Acronyms & Terms Flashcards
CRL
Certificate Revocation List
RTO
Recovery Time Objective
PBKDF2
Password-Based Key Derivation Function 2 Key stretching algorithm (combines password with a random value, AKA a salt, and hashes them to create much longer keys.) Another algorithm is Bcrypt.
WIPS
Wireless Intrusion Prevention System
ESB
Enterprise Service Bus
Implements a communication system between mutually interacting software applications in a service-oriented architecture.
BIA
Business Impact Analysis
UDDI
Universal Description Discovery and Integration
A platform-dependent, XML Protocol that includes a (XML-based) registry by which businesses worldwide can list themselves on the Internet, and a mechanism to register and locate web service applications.
RTP
Real-time Transport Protocol
A network protocol for delivering audio and video over IP networks.
QLAN
Audio over IP networking technology component of the Q-Sys audio signal processing platform from QSC Audio Products.
SLA
Service Level Agreement
Commitment between a service provider and client.
Diameter
AAA protocol proceeding RADIUS. Application layer.
LEAP
Lightweight Extensible Authentication Protocol
A proprietary wireless LAN authentication method developed by Cisco.
DAM
Database Activity Monitor
Tool to monitor, capture and record database events in near-real time and provide alerts about policy violations.
COBO
Company-Owned Business Only
SCEP
Simple Certificate Enrollment Protocol The protocol is designed to make the issuing of digital certificates as scalable as possible. The idea is that any standard network user should be able to request their digital certificate electronically and as simply as possible. These processes have usually required intensive input from network administrators, and so have not been suited to large scale deployments.
RAD
Rapid Application Development
DSA
Digital Signature Algorithm
A FIPS for digital signatures, based on the mathematical concept of modular exponentiations and the discrete logarithm problem.
OTP
One-Time Password
IA
Interoperability Agreement
Jitter
The variations in transmission latency that can cause packet loss and degraded VoIP call quality.
LUN Masking
Authorization process that makes Logical Unit Numbers available to some hosts and unavailable to others. Implemented primarily at the HBA level.
FRR
False Rejection Rate
The probability of type 1 errors (false positive) in biometrics.
VDI
Virtual Desktop Infrastructure
The process of running a user desktop inside a virtual machine that lives on a server in the datacenter.
ICS
Industrial Control System