Term
|
Definition
A port-based authentication protocol. Wireless can use 802.1x. For example, WPA2-Enterprise mode uses an 802.1x server (implemented as a radius server) to add authentication. |
|
|
Term
|
Definition
Triple Digital Encryption Standard |
|
|
Term
|
Definition
Authentication, Authorization, and Accounting |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Advanced Encryption Standard |
|
|
Term
|
Definition
Advanced Encryption Standard 256 bit |
|
|
Term
|
Definition
|
|
Term
|
Definition
Annualized Loss Expectancy. Used to measure risk with annualized rate of occurrence (ARO) and single loss expectancy (SLE). The ALE identifies the total amount of loss expected for a given risk. The calculation is SLExARO=ALE |
|
|
Term
|
Definition
Access point, short for wireless access point (WAP) |
|
|
Term
|
Definition
Annualized Rate of Occurrence. Used to measure risk with ALE and SLE. The ARO identifies how many times a loss is expected to occur in a year. The calculation is SLExARO=ALE |
|
|
Term
|
Definition
Address Resolution Protocol |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Basic Input/output System |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Counter Mode with Cipher Block Chaining Message Authentication Code Protocol |
|
|
Term
|
Definition
Closed-circuit Television |
|
|
Term
|
Definition
Computer Emergency Response Team |
|
|
Term
|
Definition
Challenge Handshake Authentication Protocol |
|
|
Term
|
Definition
Confidentiality, Integrity, Availability |
|
|
Term
|
Definition
Computer Incidence Response Team |
|
|
Term
|
Definition
Continuity of Operations Plan |
|
|
Term
|
Definition
Cyclical Redundancy Check |
|
|
Term
|
Definition
Certification Revocation List |
|
|
Term
|
Definition
Discretionary Access Control |
|
|
Term
|
Definition
Discretionary Access Control List |
|
|
Term
|
Definition
Data Execution Prevention |
|
|
Term
|
Definition
Digital Encryption Standard |
|
|
Term
|
Definition
Dynamic Host Configuration Protocol |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Digital Signature Algorithm |
|
|
Term
|
Definition
Distributed denial-of-service |
|
|
Term
|
Definition
Extensible Authentication Protocol |
|
|
Term
|
Definition
Elliptic Curve Cryptography |
|
|
Term
|
Definition
|
|
Term
|
Definition
Electromagnetic Interference |
|
|
Term
|
Definition
Encapsulating Security Protocol |
|
|
Term
|
Definition
|
|
Term
|
Definition
File Transfer Protocol Secure |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Global Positioning System |
|
|
Term
|
Definition
Generic Routing Encapsulation |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Host-based intrusion detection system |
|
|
Term
|
Definition
Host-based intrusion prevention system |
|
|
Term
|
Definition
Hash-based message Authentication Code |
|
|
Term
|
Definition
|
|
Term
|
Definition
Hypertext Markup Language |
|
|
Term
|
Definition
Hypertext Transfer Protocol |
|
|
Term
|
Definition
Hypertext transfer protocol secure |
|
|
Term
|
Definition
Heating, ventilation and air conditioning. |
|
|
Term
|
Definition
Infrastructure as a service |
|
|
Term
|
Definition
Internet Control Message Protocol |
|
|
Term
|
Definition
|
|
Term
|
Definition
Intrusion Detection System |
|
|
Term
|
Definition
Institute of Electrical and Electronic Engineers |
|
|
Term
|
Definition
Internet Group Management Protocol |
|
|
Term
|
Definition
Internet Information Services |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Internet Message Access Protocol v4 |
|
|
Term
|
Definition
Intrusion Prevention Systrm |
|
|
Term
|
Definition
Internet Protocol Security |
|
|
Term
|
Definition
Internet Protocol version 4 |
|
|
Term
|
Definition
Internet Protocol version 6 |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Internet Service Provider |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Layer 2 Tunneling Protocol |
|
|
Term
|
Definition
|
|
Term
|
Definition
Local Area Network Manager |
|
|
Term
|
Definition
Lightweight Directory Access Protocol |
|
|
Term
|
Definition
Lightweight Extensible Authentication Protocol |
|
|
Term
|
Definition
Mandatory Access Control Media Access Control Message Authentication Code |
|
|
Term
|
Definition
Metropolitan Area Network |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Microsoft Challenge Handshake Authentication Protocol |
|
|
Term
|
Definition
Maximum Transmission Unit |
|
|
Term
|
Definition
|
|
Term
|
Definition
Network-based Intrusion Detection System |
|
|
Term
|
Definition
Network-based Intrusion Prevention System |
|
|
Term
|
Definition
National Institute of Standards and Technology |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
New Technology File System |
|
|
Term
|
Definition
Network Address Translation |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Open Vulnerability Assessment Language |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Password Authentication Protocol |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Protected Extensible Authentication Protocol |
|
|
Term
|
Definition
Personal Electronic Device |
|
|
Term
|
Definition
|
|
Term
|
Definition
Personally Identifiable Information |
|
|
Term
|
Definition
Personal Identification Number |
|
|
Term
|
Definition
Personal Identity Verification Card |
|
|
Term
|
Definition
Public Key Infrastructure |
|
|
Term
|
Definition
Post Office Protocol version 3 |
|
|
Term
|
Definition
Plain old telephone service |
|
|
Term
|
Definition
|
|
Term
|
Definition
Point-to-point Tunneling Protocol |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Remote Authentication Dial-In User Service |
|
|
Term
|
Definition
Redundant Array of Inexpensive (or Independent) Disks |
|
|
Term
|
Definition
Disk Striping. Raid-0 improves performances but does not provide fault tolerance. |
|
|
Term
|
Definition
Disk mirroring. RAID-1 uses two disks and provides fault tolerance. |
|
|
Term
|
Definition
Disk striping with parity. RAID-5 uses three or more disks and provides fault tolerance. |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Role-based Access Control Rule-based Access Control |
|
|
Term
|
Definition
Ron's code, or Rivest's Cipher. Symmetric Encryption algorithm. |
|
|
Term
|
Definition
Radio Frequency Interface |
|
|
Term
|
Definition
RACE Integrity Primitives Evaluation Message Digest. |
|
|
Term
|
Definition
|
|
Term
|
Definition
An Asymmetric algorithm used to encrypt data and digitally sign transmissions. It is named after it's creates, Rivest, Shamir and Adleman, and RSA is also the name of the company they founded together. RSA relies on the mathematical properties of prime numbers when creating public and private keys. |
|
|
Term
|
Definition
Rapid Spanning Tree Protocol |
|
|
Term
|
Definition
|
|
Term
|
Definition
Real-time Transport Protocol |
|
|
Term
|
Definition
Secure/Multipurpose Internet Mail Extensions |
|
|
Term
|
Definition
|
|
Term
|
Definition
Security Content Automation Protocol |
|
|
Term
|
Definition
|
|
Term
|
Definition
Small Computer System Interface |
|
|
Term
|
Definition
Software Development Life Cycle |
|
|
Term
|
Definition
Software Development Life Cycle Methodology |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Secure Hypertext Transfer Protocol |
|
|
Term
|
Definition
|
|
Term
|
Definition
Subscriber Identity Module |
|
|
Term
|
Definition
Security Incident Response Team |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Simple Mail Transfer Protocol |
|
|
Term
|
Definition
Simple Network Management Protocol |
|
|
Term
|
Definition
Synchronous Optical Network Technologies |
|
|
Term
|
Definition
Spam Over Internet Messaging |
|
|
Term
|
Definition
|
|
Term
|
Definition
Structured query language |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Secure Socket Tunneling Protocol |
|
|
Term
|
Definition
Spanning Tree Protocol Shielded Twisted Pai |
|
|
Term
|
Definition
|
|
Term
|
Definition
Terminal Access Controller Access-Control System |
|
|
Term
|
Definition
Terminal Access Controller Access-Control System+ |
|
|
Term
|
Definition
|
|
Term
|
Definition
Transmission Control Protocol |
|
|
Term
|
Definition
Transmission Control Protocol/Internet Protocol |
|
|
Term
|
Definition
Trivial File Transfer Protocol |
|
|
Term
|
Definition
Temporal Key Integrity Protocol |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Uninterruptible Power Supply |
|
|
Term
|
Definition
Universal Resource Locator |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Virtual Local Area Network |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Wireless Intrusion Detection System |
|
|
Term
|
Definition
Wireless Intrusion Prevention System |
|
|
Term
|
Definition
Wireless Local Area Network |
|
|
Term
|
Definition
|
|
Term
|
Definition
Wi-Fi Protected Access version 2 |
|
|
Term
|
Definition
Wireless Transport Layer Security |
|
|
Term
|
Definition
Extensible Markup Language |
|
|
Term
|
Definition
Extended Terminal Access Controller Access-Control System |
|
|
Term
|
Definition
Cross-site Request Forgery |
|
|
Term
|
Definition
|
|