Читаем CISSP Practice полностью

Plan of action and milestones

POC

Point of contact/proof of concept

POP

Post office protocol/proof-of-possession

POS

Point-of-sale

POTS

Plain old telephone service

PP

Protection profile

PPD

Port protection device

PPP

Point-to-Point Protocol

PPTP

Point-to-Point-Tunneling Protocol

PRNG

Pseudorandom number generator

PSK

Pre-shared key

PSP

Public security parameters

PSTN

Public switched telephone network

PTM

Packet transfer mode

PVC

Permanent Virtual Circuit

PVP

Patch and vulnerability group

Q

QA

Quality assurance

QC

Quality control

QoP

Quality of protection

QoS

Quality of service

R

RA

Registration authority

RAD

Rapid application development

RAdAC

Risk adaptive access control

RAD

Rapid application development

RADIUS

Remote Authentication Dial-In User Service

RAID

Redundant array of independent disks

RAM

Random access memory

RAP

Rapid application prototyping

RARP

Reverse Address Resolution Protocol

RAS

Remote Access Server/Registration, Admission, Status channel

RAT

Remote Administration Tool

RBAC

Role-based access control

RBG

Random bit generator

RC

Rivest cipher

RCP

Remote Copy Protocol

RDBMS

Relational database management system

RDP

Remote Desktop Protocol

RED

Random early detection

REP

Robots exclusion protocol

RF

Radio frequency

RFC

Request For Comment

RFI

Radio frequency interference/request for information

RFID

Radio frequency identification

RFP

Request for proposal

RFQ

Request for quote

RIB

Routing information base

RIP

Routing Information Protocol

RMF

Risk management framework

RNG

Random number generator

ROE

Rules of engagement

ROI

Return On Investment

ROM

Read-only memory

RPC

Remote procedure call

RPO

Recovery point objective

RR

Resource record

RS

Relay station

RSA

Rivest-Shamir-Adelman (algorithm)

RSBAC

Ruleset-based access control

RSN

Robust security network

RSO

Reduced sign-on

RSS

Really simple syndication

RSTP

Real-time streaming protocol

RSVP

Resource reservation protocol

RTCP

Real-time transport control protocol

RTF

Rich Text Format

RTO

Recovery time objective

RTP

Real-Time Transport Protocol

RuBAC

Rule-based access control

S

S/MIME

Secure/multipurpose (multipart) Internet mail extensions

SA

Security Association/source address

SACL

System access control list

SAD

Security association database

SAFER

Secure and fast encryption routine

SAML

Security assertion markup language

SAN

Storage area network

SAS

Statement on auditing standards

SATA

Serial ATA (advanced technology attachment)

S-BGP

Secure border gateway protocol

SC

Supply chain

SCAP

Security Content Automation Protocol

SCP

Secure Copy Protocol

SCM

Software configuration management

SCSI

Small Computer Systems Interface

SCTP

Stream Control Transmission Protocol

SD

Secure digital

SDLC

System development lifecycle/Synchronous DataLink Control

SDP

Service Discovery Protocol

SDSL

Symmetrical DSL

SEI

Software Engineering Institute

SEM

Security event management

SET

Secure electronic transaction

SFTP

Secure file transfer protocol

SHA

Secure hash algorithm

SHS

Secure hash standard

SIA

Security impact analysis

SID

Security Identifier

SIM

Subscriber identity module

SIP

Session Initiation Protocol

SKEME

Secure Key Exchange Mechanism

SKIP

Simple Key Management for Internet Protocol

SLA

Service-level agreement

SLIP

Serial Line Interface Protocol

SFTP

Secure file transfer protocol

SHTTP

Secure Hypertext Transfer Protocol

SRPC

Secure remote procedure call

SMDS

Switched Multimegabit Data Service

SME

Subject matter expert

SMS

Short message service/systems management server

SMTP

Simple Mail Transfer Protocol

SNA

System Network Architecture

SNMP

Simple Network Management Protocol

SNTP

Simple Network Time Protocol

SOA

Service-oriented architecture

SOAP

Simple Object Access Protocol/Service-oriented architecture protocol

SOCKS

Socket security

SOHO

Small office/home office

SOL

Single occurrence loss

SONET

Synchronous optical network

SOP

Standard operating procedure

SOW

Statement of work

SP

Service pack

SPA

Simple power analysis

SPI

Security Parameters Index

SPKI

Simple public key infrastructure

SPML

Service Provisioning Markup Language

SPX

Sequenced Packet Exchange

SQL

Structured Query Language

SRTP

Secure Real-Time Transport Protocol

SSDP

Simple Service Discovery Protocol

SSE-CMM

Systems Security Engineering Capability Maturity Model

SPX

Sequential packet exchange

SR

Service release

SS

Subscriber station

SSDP

Simple Service Discovery Protocol

SSH

Secure Shell

SSID

Service set identifier

SSL

Secure Sockets Layer

SSO

Single sign-on

SSP

Sensitive security parameter

ST

Security target

STD

State transition diagram

ST&E

Security test and evaluation

STIG

Security Technical Implementation Guide (by DISA for U.S. DoD)

STS

Security Token Service

SUID

Set-user-ID

SV&V

Software Verification and Validation

SVC

Switched Virtual Network

SWIFT

Перейти на страницу:

Похожие книги

100 абсолютных законов успеха в бизнесе
100 абсолютных законов успеха в бизнесе

Почему одни люди преуспевают в бизнесе больше других? Почему одни предприятия процветают, в то время как другие терпят крах? Известный лектор и писатель по вопросам бизнеса нашел ответы на эти очень трудные вопросы. В своей книге он представляет набор принципов, или `универсальных законов`, которые лежат в основе успеха деловых людей всего мира. Практические рекомендации Трейси имеют вид 100 доступных для понимания и простых в применении законов, относящихся к важнейшим сферам труда и бизнеса. Он также приводит примеры из реальной жизни, которые наглядно иллюстрируют, как работает каждый из законов, а также предлагает читателю упражнения по применению этих законов в работе и жизни.

Брайан Трейси

Деловая литература / Маркетинг, PR, реклама / О бизнесе популярно / Финансы и бизнес