Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Glossary

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z  |  Symbols

A[x, y, z]

Acronym(s):

None

Definition(s):

  For a state array A, the bit that corresponds to the triple (x, y, z).
Source(s): FIPS 202

Synonym(s):

None

See Also:
(t + k)-way combination coverage
[a, b]
{, a, b, …}
4-Way Handshake
A (i)
a | x
a || b
A Cloud Infrastructure
A MAC tag
a mod n
a, b, c, …, h
Abstract Syntax Notation 1
Abstract Syntax Notation One
Abstract Syntax Notion One
ACTS Covering Array Generator
Adaptable Antenna Support
Africa Network Information Centre
AJAX
Alternate Data Stream
Application Layer
Application Layer Gateway
Application Level Gateway
Application Protocol Data Unit
Application-Proxy Gateway
Array
Asia Pacific Network Information Centre
Assurance Of Possession Of A Private Key
Authorized Data Security Association List
Automatic Identification And Data Capture
b ≡ a mod n
BER-TLV Data Object
Biometric Data Block
Blu-Ray Disc
Border Gateway Protocol
Border Gateway Protocol 4
CA Facility
CDMA Subscriber Identity Module
Certification Anaylist
Chemical Industry Data Exchange
Comma Separated Values
Common Criteria Evaluation And Validation Scheme
Common Criteria Evaluation Assurance Level
Common Gateway Interface
Cooperative Association For Internet Data Analysis
Counter Mode For A Block Cipher Algorithm
Cryptographic Message Syntax
DARPA Agent Markup Language
Data Access Object
Data Aggregation
Data And Information Reference Model
Data Asset
Data Blockblock
Data Collector
Data Diode
Data Element
Data Encryption Algorithm
Data Encryption Security Association Type Indicator
Data Encryption Standard
Data Encryption Standard Electronic Code Book
Data Execution Prevention
Data Flow Control
Data Frame
Data Governance
Data Group
Data Historian
Data Integrity
Data Key, Data Encrypting Key
Data Link Layer
Data Loss
Data Loss Prevention
Data Mining
Data Mining/Harvesting
Data Modification
Data Object
Data Origin Authentication
Data Path
Data Protection Key
Data Provenance
Data Recovery Agent
Data Segmentsegment
Data Spillage
Data Tag
Data Transfer Device (COMSEC)
Data Transfer Solution
Defense Discovery Metadata Standard
Diffie-Hellmana Key Establishment Algorithm
DoD Discovery Metadata Standard
Domain Name System-Application Layer Gateway
EAP layer
Electronic Data Interchange
Elliptic Curve Group Modulo A Prime
Encapsulating Security Payload
Encapsulating Security Payload Header (IPv6 extension header)
Encapsulating Security Payload Protocol
Enhanced Data for GSM Evolution
Enhanced Data Rate
Enhanced Interior Gateway Routing Protocol
Enhanced Overlay
Enrollment Data Set
Extended Data Encryption Standard
Extended Validation Secure Sockets Layer
Extensible Authentication Protocol Flexible Authentication Via Secure Tunneling
Extensible Authentication Protocol-Transport Layer Security
Extensible Authentication Protocol-Tunneled Transport Layer Security
Exterior Border Gateway Protocol
Exterior Gateway Protocol
FBCA Operational Authority
Field-programmable gate array
First Byte Of A Two-Byte Status Word
First Parameter Of A Card Command
FISMA Report
Florida Association Of Computer Crime Investigators
Gateway
Gateway-To-Gateway (IPsec protection model)
GCD (a, b)
GCD(a, b)
Gray Box Testing
Gray Market
Graylist
Hazardous Materials
Hazards Of Electromagnetic Radiation To Fuel
Hazards Of Electromagnetic Radiation To Ordnance
Hazards Of Electromagnetic Radiation To People
HAZMAT
High Performance Radio Local Area Network
Host-To-Gateway (IPsec protection model)
Hypertext Transfer Protocol over Transport Layer Security
IA architecture
IA infrastructure
IA product
Incomplete Gamma Function
Infra Red Data Association
Infrastructure As A Service
Interior Gateway Protocol
Interior Gateway Protocol (e.g., Ibgp, Ospf, Rip)
Internal Border Gateway Protocol
International Data Encryption Algorithm
Internet Relay Chat
IP Payload Compression Protocol
Java API For XML Registries
Java EE
Java Platform, Enterprise Edition
Java Security Manager
Java Virtual Machine
JAXR
Key And Metadata Management Functions
Key/Metadata Recovery
KOA agent
KOA manager
KOA registration manager
Latin America And The Caribbean Network Information Centre
Layer 2 Forwarding
Layer 2 Tunneling Protocol
Layer 2 Vpn
Layer 3 Vpn
Layered Cots Product Solutions
LCM (a, b)
LCM(a, b)
Length In Bits Of A Non-Negative Integer X
Length in bytes of a non-negative integer, x
Liquid Crystal Display
Local Area Network
Lower Layer
Maximum Allowable Outage
Maximum Segment Size
Maximum Tolerable Downtime
Maximum Transmission Unit
Media Access Control
Media Access Control (Address)
Media Access Control Address
Media Gateway
Media Gateway Control Protocol
Media Library
Media Protection
Media Protection (NIST SP 800-53 security control family)
Media Sanitization
Metadata Element
Metadata Standards Working Group
Method Layer
Metropolitan Area Network
min (a, b)
Minutia Exchange
Mobile Data Terminal
Multi-Hop Relay Topology
Multimedia Card
Multi-Media Card
Multimedia Messaging Service
National Scada Testbed
Network Layer
Network Layer Security
One-Way Hash Algorithm
One-Way Transfer Device
Overlay
Path Maximum Transmission Unit
Payload
Payload Length (IPv6 Field)
Payment Card Industry
Payment Card Industry Data Security Standard
Pcmcia Security Tokens
Peer/Authenticator Layer
Physical Layer
Platform Architecture Layer
Platform As A Service
Portable Data File
Possession And Control Of A Token
Protocol Adaptation Layer
Quad-A DNS Resource Record
Redundant Array Of Inexpensive Disks
Redundant Arrays Of Inexpensive Disks
Relay
Relay Station
Removable Media Device
Replay (WLAN attack)
Replay Attacks
Revoke A Certificate
RSA Secret Value Encapsulation
Sandia National Laboratories
SCADA Server
SCAP Data Stream
SCAP Data Stream Collection
SCAP Result Data Stream
SCAP Source Data Stream
SCAP Source Data Stream Collection
Second Byte Of A Two-Byte Status Word
Second Parameter Of A Card Command
Secure Socket Layer
Secure Socket Layer/Transport Layer Security
Secure Sockets Layer
Security Control Overlay
select (V, a, b)
Semantics Of A Language
Sequence Covering Array Generator
SHAx(M)
Simple t -way combination coverage
Software As A Service
State Array
Storage Area Network
Store A Key Or Metadata
Supervisory Control And Data Acquisition
Support a Security Strength
Syntax
TDEA Electronic Codebook
Three-Key Triple Data Encryption Algorithm
Transport Layer
Transport Layer Security
Transport Layer Security Protocol
Transport Protocol Data Unit
Transport Relay Translator
Triple Data Encryption Algorithm
Triple Data Encryption Standard
Tunneled Transport Layer Security
Two-Key Triple Data Encryption Algorithm
Ultra High Frequency
Ultra Wideband
Unidirectional Gateway
Universal Plug And Play
Upper Layer
Upper Layer Protocol
Valid Data Element
Virtual Extended Local Area Network
Virtual Local Area Network
Virtualized Infrastructure Layer
WAYF
Wide Area Network
WiMAX
Wireless Local Area Network
Wireless Metropolitan Area Network
Wireless Personal Area Network
Wireless Wide Area Network
WPA WiFi
XML Schema Definition
Zero Day Attack