Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
53 Cards in this Set
- Front
- Back
CISSP |
Certified Information Systems Security Professional
|
|
ANSI
|
American National Standards Institute
|
|
CBK
|
Common Body of Knowledge
|
|
DES
|
Data Encryption Standard
|
|
AES
|
Advanced Encryption Standard
|
|
PAP
|
Password Authentication Protocol
|
|
CHAP
|
Challenge Handshake Authentication
|
|
RADIUS
|
Remote Authentication Dial-In User Service
|
|
LDAP
|
Lightweight Directory Access Protocol
|
|
AAA
|
Authentication, Authorization, Accountability
|
|
FRR
|
False Reject Rate
|
|
FAR
|
Fale Accept Rate
|
|
CER
|
Crossover Error Rate
|
|
TACACS
|
Terminal Access Controller Access Control System
|
|
KDC
|
Key Distribution Center
|
|
AS
|
Authentication Service
|
|
TGS
|
Ticket Granting Service
|
|
SESAME
|
Secure European System and Applications in a Multi-Vendor Environment
|
|
RAS
|
Remote Access Service
|
|
EAP
|
Extensible Authentication Protocol
|
|
UDP
|
User Datagram Protocol
|
|
ISP
|
Internet Service Provider
|
|
VPN
|
Virtual Private Network
|
|
TCP
|
Transmission Control Protocol
|
|
SCTP
|
Stream Control Transmission Protocal
|
|
IPSec
|
Internet Protocol Security
|
|
TLS
|
Transport Layer Security
|
|
DBMS
|
Database Management System
|
|
DAC
|
discretionary access control
|
|
ACL
|
Access control List
|
|
UDI
|
Unconstrained data item
|
|
CDI
|
Constrained data item
|
|
IVP
|
Integrity verification Procedures
|
|
TP
|
Transformation Procedures
|
|
SDLC
|
Software Development Life Cycle
|
|
HIDS
|
Host-based intrusion detectoin systems
|
|
BCP
|
Cusiness Continuity Planning
|
|
DRP
|
Disaster Recovery Planning
|
|
BIA
|
Business Impact Assessment
|
|
MTD
|
Maximum Tolerable Downtime
|
|
RTO
|
Recovery Time Objective
|
|
RPO
|
Recovery Point Objective
|
|
SMS
|
Short Messaging Service
|
|
PKI
|
Public Key Infrastructure
|
|
DES
|
Data Encryption Standard
|
|
3DES
|
Triple Data Encryption Standard
|
|
AES
|
Advanced Encryption Standard
|
|
IDEA
|
International Data Encryption Algorithm
|
|
RC5
|
Rivest Cipher 5
|
|
ECB
|
Electronic Code Book
|
|
CBC
|
Cipher Block Chaining
|
|
CFB
|
Cipher Feedback
|
|
OFB
|
Output Feedback
|