|
2 | 2 | *[ACL]: Access Control List
|
3 | 3 | *[ACM]: Access Control Matrix
|
4 | 4 | *[ACS]: Automated Control System
|
5 |
| -*[AES]: Advanced Encryption Standard |
6 | 5 | *[AE]: Authenticated Encryption
|
| 6 | +*[AES]: Advanced Encryption Standard |
7 | 7 | *[AMI]: Advanced Metering Infrastructure
|
| 8 | +*[ANSI]: American National Standards Institute |
| 9 | +*[AP]: Access Point |
8 | 10 | *[API]: Application Programming Interface
|
9 | 11 | *[APT]: Advanced Persistent Threat
|
10 |
| -*[AP]: Access Point |
11 | 12 | *[ARP]: Address Resolution Protocol
|
12 | 13 | *[ASLR]: Address Space Layout Randomization
|
13 | 14 | *[BAN]: Body Area Network
|
| 15 | +*[bfr]: blocking factor: *bfr =* ⌊*B/R*⌋ |
14 | 16 | *[BIOS]: Basic Input Output System
|
15 | 17 | *[BPCS]: Basic Process Control System
|
16 | 18 | *[C&C]: Communication & Control
|
17 | 19 | *[CBC]: Cipher Block Chaining
|
18 | 20 | *[CCA]: Critical Cyber Asset
|
19 | 21 | *[CFB]: Cipher Feedback
|
20 | 22 | *[CIP]: Critical Infrastructure Protection
|
| 23 | +*[CoS]: Class of Service |
21 | 24 | *[COTS]: Commercial Off-The-Shelf
|
22 | 25 | *[CPS]: Cyber-Physical Systems
|
| 26 | +*[CPU]: Central Processing Unit |
23 | 27 | *[CSRF]: Cross-Site Request Forgery
|
24 | 28 | *[CTR]: Counter
|
25 |
| -*[CoS]: Class of Service |
26 | 29 | *[DAC]: Discretionary Access Control
|
27 | 30 | *[DAM]: Database Activity Monitoring
|
28 | 31 | *[DB]: Database
|
| 32 | +*[DBA]: Database Administration |
| 33 | +*[DBMS]: Database Management System |
29 | 34 | *[DCS]: Distributed Control System
|
| 35 | +*[DDL]: Data Definition Language |
30 | 36 | *[DDoS]: Distributed Denial-of-Service
|
31 | 37 | *[DES]: Data Encryption Standard
|
32 | 38 | *[DLP]: Data Loss Protection
|
| 39 | +*[DML]: Data Manipulation Language |
| 40 | +*[DML]: Database Manipulation Language |
33 | 41 | *[DMZ]: Demilitarized Zone
|
34 | 42 | *[DNS]: Domain Name System
|
35 |
| -*[DPIA]: Data Protection Impact Assessment |
| 43 | +*[DoD]: Department of Defense (USA) |
| 44 | +*[DoS]: Denial-of-Service |
36 | 45 | *[DPI]: Deep Packet Inspection
|
| 46 | +*[DPIA]: Data Protection Impact Assessment |
| 47 | +*[DRAM]: Dynamic Random Access Memory |
37 | 48 | *[DSA]: Digital Signature Algorithm
|
38 | 49 | *[DSS]: Digital Signature Standard
|
39 |
| -*[DoD]: Department of Defense (USA) |
40 |
| -*[DoS]: Denial-of-Service |
41 | 50 | *[EAP]: Extensible Authentication Protocol
|
42 | 51 | *[EBP]: Base pointer, the top of the current frame.
|
43 | 52 | *[ECB]: Electronic Codebook
|
44 | 53 | *[ECC]: Elliptic-Curve Cryptography
|
| 54 | +*[EER]: Extended-Entity Relationship |
45 | 55 | *[ESP]: Electronic Security Perimeter
|
46 | 56 | *[ESP]: Encapsulating Security Payload
|
47 | 57 | *[ESP]: Stack pointer, the top of the stack.
|
| 58 | +*[F⁺]: Closure |
48 | 59 | *[FIPS]: Federal Information Processing Standard
|
| 60 | +*[FK]: Foreign Key |
49 | 61 | *[FTP]: File Transfer Protocol
|
50 | 62 | *[GID]: Group ID
|
51 | 63 | *[HAN]: Home Area Network
|
|
64 | 76 | *[ISO]: International Standards Organization
|
65 | 77 | *[IV]: Initialization Vector
|
66 | 78 | *[KDC]: Key Distribution Center
|
| 79 | +*[KR]: Knowledge Representation |
67 | 80 | *[LAN]: Local Area Network
|
68 | 81 | *[LIDAR]: Light Detection and Ranging
|
69 | 82 | *[MAC]: (1): Mandatory Access Control (2): Media Access Control (3): Message Authentication Code
|
70 | 83 | *[MAN]: Metropolitan Area Network
|
71 | 84 | *[MDNS]: Multicast Domain Name System (DNS)
|
72 |
| -*[MTU]: Master Terminal Unit |
73 | 85 | *[MitM]: Man-in-the-Middle
|
| 86 | +*[MTU]: Master Terminal Unit |
74 | 87 | *[NAC]: Network Access Control
|
75 | 88 | *[NBAD]: Network Behavior Anomaly Detection
|
76 | 89 | *[NERC]: North American Electric Reliability Corporation
|
|
79 | 92 | *[NOP]: No operation
|
80 | 93 | *[NTBA]: Network Threat Behavior Analysis
|
81 | 94 | *[OFB]: Output Feedback
|
82 |
| -*[OSI]: Open Systems Interconnection (model) |
83 | 95 | *[OS]: Operating System
|
| 96 | +*[OSI]: Open Systems Interconnection (model) |
84 | 97 | *[OTP]: One-Time Password
|
85 | 98 | *[PCS]: Process Control System
|
86 | 99 | *[PFD]: Probability of Failure on Demand
|
87 | 100 | *[PFS]: Perfect Forward Secrecy
|
88 | 101 | *[PIA]: Privacy Impact Assessment
|
89 | 102 | *[PII]: Personally-Identifiable Information
|
90 | 103 | *[PIN]: Personal Identification Number
|
| 104 | +*[PK]: Primary Key |
91 | 105 | *[PKI]: Public Key Infrastructure
|
92 | 106 | *[PLC]: Programmable Logic Controller
|
93 | 107 | *[PMU]: Phasor Measurement Unit
|
94 | 108 | *[POP]: Pop a value off the stack
|
| 109 | +*[PTR]: Pointer (databases) |
95 | 110 | *[PUSH]: Push a value onto the stack
|
96 | 111 | *[QoS]: Quality of Service
|
| 112 | +*[RAM]: Random Access Memory |
97 | 113 | *[RBAC]: Role-Based Access Control
|
98 | 114 | *[RET]: Return from function
|
99 | 115 | *[RNG]: Random Number Generator
|
100 | 116 | *[RTU]: Remote Terminal Unit
|
101 |
| -*[SADB]: Security Association Database |
102 | 117 | *[SA]: Security Association
|
| 118 | +*[SADB]: Security Association Database |
103 | 119 | *[SCADA]: Supervisory Control & Data Acquisition
|
104 | 120 | *[SE]: Social Engineering
|
105 | 121 | *[SHA]: Secure Hash Algorithm
|
106 | 122 | *[SHA]: Secure Hash Algorithms
|
107 | 123 | *[SIEM]: Security Information Event Management
|
108 | 124 | *[SIL]: Safety Integrity Level
|
109 |
| -*[SIPS]: Secure Session Initiation Protocol |
110 | 125 | *[SIP]: Session Initiation Protocol
|
| 126 | +*[SIPS]: Secure Session Initiation Protocol |
111 | 127 | *[SIS]: Safety Instrumented Systems
|
112 | 128 | *[SL]: Security Level
|
113 | 129 | *[SPD]: Security Policy Database
|
114 | 130 | *[SPI]: Security Parameter Index
|
115 | 131 | *[SQL]: Structured Query Language
|
116 | 132 | *[SQLi]: SQL injection
|
| 133 | +*[SSD]: Solid-State Drive |
117 | 134 | *[SSID]: Service Set Identifier
|
118 | 135 | *[SSL]: Secure Socket Layer
|
119 | 136 | *[SSM]: Security Service Module
|
|
125 | 142 | *[ToS]: Type of Service
|
126 | 143 | *[UDP]: User Datagram Protocol
|
127 | 144 | *[UID]: User or Device ID
|
128 |
| -*[VMM]: Virtual Machine Monitor |
| 145 | +*[UML]: Unified Modeling Language |
129 | 146 | *[VM]: Virtual Machine
|
| 147 | +*[VMM]: Virtual Machine Monitor |
130 | 148 | *[VPN]: Virtual Private Network
|
131 | 149 | *[WAN]: Wide Area Network
|
132 | 150 | *[WEP]: Wired Equivalent Privacy
|
133 |
| -*[WPA2]: WiFi Protected Access II |
134 | 151 | *[WPA]: WiFi Protected Access
|
| 152 | +*[WPA2]: WiFi Protected Access II |
135 | 153 | *[XSS]: Cross Site Scripting
|
0 commit comments