Denial-of-service

DoQ

Denial-of-quality

DPA

Differential power analysis

DRP

Disaster recovery plan

DSA

Digital signature algorithm

DSL

Digital subscriber line

DSP

Digital signal processors

DSS

Digital signature standard

DVMRP

Distance vector multicast routing protocol

E

E2E

Exchange-to-exchange electronic commerce model

EAL

Evaluation assurance level

EAP

Extensible authentication protocol

EBCDIC

Extended binary coded decimal interchange code

EBGP

Exterior border gateway protocol

EBTS

Electronic benefit transfer system

EC

Electronic commerce

ECC

Elliptic curve cryptography

ECDSA

Elliptic curve digital signature algorithm

ECDH

Elliptic curve Diffie-Hellman

ECP

Перейти на страницу:

Похожие книги

100 абсолютных законов успеха в бизнесе
100 абсолютных законов успеха в бизнесе

Почему одни люди преуспевают в бизнесе больше других? Почему одни предприятия процветают, в то время как другие терпят крах? Известный лектор и писатель по вопросам бизнеса нашел ответы на эти очень трудные вопросы. В своей книге он представляет набор принципов, или `универсальных законов`, которые лежат в основе успеха деловых людей всего мира. Практические рекомендации Трейси имеют вид 100 доступных для понимания и простых в применении законов, относящихся к важнейшим сферам труда и бизнеса. Он также приводит примеры из реальной жизни, которые наглядно иллюстрируют, как работает каждый из законов, а также предлагает читателю упражнения по применению этих законов в работе и жизни.

Брайан Трейси

Деловая литература / Маркетинг, PR, реклама / О бизнесе популярно / Финансы и бизнес