1. Trang chủ
  2. » Công Nghệ Thông Tin

Tài liệu system and network security acronyms and abbreviations doc

32 455 0
Tài liệu được quét OCR, nội dung có thể không chính xác
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề Tài liệu System and Network Security Acronyms and Abbreviations
Trường học Vietnam National University, Hanoi
Chuyên ngành System and Network Security
Thể loại Document
Thành phố Hanoi
Định dạng
Số trang 32
Dung lượng 1,54 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

‘System and Network Security Acronyms terageney Report 7881 and Abbreviations er 209 Karen Scarfone Victoria Thompson ‘Computer Security Divison Information Techpoloey Laboratory [Nati

Trang 1

ist interagency Report 7884

National institute of

Stondords and Technology

US Deportment of Commerce

Trang 2

‘System and Network Security Acronyms

terageney Report 7881 and Abbreviations

er 209

Karen Scarfone Victoria Thompson

‘Computer Security Divison Information Techpoloey Laboratory [Natio Insite of Stands and Technolgy Gaithersburg, MD 20899-9931

Trang 3

Reports on Computer Systems Technology The Information Technology Laboratory (TL) atthe National fstiate of Standards and Technoloxy (NIST) promotes the US, economy and public welfare by paving technical leadership forthe tion's

‘measurement una stands infrastructure ITI develops tess test thas referenced, prot a

‘Sincept iplementations, ad toca analysis o aemace the development an pvodict use of Jaformation technology TL s responsibilities ielade the development of tenia pss,

lninidito, and management starsat ae guidelines for theeostefTectve scary and pb ay of

*emelite unetsfielnfovnatip in Federal eompater systems, This Interagenes Report disensses ITL'S

‘Rseath, guidance and outeach eons in computer security ad its eallaboratve acts with indus,

‘government, and academic organizations

[Nato fst of Standards nd Technology Interagency Report 2581 SE pes (Sep 20095

Natal nite of Saar al Teshastogy no ited i ngÌyTh the

‘hits, materials or ep! nr©veeuly th ex seller fe porns

Trang 4

Sreteu aio NEtwoNKSECURTY chon AND ABARAT Acknowledgments

‘The autors, Karen Scarfone ofthe National Institue of Standards and Technology (NIST) and Victoria

“Thompson of Booz Allen Hamilton wish o thank thir colleagues who reviewed drafts ofthis repo, particularly Liz Lennon and Tim Grance of NIST, Thanks also g to individual sp orsanizaion: that Submited sugzestions,panicularly Tim Kramer, Mark Secof,Janine Pai, the US Deparment of Energy and the US, Department of State The authors also thank thir collegues who crested acronyn arn! abbreviation iss fo thie publications that were subsequently use as soares of information To hs not

‘Trademark Information All ames are registred trademarks o trademarks of thee respective companies,

Trang 6

Introduction

“This report contains a ist of selected asonyas and abbreviations for syst and network secuft terms

‘vith their veneraly accepted or preted defiations Kis intended ss «sours fr federal asenciss stad tet ucts af ydem and ntyorh secudly pghicgione

“The capitalization, sping, an definitions of acronyms and abbreviations frequently vary among publications fis easy to understand why this happens While some aeronyns and abbreviations (e.g WWW) ve onc univeralyroenanized! a undesced definition within the domtin of system and sotwork sory, olhers (eg, 1A, MAC) have nlite valid ditions depending pon the conte in

‘hich they ae sed, Some acronyms beat he reserlance to thee dentons, sch as Mies of (Operation Validation System forthe Triple DES Algorithm (TMOVS), Other use unexpected

“aptalization or speling (, Electonke Business using eXtensible Markup Language (€bXMLI and (Organisation for Eoononie Co-operation an! Development (OECD, Asa ret cronyns,

abbreviations and thse definitions may be inaccunsely or inconsistently defined by authors, perpetuating

‘rors ad confusing of misleading readers

‘his epot s meant to help reduce these ems an confusion by providing the generally accep ot prefered definitions of a so requemily used acronyms and abbreviations The list docs not nel all, Sssem and network swat teen, tor ita compen of every atonym an seston Foard i stem and network security dncuments published by NIST Reales sould peer o each documents Uist

St acroayans abd abreviations typically found in a append) For definisons applicable ta that

‘Technical terms are nt capitalized unless they ars proper nouns Names of pepe, places apd ups and he ties of protocol, tana, a algortns sre eansidered prope bans For Example ceitication a cerediation (C&A) sno eaialzed, but Advanced Enerypion Standard TABS) is capInlal

18 Collective nouns ae not eaitalzed fez wide are neswork [WAND,

H8 Nhon «wo or more dsfinitions of te same serio abbreiston ar given, the aceon oF sbrevaton is talisiz! and repeated! for cach definition, Dtnions are ts alphabetically

Trang 7

2 — Acronym and Abbreviatlon LISL

‘Tis section consists of a is of selected ystom and network sec acronyms and abbreviations, along

‘vith hii generally accepted fits, When there ate supe dint for single erm tae

‘seronymt or abeviation s aliczed an each deFincon is Usted separately

Numeric

TWRTT ‘one ies aio transhisdontacbonloay

3DES “TRpe DạS Eacrypioa Siaaa!

3 Sd Generation

3GPP 5rd Generation Partersip Project

3GPP3 3nd Generation Panaerstip Projet 2

A

4 wre resource econ ype

^A ADAG atte athens

AAA aulsetcaion, authorization, and accounting

AAAK, tademicdlon auhiniygien, an ryoantine key

AAD aional heated data

SAR ser ssion report

AAS ‘Mapiveattenna system

ABAC ute ase acess cont

acl aoces conta Hist

ACM Associaton for Computing Machinery

aco aythemicated eipher offset

AD Active Diets

AD sathenate data

ADs senate data seam

AES Avancal Eneyplion Stadt

AES.CBC Avancod Enerypiion Stand Cipher Blok Chaining

AES-CTR ‘Advanced Encryplio Standa-Counter Made

AFH adap fegueney hopping

A-GPS assisted global positioning system

alt Authentication cadet

AIDC “3womsdie eniiston and data capeure

AM, Associ to Am deifeafon atl Mobility

AIT automate Meniestion technology

AIAN ‘Asymvtonous Fvaeript an! XML

aK aaRofzadinn key

AKID abotzaion ky dsnifer

AKM dutencaion and key management

ALG “pplication lager patewoy

ANSI American National Sana Instioe

APL ‘pplication programming intertce

Trang 8

Adsnce Research Pree Agency snthenaton server

-3whewicdlon service

‘Aut Spyvare Coalition

‘ewe Stata Committee X9

‘American Sandan Cot foe Inforaion Interchange aires space laos endomizasion

autonomous system mame Abstract Syntax Ngtaion aetive server pages Advanced Technology Atatanent

‘Announcement Traffic Indieation Message ssynchronis teasfer mde

fukomato teller mace

‘Amis Information Exchange Nowork

——

business to business besteunent practice busines conto plan Border Gateway Prvool Border Gateway Praceol + Burspintie-ADI

‘osm impact analysis Biometie Application Programming Ineace hsjcintl/ouputsj den,

Banpin-be-Sack Business Process Modeling Langusg Business Process Specification Schema busines ecovery (resumption) plan base sation

base ston contler Tinh Star nition British Seely Indotry Association

os security practice base service set

base sevice set identifi fer shas-nothing-setity ise tinssiver sation binging update

Biting update acknowledgement

Trang 9

‘Cooperative Assotaon for ntmet Dats Analysis CConipletly Automsted Public Turing Test to Tell Computers an Humans Apa CConspater Ansvinus Reseateh Organiation

(Ceypograptic Algorithm Validation Progcam (Cipher Block Chaining

Cipher Block Chaining Message Authentication Code Common Biometric Exchange FileFormat

Goninon Criteria Common Configuration Enumeration Common ChteriaEvalation and Validation Scheme 'Conguter Crime and Imelistual Popany Sexiet complementary code keying

(Counter Mose with CRC MAC Counter Mode with CBC- MAC Prtosol Common Criteria Recognition Arngement (Corsmon Configuration Scoring System

‘unit ce top level rain shocking dished

umpc ise compact die fle system

‘se vision maple access

‘ompact is recordable compact dise read only memory cung duc rewrite

hie exeentive officer

‘Genter tor Easton and Resets in Infomation Assurance and Security

‘computer emergency response texm (CERT: Coonlination Cemter ConpuetFash®

(Gonpter Fraud and Abuse Act (Cipher Feedback

‘compar an financial investigations Code of Feds Repalations

‘omar Forensics to Testing

“APAogrpBjedly generated adlresas Common Gateway lesa

Challnge-Handshake Authentication Praco!

colder nigue Meter (Glasses Inter Domain Routing (Common tert File System

‘hit information office

“iia infant potetion Cita Iteasiactre Poston Commitee

Trang 10

'Coidenialldlornaloa Đntstien and Statistical Esficiney Act computer ineident esponsecapahilly

‘ompuer incident sponse center

‘CERIAS Ineident Response Dutahose

‘computer indent esponse tan Genter to vee Seeurity

‘hie information ecu otfcer

‘common log format

‘command line interface

‘common language runine CCenicate Management Authority Gpher- based Mtl Authenieaton Cole Gonmon Malware Enumeration

complementary metal oxie semicondactr Centers for Meiere and Medicaid Services CCespographie Message Syntax

(Gornmon Misuse Seong System

CMYP Cryptographic Modtle Validation Program

ov ‘eommon name

NSS Commitee National Security Systems

€NSSI Gomitee on National Seurty S3stetrs Inston

codec snderidsoer

cor ‘hatit oF interest

com CCoroponent Objet Mods

coor ‘ont of operations

COPPA Children t Onine Privacy Protection Act

CORBA® Gorman Objet Request Broker Archies

cors sonnets ofthese

œ safifole poley

œ ‘omtngeney plan

CPem “Coromon Piafom Enumeration

crt ‘mpression parameter index

CENI (Gente for the Protection of National Infastruture

crs cerfcation pructce statement

cru ental prcessine ait

CRAM shallenge response autheiation mechanism

CRC le nelunliev check

cK ‘etic revocation ist

sia {Cyber Security Industries Aiance

sinc ‘mputer security inident esponse capability

CSIRT ‘computer Security ieident sponse team

cso ‘hie security officer

csp ‘Credentials Service Provider

sR ccetifcate signing request

sre Computer Security Resonree Center

CSRDA, “Re Seeunty Reseah and Devclopnent Aelof 2013

Trang 11

‘outer mode eneryption Common Vulnerabilities sd Exposures Gorman Valserability Seong System (Common Weakness Enumeration

estnation adress

‘esignated agerediing authority

‘Sesignated approving authority tsretionary aoses contol picate address detection DARPA Avent Markup Larousse Digital Advanced Mobile Phone Service Data Aewess Objet

Defense Advanced Research Prajects Agency devils referenced toon mila

Satabase management system

‘Soman conte Disinhured Compating Environment Distibiied Component Objet Moet clsited etl system

eparinen of Defense Meta Specification distiuted denial of service

Data Encryption Algorithm Data Exevation Prevention Daa Encryption Sundiel Disb File System dynamic frequency seketion Diffie Heine

Dynamic Home Agent Address Discovery Dynamie Host Configuration Protocol Dymaaie Host Configuration Protocol for Interne Procol 6

US Department of Honcland Security Digital Westy Management Service

US Defense Information Systems Agoney signa link brary

vst memory aeons sented 20

‘stnguished name

‘domain sane Distributed Network Protocol

‘domi name system Domain Name System Blacklist Donn Name System Security Extensions

US Department of Commerce

US Depastmeat of Defense

6

Trang 12

lifeenil power analysis

‘va meowery agent ial ights management ddaysterrocovery plan Delegation Signor sdstnhution sytem tiferemiste services eld Digital Signaure Algorithm iit sserier tine Directory Services Markup Language delivery Stausnosfiction

‘dynam separation of day Digital Signature Standacd Dua Stick Transition Mechanism Disibated Transaction Coordinator Document Type Defiiion

Served est requirement DHCP unique kdeniier digital video se

etre Business using eXtensible Markup Langa Epi Curve over OLIN

etre Codebook (ane) Flite Curve Cyptograpy Flite Curve Diffie Hetlnin Elie Curve Digital Signature gorithm Enterprise Configuration Manager

Encryption Cont Protocol [lett Commanicalins Privacy Aet Enhanced Data rates for GSM Evol

Trang 13

Encrypting File System Baten ateway Protocol extension healer

European Institute for Computer Andviris Research Enhanced Interior Gateway Rowing Procol EAP Inegsty Key

ketene Pedet Code Information Services leon protected health information vents persecond

‘nierprse source plaming

‘terpise security management sytem [tered Simple Mal Transfer Pool sleefonieseial mmber

Eneapalaing Socity Payload Even Service Set

European Telecommunicatons Standaeds Insite European Union|

Fer Bridge Cenifcaion Authority Feral Bureau of lvestgaion Fer Bea of Investpaion Criminal Istice Information Services Division Fetal Comnmanieations Canussion|

Fetal Consasieations Commission Msnifestion nanisr Final cheeks fist

Fens! PKI Common Pliey Framework Fair Credit Reporting Act

frame check sequence Food and Drug Aminiseaton Feral Desking Core Configuration Fodersed Deselopment and Ceriication Ensigonment

Trang 14

Federal Financial Managereat Improvement Act Frequency hopping sped sets

Forwanting information base Fer Identity Credentialing Commies Feral Information Processing Stns Forum of tacit Response and Security Teams Federal Information System: Comols Audit Mangal Feder Information Security Management Act of 2002 Federal Information Sssems Security Educators’ Association Fetal Law Fforement Taig Center

fae mate te Fuhrer Mantin-Shanie false non match rate rset of Information Aet Fens Preparedness Ciular Fra Public Key Infrastractre deta Public Ke lnfiastnictie Architecture Feral Plc Ke laestnitare Plies Athos Tully qualified domain name

false rejection rate Feld scewty office Federal Trade Commision Federat Trade Commission Act Fie Transfer Pratca!

Fast User Switching fiscal year

Gta Information Grid _raphialiemifiction and astbenieaton

‘Gov Key Enerpion Key

‘Gear Lzach Bley Act [Geoup Maser Key GNU Privy Gast sovernmnt off the shelf necl public license {Group Policy Management Console Group Policy Object

_seeral packet ado service

“lobal positing system

Trang 15

‘Gina Standards One

US, Gener Services Administration Gal System foe Mobile Comsanicatons Genetic Token Card

roup tafe encryption key _toup erporal ey

tegen top level domain (Generalized TTL Secerty Mechanism _taphical user inerface

Nghilbihg home agent high assurance guard host comuole orice Trans of electromagnetic radiation to fast azar ofeletomagnesi radiation to ordnance oan of electomagnsi radiation to personne high Frequency

Hierarchical Fle System

US Depantnint of Heal and Hunan Sersices bon idfumalon

Host Mentity Protocol Health Insurance Posabiity and Accountability Act, igh performance ad local area stor

HKEY Local Machine Health Level Seven

me 1

Fuman-machine nero ost potted we High Performance File System human sources

Homeland Sccurity Advanced Reseach Projects Agency Homeland Sse Presulental Directive

High Toctnoogy Crime Investigation Association sper Test Caching Protaco!,

Hypeneut Markup Language Hapenteat Transer Proce) Sovute Hypertext Transfer Procol hen

0

Trang 16

Inter contol Center Communications Protocol Internet Connoction Firewall,

Internet Conia! Message Protocol Internet Cache Procol

industrial cone sss Tnternet Connection Sharing International Computer Secuity Assocation ineenly che valae

1eniieaiun Information Design Assurance Red Teutn integrated development envio

Teterata Drive Elecronics m¬¬`

Tntegrtel Dịial Enhancel Nersork entity Federasion Framework Tnyrsion Detection Message Fxchange Format ident management system

inusion desecion and prevention system iniasion detection system

[enity Sericelntclace Spocifistons entity Web Serviees Framework entity We Services Frtnework Dat Services Temple Internet Explorer

Inveratonsl Elecstechnesl Commission intligen electonie dedee

IEEE Standards Asseiation Interet Security Steering Group Internet Engineering ask Force Internet Ensinwerine Tank Force Best Current Practice Tnteret Engnsering Task Fore Request for Commens

Ngày đăng: 24/02/2014, 04:20

TỪ KHÓA LIÊN QUAN