Chapter 4 Acronyms Flashcards
IDSs
Intrusion detection systems
IPSs
Intrusion prevention systems
HIDS
Host-based intrusion detection systems
NIDS
Network-based intrusion detection systems
SYN Flood Attack
Common DoS attack
SYN
Synchronize
ACK
Acknowledge
TCP
Transmission Control Protocol
CVE List
Common Vulnerabilities and Exposures List
NOC
Network Operations Center
SCADA
Supervisory Control And Data Acquisition
APTs
Advance Persistent Threats
RATs
Remote Access Tools
WLAN
Wireless Local Area Network
WAP
Wireless Access Point
WAN
Wide Area Network (internet port)
NAT
Network Address Translation
DHCP
Dynamic Host Configuration Protocol
IEEE
The Institute of Electrical and Electronic Engineers
WEP
Wired Equivalent Privacy
WPA
WiFi Protected Access
WPA2
WiFi Protected Access II
TKIP
Temporal Key Integrity Protocol
CCMP
Cipher Block Chaining Message Authentication Code Protocol
AES
Advance Encryption Standard
Very strong and efficient encryption algorithm
EAP
Extensible Authentication Protocol
SSID
Service Set Identifier
WPS
WiFi Protected Setup
PSK
Pre-Shared Key
Doesn’t provide Authentication
RADIUS
Remote Access Dial In User Service
WTLS
Wireless Transport Layer Security
ECC
Elliptic Curve Cryptography
OSA
Open System Authentication (doesn’t use a PSK)
SSID
Service Set Identifier
The name of a wireless network
IV
Initialization Vector
WPS
WiFi Protected Setup
PIN
Personal Identification Number
NFC
Near Field Communication
PANs
Personal Area Networks
PDAs
Personal Digital Assistants
RAS
Remote Access Service
VPN
Virtual Private Network
NAC
Network Access Control
POTS
Plain Old Telephone Service
VoIP
Voice over Internet Protocol
PPP
Point to Point Protocol
VPN
Virtual Private Network
SAs
Security Associations
ESP
Encapsulating Security Payload
L2TP
Layer 2 Tunneling Protocol
SSTP
Secure Socket Tunneling Protocol
PPTP
Point to Point Tunneling Protocol
HTTPS
Hypertext Transfer Protocol Secure
NAC
Network Access Control