информационная безопасность
без паники и всерьез
 подробно о проекте
Rambler's Top100За кого нас держат?Spanning Tree Protocol: недокументированное применениеСетевые кракеры и правда о деле Левина
BugTraq.Ru
Русский BugTraq
 Анализ криптографических сетевых... 
 Модель надежности двухузлового... 
 Специальные марковские модели надежности... 
 Бэкдор в xz/liblzma, предназначенный... 
 Три миллиона электронных замков... 
 Doom на газонокосилках 
главная обзор RSN блог библиотека закон бред форум dnet о проекте
bugtraq.ru / библиотека / безопасность
БИБЛИОТЕКА
вход в библиотеку
книги
безопасность
программирование
криптография
internals
www
телефония
underground
беллетристика
разное
обзор: избранное
конкурс
рейтинг статей
обсуждение




Подписка:
BuqTraq: Обзор
RSN
БСК
Закон есть закон




Список аббревиатур по информационной безопасности
Составитель: Алексей Лукацкий
Опубликовано: dl, 08.03.05 19:26

Изучая различные материалы по защите информации (статьи, документации, презентации и т.д.), каждый специалист по информационной безопасности регулярно сталкивается с различными аббревиатурами. Но бывает очень сложно запомнить все расшифровки этих акронимов. Понимая это, компания Cisco Systems, мировой лидер в области решений по информационной безопасности, разработала для всех специалистов этот документ, который включает в себя трактовку свыше 900 различных аббревиатур.

Исходный документ

A
AAAttribute Authority
AAAAuthentication, Authorization And Accounting
AADSAccount Authority Digital Signature
AAFIDAn Architecture For Intrusion Detection
ABAAmerican Bar Association
ACCAccess Control Center
ACEAccess Control Entry
ACF2Access Control Facility 2
ACIAccess Control Information
ACLAccess Control List
ACOAccess Control Officer
ACPAccess Control Program
ACS1. Access Control Server
2. Access Control System
ADActive Directory
ADFAccess Control Decision Function
ADIAccess Control Decision Information
ADOAccess Decision Object
AEFAccess Control Enforcement Function
AEPApplication Environment Profile
AESAdvanced Encryption Standard
AFCERTAir Force CERT
AFISAutomated Fingerprint Identification System
AFIWCAir Force Information Warfare Center
AFRLAir Force Research Laboratory
AFSSIAir Force System Security Instruction
AFSSMAir Force System Security Memorandum
AHAuthentication Header
AIAuthentication Information
AICApplication Inspection and Control
AIDAdaptive Intrusion Detection system
AICPAAmerican institute of certified public accountants
AIRKArea Interswitch Rekeying Key
AISAutomated Information Systems
AISSAutomated Information Systems Security
AISEPAustralasian Information Security Evaluation Programme
AISSAPAutomated Information System Security Assessment Program
AISSPArmy Information Systems Security Program
AKAutomatic Remote Rekeying
AKAAuthentication and Key Agreement
AKDAutomatic Key Distribution
AKDCAutomatic Key Distribution Center
A-KeyAuthentication Key
AKMCAutomated Key Management Center
AKMSAutomated Key Management System
ALGApplication Layer/Level Gateway
AMFAuthentication Management Field
AMIAuthentication Management Infrastructure
ANSAAdaptive Network Security Alliance
ANSMMAdaptive Network Security Manager Module
APARAuthorized Program Analysis Record
ARArmy Regulation
ARLAuthority Revocation List
ARPAAdvanced Research Projects Agency
AS1. Authentication Server
2. Authentication Service
ASAAdaptive Security Algorithm
ASAXAdvanced Security Audit-trail Analysis on uniX
ASDAttack Signature Detection
ASICApplication Specific Integrated Circuit
ASIMAutomated Security Incident Measurement
ASISAmerican Society for Industrial Security
ASRAccess and Security Representative
ASSISTAutomated Systems Security Incident Support Team
AUBADAutomated User Behavior Anomaly Detection system
AuCAuthentication Center
AUPAcceptable Use Policy
AUSCERTAustralian Computer Emergency Response Team
AUTNAuthentication Token
AVAntivirus
AVERTAnti-Virus Emergency Response Team
B
BCBlock Chaining
BCABrand Certification Authority
BCPBusiness Continuity Plan
BCERTBoeing CERT
BCIBrand CRL Identifier
BIABusiness Impact Analysis
BLMBell-LaPadula Model
BOBack Orifice
BO2KBack Orifice 2000
BOVPNBranch Office Virtual Private Network
BPCPBusiness Process Contingency Plan
BS7799British Standard for Information Security Management, British Standard 7799
BSI1. Bundesamt für Sicherheit in der Informationstechnik
2. Boot Sector Infector
BSoDBlue Screen of Death
C
C2Command and Control
C2WCommand and Control Warfare
C3Command, control and communications
C3ICommand, control, communications and intelligence
C4Command, Control, Communications, and computers
C4ICommand, Control, Communications, Computers, and Intelligence
C4ISRCommand, Control, Communications, Computer Intelligence, Surveillance and Reconnaissance
C&ACertification and Accreditation
CACertification Authority
CATCommon Authentication Technology
CAATComputer-Assisted Audit Technique
CADSCertification Authority Digital Signature
CALEACommunications Assistance for Law Enforcement Act
CASControlled Access System
CASLCustom Audit Scripting Language
CASTот имен Carlisle Adams and Stafford Tavares
CAPICryptographic Application Programming Interface
CAWCertification authority workstation
CBACContent-based access control
CBCCipher Block Chaining
CBCCCipher Block Chaining With Checksum
CCCommon Criteria
CCACardholder Certification Authority
CCEPCommercial COMSEC Endorsement Program
CCICommon Content Inspection
CCIPSComputer Crime and Intellectual Property Section
CBCCipher Block Chaining
CCCommon Criteria
CCBConfiguration Control Board
CCI1. Common Content Inspection
2. Controlled Cryptographic Item
CCIPCentre for Critical Infrastructure Protection
CCITSECommon Criteria for Information Technology Security Evaluation
CCMCounter Mode with Cipher Block Chaining Message Authenticity Check
CCMPCounter Mode–CBC MAC Protocol
CCSECheck Point Certified Security Engineer
CCSPCisco Certified Security Professional
CCTLCommon Criteria Testing Laboratory
CCTPCommon Criteria Testing Program
CDS1. Cryptographic Device Services
2. Certificate Discovery Server
CDSA1. Common Data Security Architecture
2. Communication And Data Security Architecture
CEMCommon Evaluation Methodology
CER1. Crossover Error Rate
2. Cryptographic Equipment room
CERIASCenter for Education and Research in Information Assurance and Security
CERT/CCCERT Coordination Center
CERT-NLComputer Emergency Response Team Netherlands
CFBCipher Feedback
CHAPChallenge Handshake Authentication Protocol
CIContent Inspector
CIAC1. Computer Incident Advisory Capability
2. Computer Incident Assessment Capability
CIDCommon Intrusion Detection
CIDDSCommon Intrusion Detection Director System
CIDFCommon Intrusion Detection Framework
CIKCryptographic Ignition Key
CINCCommander-in-Chief
CIOChief Information Officer
CIP1. Critical Infrastructure Protection
2. Crypto-Ignition Plug
CIPAChildren‘s Internet Protection Act
CIPCContent Inspection Protocol Client
CIPSOCommon IP Security Option
CIRKCommon Interswitch Rekeying Key
CIRT1. Cyber-Incident Response Team
2. Computer Incident Response Team
CISCenter for Internet Security
CISACertified Information Systems Auditor
CISFCatalyst Integrated Security Framework
CISLCommon Intrusion Specification Language
CISOChief Information Security Officer
CISSPCertified Information Systems Security Professional
CK1. Compartment Key
2. Cipher Key
CKGCooperative Key Generation
CKLCompromised Key List
CMConfiguration Management
CMCCiphering Mode Command
CMCSCOMSEC Material Control System
CMDSComputer Misuse Detection System
CMEACellular Message Encryption Algorithm
CMPCertificate Management Protocol
CMSCryptographic Message Syntax
CMWCompartmented Mode Workstation
CNAComputer Network Attack
CNCSCryptonet Control Station
CNDComputer Network Defense
CNKCryptonet Key
COASTComputer Operations, Audit, and Security Technology
COECommon Operating Environment
COMPUSECComputer Security
COMPSECComputer Security
COMSECCommunications Security
COOChief Operating Officer
COOPContinuity of Operations Plan
COPPAChildren‘s Online Privacy Protection Act
COPS1. Computer Oracle and Password System
2. Common Open Policy Service
CORESComputer Response Squad
COTSCommercial Off-The-Shelf
CPCertification Policy
CPRMContent Protection for Removable Media
CPS1. Certificate Practices Statement
2. COMSEC Parent Switch
CRAMChallenge-Response Authentication Mechanism
CRCCyclic Redundancy Check
CRLCertificate Revocation List
CRPCOMSEC Resources Program
CSClassified Sensitive
CSACisco Security Agent
CSCComputer Security Center
CSE1. Communications Security Element
2. Content Security Element
CSIComputer Security Institute
CSIRComputer Security Incident Response
CSIRCComputer Security Incident Response Capability
CSIRTComputer Security Incident Response Team
CSOChief Security Officer
CSORComputer Security Objects Register
CSP1. Cryptographic Service Provider
2. Critical Security Parameters
CSRCertificate Signing Request
CSRCComputer Security Response Center
CSRTContent Security Response Team
CSS1. Comsec Subordinate Switch
2. Continuous Signature Service
CSSMCommon Security Services Manager
CSSOContractor Special Security Officer
CSTCComputer Security Technology Center
CSTVRPComputer Security Technical Vulnerability Reporting Program
CT&ECertification Test And Evaluation
CTAKCipher Text Auto-Key
CTCPECCanadian Trusted Computer Product Evaluation Criteria
CT-KIPCryptographic Token Key Initialization Protocol
CTRCounter Mode
CUPCOMSEC Utility Program
CVE1. Common Vulnerabilities and Exposures
2. Common Vulnerability Enumeration
CVPContent Vectoring Protocol
CVSSCommon Vulnerability Scoring System
D
DAA1. Designated Approving Authority
2. Delegated Accrediting Authority
DAC1. Discretionary Access Control
2. Data Authentication Code
DACDiscretionary Access Control
DACLDiscretionary Access Control List
DAMADemand Assigned Multiple Access
DAMEDark Avenger's Mutation Engine
DARPADefense Advanced Research Projects Agency
DASSDistributed Authentication Security Service
DCCSDepartmental Committee on Computer Security
DCTFDISA Continuity of Operations and Test Facility
DDN SCCDefense Data Network Security Coordination Center
DDoSDistributed Denial of Service
DEAData encryption Algorithm
DECCDefense Enterprise Computing Center
DECC-DDefense Enterprise Computing Center œ Detachment
DEKData Encryption Key
DESData Encryption Standard
DFADeterministic Finite Automata
DFN-CERTDeutsches Forschungsnetz Computer Emergency Response Team
DHDiffie-Hellman
DHADirectory Harvest Attack
DIDSDistributed Intrusion Detection System
DIIDefense Information Infrastructure
DISADefense Information Systems Agency
DISAIDefense Information Systems Agency Instruction
DISNDefense Information System Network
DITSCAPDoD Information Technology Security Certification and Accreditation Process
DLEDDedicated Loop Encryption Device
DLARDefense Logistics Agency Regulation
DMCDefense Megacenter
DMVPNDynamic Multipoint VPN
DMZDemilitarized zone
DNSSECSecure DNS
DoDDepartment of Defense
DOD-CERTDepartment of Defense Computer Emergency Response Team
DOIDomain of Interpretation
DoSDenial of Service
DPAPIData Protection API
DPLDegausser Products List
DRMDigital Rights Management
DRPDisaster Recovery Plan
DSADigital Signature Algorithm
DSO1. Departmental Security Officer
2. Data Security Officer
DSSDigital Signature Standard
DSVDynamic Signature Verification
DSXDynamic Security Extension
DTICDefense Technical Information Center
DTKThe Deception ToolKit
DTLSDescriptive Top-Level Specification
DVCPDynamic VPN Configuration Protocol
E
EAElectronic Attack
EALEvaluation Assurance Level
EAPExtensible Authentication Protocol
EAPOLEAP over LAN
ECBElectronic codebook
ECCElliptic Curve Cryptosystem/Cryptography
ECCMElectronic Counter-Countermeasures
ECDLElliptic Curve Discrete Logarithm
ECDSAElliptic Curve Digital Signature Algorithm
ECMElectronic Countermeasures
ECPAElectronic Communications Privacy Act
ECPLEndorsed Cryptographic Products List
EDESPLEndorsed Data Encryption Standard Products List
EDS CENEDS Computer Emergency Network
EESEscrowed Encryption Standard
EFFElectronic Frontier Foundation
EFSEncrypting File System
EFTOEncrypt For Transmission Only
EICAREuropean Institute of Computer Anti-Virus Research
EKEEncrypted Key Exchange
EKMSElectronic Key Management System
ELSEC1. Electronic Security
2. Electronic Emission Security
EMERALDEvent Monitoring Enabling Responses to Anomalous Live Disturbances
EMRTEmergency Response Time
EMSEC1. Emanation security
2. Emissions Security
EPElectronic Protection
EPLEvaluated Products List
EPSElectronic Protection System
ERSEmergency Response Service
ESElectronic Warfare Support
ESAEncapsulating Security Payload
ESEElectronic Security Environment
ESMEnterprise Security Manager
ESPEncapsulating Security Payload
ESSEmbedded Security Subsystem
ETLEndorsed Tools List
EUCIEndorsed for Unclassified Cryptographic Item/Information
EWElectronic warfare
F
FARFalse Acceptance Rate
FBFeedback buffer
FBIFederal Bureau of Investigation
FCFederal Criteria
FCSRFeedback With Carry Shift Register
FCRAFair Credit Reporting Act
FDoSFlooder Denial of Service
FEALFast Data Encipherment Algorithm
FedCIRCFederal Computer Incident Response Capability
FIPSFederal Information Processing Standard
FIRSTForum of Incident Response and Security Teams
FISMAThe Federal Information Security Management Act
FISSEAFederal Information Systems Security Educator's Association
FIWCFleet Information Warfare Center
FPGAField Programmable Gate Array
FPKIFederal Public-key Infrastructure
FRRFalse Rejection Rate
FSMFinite State Machine
FSOField Security Operations
FSRSFunctional Security Requirements Specification
FTAMFile Transfer Access Management
FTLSFormal Top-Level Specification
FWFirewall
G
G7799GIAC Certified ISO-17799 Specialist Certified Professionals
GAKGovernment Access to Keys
GAOGeneral Accounting Office
GASSATAGenetic Algorithm for Simplified Security Audit Trail Analysis
GAWNGIAC Auditing Wireless Networks Certified Professionals
GBLCGIAC Business Law and Computer Security Certified Professionals
GCAGeopolitical Certificate Authority
GCDSGIAC Contracting for Data Security Certified Professionals
GCFAGIAC Certified Forensics Analyst Certified Professionals
GCFWGIAC Certified Firewall Analyst Certified Professionals
GCIAGIAC Certified Intrusion Analyst Certified Professionals
GCIHGIAC Certified Incident Handler Certified Professionals
GCSBGovernment Communications Security Bureau
GCSC1. Government Communications Security Committee
2. GIAC Certified Security Consultant Certified Professionals
GCUXGIAC Certified UNIX Security Administrator Certified Professionals
GCWNGIAC Certified Windows Security Administrator Certified Professionals
GEWFGIAC E-warfare Certified Professionals
GHSCGIAC HIPAA Security Implementation Certified Professionals
GHTQGIAC Cutting Edge Hacking Techniques Certified Professionals
GIACGlobal Information Assurance Certification
GIDGroup ID
GINAGraphical Identification and Authorisation
GISAGerman Information Security Agency
GISOGIAC Information Security Officer Certified Professionals
GISFGIAC Information Security Fundamentals Certified Professionals
GLBAGraham-Leach-Billey Act
GLFRGIAC Law of Fraud Certified Professionals
GLITGIAC Legal Issues in Information Technologies Certified Professionals
GMKGroup Master Key
GNOSCGlobal Network Operations and Security Center
GPOGroup Policy Object
GREGeneric Routing Encapsulation
GREMGIAC Reverse Engineering Malware Certified Professionals
GrIDSGraph-based Intrusion Detection System
GRIPGuidelines and Recommendations for Security Incident Processing
GSAEGIAC Security Audit Essentials Certified Professionals
GSEGIAC Security Expert Certified Professionals
GSECGIAC Security Essentials Certification Certified Professionals
GSIGrid Security Infrastructure
GSLCGIAC Security Leadership Certification Certified Professionals
GSNAGIAC Systems and Network Auditor Certified Professionals
GSPGlobal Security Policy
GSS-APIGeneric Security Services -Application Programming Interface
GTKGroup Transient Key
GUIDGlobally Unique Identifier
GULSGeneric Upper Layer Security
GWGateway
H
HIDSHost-based IDS
HAHigh Availability
HIPAAHealth Insurance Portability and Accountability Act
HMAC1. Hash Message Authentication Code
2. Header Message Authentication Code
HSMHardware Security Module
HTTPSSecure HyperText Transfer Protocol
I
I2WARInfrastructural And Information Warfare
I&AIdentification and Authentication
I&W/TAIndications And Warnings / Threat Assessment
IAInformation Assurance
IAKERBInitial and Pass-Through Authentication Using Kerberos V5
IAMIdentity and Access Management
IAPIntrusion Alert Protocol
IAVAInformation Assurance Vulnerability Alert
IAVMInformation Assurance Vulnerability Management
IBACIdentity Based Access Control
IBAGINFOSEC Business Advisory Group
IBW1. Information-Based Warfare
2. Intelligence-Based Warfare
ICATInternet Categorization of Attacks Toolkit
ICRAInternet Content Rating Association
ICRLIndirect Certificate Revocation List
ICSInterdepartmental Committee on Security
ICSAInternational Computer Security Association
ICVIntegrity Check Value
ID1. Identifier
2. Intrusion detection
IDEAInternational Data Encryption Algorithm
IDESIntrusion Detection Expert System
IDIOTIntrusion Detection In Our Time
IDIPIntruder Detection and Isolation Protocol
IDLEIntrusion Data Library Enterprise
IDPIntrusion Detection and Prevention System
IDSIntrusion Detection System
IDTIntrusion Detection Tool
IDSCIntrusion Detection Systems Consortium
IDWInformation Dominance Warfare
IDWGIntrusion Detection Working Group
IETFInternet Engineering Task Force
IHTIncident Handling Team
IIAInstitute of Internal Auditors
IIRKInterarea Interswitch Rekeying Key
IISSCCInternational Information Systems Security Certification Consortium
IKIntegrity Key
IKEIPSec Key Exchange
iKPInternet Keyed Payments Protocol
INFOSECInformation Security
INFOWARInformation Warfare
IPInformation Protection
IPCAInternet Policy Certification Authority
IPMOINFOSEC Program Management Office
IPRAInternet Policy Registration Authority
IPS1. Intrusion Prevention System
2. Intrusion Protection Systems
IPSecInternet Protocol Security
IPSOInternet Protocol Security Option
IRFInherited Rights Filter
IRKInterswitch Rekeying Key
IRTIncident response team
IS1. Information System
2. Information Security
ISAInternet Security and Acceleration
ISACAInformation Systems Audit and Control Association
ISACFInformation Systems Audit and Control Foundation
ISAKMPInternet Security Association and Key Management Protocol
ISC2International Information Systems Security Certification Consortium
ISOInternational Standards Organization
ISS1. Internet Security Scanner
2. Internet Security Systems
3. Information Systems Security
ISSA1. Information Systems Security Association
2. International Systems Security Association
ISSEInformation Systems Security Engineering
ISSMInformation Systems Security Manager
ISSO1. Information Systems Security Officer
2. NSA Information Systems Security Organization
ISSPInformation System Security Policy
ISSPMInformation Systems Security Program Manager
ITAIntruder Alert
ITARInternational Traffic in Arms Regulations
IT-SACInformation Technology Information Sharing and Analysis Center
ITSECInformation Technology Security Evaluation Criteria
ITSEMInformation Technology Security Evaluation Manual
ITU-TInternational Telecommunications Union, Telecommunication Standardization Sector
ItWIn the Wild
IV1. Initialization Vector
2. Initialization Value
IWInformation warfare
J
JCEJava Cryptographic Extension
K
KAKKey-Auto-Key
KDCKey Distribution Center
KEAKey Exchange Algorithm
KEK1. Key-Encrypting Key
2. Key-Encryption-Key
KGKey Generator
KMASEKey Management Application Service Element
KMCKey Management Center
KMID1. Key Material Identifier
2. Key Management Identification Number
KMODCKey Material Ordering And Distribution Center
KMPKey Management Protocol
KMPDUKey Management Protocol Data Unit
KMSKey Management System
KMSAKey Management System Agent
KMUAKey Management User Agent
KPKey Processor
KPKKey Production Key
KSOSKernelized Secure Operating System
KTCKey Translation Center
KVGKey Variable Generator
L
LAALimited access authorization
L2FLayer 2 Forwarding Protocol
L2TPLayer 2 Tunneling Protocol
LCCLocal Control Center
LDAPLightweight Directory Access Protocol
LEALogging Export API
LEADLow-Cost Encryption/Authentication Device
LEAFLaw Enforcement Agency Field
LEAPLight EAP
LFSRLinear Feedback Shift Register
LIDSLinux Intrusion Detection Systems
LKGLoop Key Generator
LMDLocal Management Device
LPDLow Probability Of Detection
LPILow Probability Of Intercept
LRALimited Registration Authority
LSALocal Security Authority
LSPLocal Security Policy
M
MAC1. Message Authentication Code
2. Mandatory Access Control
3. Media Access Control
MADMalicious Activity Detection
MARSMonitoring, Analysis and Response System
MCAMerchant Certification Authority
MCERTMotorola Computer Emergency Response Team
MD2/MD4/MD5Message Digest
MDCManipulation Detection Code
MICMessage Integrity Check
MICRMagnetic Ink Character Recognition
MIDASMultics Intrusion Detection and Alerting System
MISPCMinimum Interoperability Specification for PKI Components
MISSIMultilevel Information System Security Initiative
MITMMan-in-the-middle
MLSMultilevel Security
MOSSMIME Object Security Services
MPLSMultiprotocol Label Switching
MPPEMicrosoft Point-to-Point Encryption
MRKManual Remote Rekeying
MS-CHAPMicrosoft Challenge Handshake Authentication Protocol
MSPMessage Security Protocol
MSSManaged Security Services
MSSPManaged Security Services Provider
MtEMutation Engine
MVCMicro-BIT Virus Center
N
NACAMNational COMSEC Advisory Memorandum
NACSINational COMSEC Instruction
NACSIMNational COMSEC Information Memorandum
NADIRNetwork Audit Director and Intrusion Reporter
NAKNegative Acknowledge
NASNetwork Access Server
NASIRCNASA Automated Systems Incident Response Capability
NAPTNetwork Address Port Translation
NARNetwork Address Retention
NASLNessus Attack Scripting Language
NATNetwork Address Translation
NAVCIRTNaval Computer Incident Response Team
NAVSONavy Staff Office Publication
NBARNetwork-Based Application Recognition
NCISNaval Criminal Investigative Service
NCSNational Cryptologic School
NCSANational Computer Security Association
NCSCNational Computer Security Center
NFATNetwork Forensic Analysis Tools
NFRNetwork Flight Recorder
NIACNational Infrastructure Advisory Council
NIAPNational Information Assurance Partnership
NIDNetwork Intrusion Detector
NIDES1. Network Intrusion Detection Expert System
2. Next-generation IDES
NIDSNetwork-based IDS
NIINational Information Infrastructure
NIPCNational Infrastructure Protection Center
NISAC1. National Information Security Assessment Center
2. National Industrial Security Advisory Committee
NISTNational Institute of Standards and Technology
NKSRNonkernel Security Related
NLSPNetwork Layer Security Protocol
NNIDNeural Network Intrusion Detector
NOSCNetwork Operations and Security Center
NRD tokenNon-Repudiation of Delivery token
NRO tokenNon-Repudiation of Origin token
NRS tokenNon-Repudiation of Submission token
NRT tokenNon-Repudiation of Transport token
NRINon-Repudiation Information
NSANational Security Agency
NSADNetwork Security Architecture And Design
NSARNetwork Security Architecture Review
NSCSSNational Supervisory Council for Security Systems
NSDD 145National Security Decision Directive 145
NSEPNational Security Emergency Preparedness
NSMNetwork Security Monitor
NSONetwork Security Officer
NSTACNational Security Telecommunications Advisory Committee
NSTATNetwork STAT
NSTISSAMNational Security Telecommunications and Information Systems Security Advisory/Information
Memorandum
NSTISSCNational Security Telecommunications and Information Systems Security Committee
NSTISSDNational Security Telecommunications and Information Systems Security Directive
NSTISSINational Security Telecommunications and Information Systems Security Instruction
NSTISSPNational Security Telecommunications and Information Systems Security Policy
NTCBNetwork Trusted Computing Base
NTLMWindows NT LAN Manager
NZSANew Zealand Security Association Inc
NZSISNew Zealand Security Intelligence Service
NZSITNew Zealand Security in Information Technology Publications
O
OAEPOptimal Asymmetric Encryption Padding
OCBOffset Codebook Mode
OCSPOn-line Certificate Status Protocol
ODESCOfficials Committee for Domestic and External Security
OFBOutput Feedback
OFBNLFOutput Feedback With A Nonlinear Function
OIDObject ID
OOBOut-Of-Band
OPSEC1. Open Platform for Secure Enterprise Connectivity
2. Operational security
OSSTMOpen-Source Security Testing Methodology
ORAOrganizational Registration Authority
OTADOver-The-Air Key Distribution
OTAROver-The-Air Rekeying
OTATOver-The-Air Key Transfer
OTP1. One-Time Password
2. One-Time Pad
OTTOne-Time Tape
P
P3PPlatform for Privacy Preferences
PAAPolicy Approving Authority
PACPrivilege Attribute Certificate
PAIINPrivacy, Authentication, Identification, Integrity, Non-Repudiation
PAINPrivacy, Authentication, Identification, Non-Repudiation
PAP1. Password Authentication Protocol
2. Pre-Attack Probe
PATPort Address Translation
PBCPlaintext Block Chaining
P-BESTProduction-Based Expert System Toolset
PCA1. Policy Certification Authority
2. Payment Gateway Certification Authority
3. Policy Creation Authority
PCBCPropagating Cipher Block Chaining
PCERTPurdue Computer Emergency Response Team
PCTPrivate Communication Technology
PCZProtected Communications Zone
PDProtocol Decode
PDMPix Device Manager
PDPPolicy Decision Point
PDRPreliminary Design Review
PDS1. Protected Distribution System
2. Practices Dangerous To Security
PEAPProtected EAP
PEMPrivacy Enhanced Mail
PENPolicy Enforced Networking
PEPPolicy Enforcement Point
PERTProgram Evaluation And Review Technique
PFBPlaintext Feedback
PFS1. Perfect Forward Secrecy
2. Public-Key Forward Secrecy
PFXPersonal Information Exchange
PGPPretty Good Privacy
PHFPhonebook File CGI Script
PIPrincipal investigator
PIDSPerimeter Intrusion Detection System
PIIPersonally Identifiable Information
PINPersonal Identity Number
PIXPrivate Internet eXchange
PKAPublic Key Algorithm
PKCPublic Key Cryptography
PKCSPublic-Key Cryptography Standards
PKIPublic Key Infrastructure
PKIXPublic Key Infrastructure X.509
PKPPublic Key Partners
PKSDProgrammable Key Storage Device
PLSDUPhysical Layer Service Data Unit
PMKPairwise Master Key
PMZPolicy Management Zone
PNEProtection Needs Elicitation
PNEKPost-Nuclear Event Key
POCProof Of Concept
POSTPlatform for Open Security Testing
POTPProtected One-Time Password
PPProtection Profile
PPKPer Packet Keying
PPLPreferred Products List
PPTPPoint-to-Point Tunneling Protocol
PRBACPartition Rule Base Access Control
PROPINProprietary Information
PRNGPseudo Random Number Generator
PSEPersonal Security Environment
PSIRTProduct Security Incident Response Team
PSMProtective Security Manual
PSKPre-Shared Key
PSLProtected Services List
PSSProbabilistic Signature Scheme
PTKPairwise Transient Key
PUKPIN Unblocking Key
PVLANPrivate VLAN
PWDSProtected Wireline Distribution System
Q
QOPQuality Of Protection
R
RA1. Registration Authority
2. Registration Agent
RACERapid Automatic Cryptographic Equipment
RACFResource Access Control Facility
RADIUSRemote Access Dial-In User Service
RAIDRecent Advances in Intrusion Detection
RAT1. Remote Access Trojan
2. Remote Administration Tool
RBACRole Based Access Control
RC4/RC5/RC6Rivest Chiper
RCURekeying control unit
REACTRapid Emergency Action Crisis Team
RFCRequest for Comment
RFIRequest For Information
RFPRequest For Proposal
RIPEMDRIPE Message Digest
RISSCRegional Information System Security Cell
RNOSCRegional Network Operations and Security Center
ROKSORegister of Known Spam Operations
ROSCRegional Operations Security Center
ROSIReturn of Security Investment
RSAот имен Rivest, Shamir, and Adleman
RSAREFRSA Reference Implementation
RSBACRule Set Based Access Control
RSNRobust Security Network
RUSSELRule Based Sequence Evaluation Language
RUVPNRemote User Virtual Private Networking
S
S\MIMESecure Multipurpose Internet Mail Extensions
SA1. System Administrator
2. Security Association
3. Suspicious Activity
SAASystem Agent Attack
SACLSystem Access Control List
SAFSystem Authorization Facility
SAFESecurity Architecture for the Enterprise
SAFERSecure And Fast Encryption Routine
SAIDSecurity Association Identifier
SAICScience Applications International Corporation
SAISSSubcommittee on Automated Information Systems Security of NTISSC
SAM1.Security Access Monitor
2. Suspicious Activity Monitoring
SAMLSecurity Assertion Markup Language
SAMPSuspicious Activity Monitoring Protocol
SANS1. System Administrator and Network Security Institute
2. SysAdmin, Audit, Network, Security Institute
SARKSAVILLE Advanced Remote Keying
SATANSystem Administrator Tool for Analyzing Networks
SASLSimple Authentication and Security Layer
SBUSensitive but Unclassified
SCSecure Client
SCASubordinate Certification Authority
SCCSecurity Coordination Center
SCEPSimple Certificate Enrollment Protocol
SCISensitive Compartmented Information
SCIFSecure Compartmentalized Information Facility
SCP1. Secure Copy
2. SSH Copy
SCVSecurity Configuration Verification
SDSecurity Descriptor
SDESecure Data Exchange
SDEESecurity Device Event Exchange
SDMSecurity Device Manager
SDNSSecure Data Network System
SDNRIUSecure Digital Net Radio Interface Unit
SDRSystem Design Review
SDSISimple Distributed Security Infrastructure
SEAL1. Software-optimized Encryption Algorithm
2. Screening External Access Link
SECNAVINSTSecretary of the Navy Instruction
SEDSecure Encryption Device
SEESecure Execution Engine
SEICarnegie Mellon University's Software Engineering Institute
SENVSecure Envelope
SEPScalable Encryption Processing
SERTSecurity Emergency Response Team
SETSecure Electronic Transaction
SFSecurity Function
SFASecurity Fault Analysis
SFPSecurity Function Policy
SFUGSecurity Features Users Guide
SGIDSet Group ID
S-HTTPSecure HyperText Transfer Protocol
SHASecure Hash Algorithm
SHSSecure Hash Standard
SIDSecurity ID
SIGDSecurity in Government Departments
SIGSECSignal Security
SILSStandards for Interoperable LAN/MAN Security
SISSSubcommittee on Information Systems Security of the NSTISSC
SKIPSimple Key-management for Internet Protocols
SLA1. Service Level Agreement
2. Security Level Agreement
SMSecurity Manager
SMISecurity Management Infrastructure
SMLStrength Of Mechanisms
SOAPSimple Object Access Protocol
SOCSecurity Operation Center
SOFStrength of Function
SOPStandard Operating Procedure
SP3/SP41. Security Protocol
2. Service Pack
SPASecure Posture Assessment
SPANSwitched Port Analyzer
SPCSoftware Publisher Certificate
SPFSender Policy Framework
SPI1. Security Parameters Index
2. Secure Profile Inspector
SPITSpam Over Internet Telephony
SPKSingle Point Key(Ing)
SPKISimple Public Key Infrastructure
SPKMSimple Public Key Mechanism
SPMSecurity Policy Model
SPNEGOSimple and Protected GSS-API Negotiation Mechanism
SRASub-Registration Authority
SRISystem Research Institute
SRLSecure Remote Login
SRPSecure Remote Password
SRR1. Security Readiness Review
2. Security Requirements Review
SS7Signaling System 7
SSAASystem Security Authorization Agreement
SSCSite Security Contact
SSHSecure Shell
SSIDService Set ID
SSL1. Secure Socket Layer
2. Standard Security Label
SSO1. Single Sign-On
2. Special Security Officer
SSP1. System Security Policy
2. System Security Plan
SSPISecurity Support Provider Interface
SSRTSoftware Security Response Team
SSSOSecure Single Sign-On
STSecurity Target
ST&ESecurity Test And Evaluation
STATState Transition Analysis Technology
STDState Transition Diagram
STESecure Terminal Equipment
STIGSecurity Technical Implementation Guide
STOPStack Overflow Protection
STS1. Single Trusted System
2. Subcommittee on Telecommunications Security of the NSTISSC
STU IIISecure Telecommunication Unit III
SUIDSet User ID
SUNSeTStanford University Network Security Team
SVStarting Variable
SVNSecure Virtual Network
S/WANSecure Wide Area Network
SyOPsSecurity operations procedures
T
TATraffic Analysis
TACTerminal Access Controller
TACACSTerminal Access Controller (TAC) Access Control System
TACTEDTactical Trunk Encryption Device
TAISSTelecommunications And Automated Information Systems Security
TAPTraffic Port Analyzer
TASOTerminal Area Security Officer
TCBTrusted Computing Base
TCGTrusted Computing Group
TCSECTrusted Computer System Evaluation Criteria
TECSECTechnical Security
TEDTrunk Encryption Device
TEKTraffic Encryption Key
TESSThe Exponential Encryption System
TFNTribe Flood Network
TFN2KTribe Flood Network 2000
TFSTraffic Flow Security
TKIPTemporal Key Integrity Protocol
TLS1. Transport Layer Security
2. Top-Level Specification
TLSOTop-Level Security Objectives
TLSPTransport Layer Security Protocol
TNITrusted Network Interpretation
TNIEGTrusted Network Interpretation Environment Guideline
TNIUTrusted Network Interface Unit
TOETarget of Evaluation
TPETrident Polymorphic Engine
TPEPTrusted Products Evaluation Program
TPMTrusted Platform Module
Triple-DESTriple Data Encryption Standard
TRAThreat and Risk Assessment
TRANSECTransmission Security
TRUSIXTrusted UNIX Working Group
TSATime-Stamping Authority
TSC1. TKIP Sequence Counter
2. TSF Scope of Control
TSCMTechnical Surveillance Countermeasures
TSECTelecommunications Security
TSFTOE Security Functions
TSFITSF Interface
TSIGTrusted Systems Interoperability Group
TSKTransmission Security Key
TSNTransitional Security Network
TSPTOE Security Policy
TTLSTunneled Transport Layer Security
TTPTrusted third party
TTRTime-To-Recover
TWHSThree-Way-Handshake
U
UAAUnauthorized Access Attempt
UCERTUnisys Computer Emergency Response Team
UFPURL Filtering Protocol
UIDUser ID
UIRKUnique Interswitch Rekeying Key
ULAUser Level Authentication
UNI-CERTUnisource Business Networks Computer Emergency Response Team
USUnclassified Sensitive
USPAUS Patriot Act
USTATUNIX STAT
V
V3PNVoice and Video-Enabled Virtual Private Network
VAVulnerability Assessment
VACVPN Accelerator Card
VAAPVulnerability Analysis and Assistance Program
VCTSVulnerability Compliance Tracking System
VDLVulnerability Descriptive Language
VELVulnerability Exploit Language
VLANVirtual Local Area Network
VPDNVirtual Private Dial-up Network
VPNVirtual private network
VRFVPN routing and forwarding
V&VVerification And Validation
VXVirus eXchange
W
WCERTWestinghouse Electric Corporation Computer Emergency Response Team
WEPWired Equivalent Privacy
WIDSWireless IDS
WPAWiFi Protected Access
WRAPWireless Robust Authentication Protocol
WSAWireless Security Auditor
WTLSWireless Transport Layer Security
X
XACMLXML Access Control Markup Language
XAUTHExtended Authentication
XKMSXML Key Management Service/Specification
0-9
3AAuthentication, authorization and accounting
3DESTriple DES
8lgm8 Little Green Men

Примечание: если вы заметите какие-нибудь неточности, у вас будут замечания, или вы найдете новые аббревиатуры, то мы будем благодарны, если вы пришлете их по адресу alukatsk@cisco.com

Составитель: Алексей Лукацкий

обсудить  |  все отзывы (0)

[48972; 17; 6.41]




Rambler's Top100
Рейтинг@Mail.ru





  Copyright © 2001-2024 Dmitry Leonov   Page build time: 0 s   Design: Vadim Derkach