Выбрать главу

FAT

File allocation table

FDDI

Fiber distributed data interface

FDE

Full disk encryption

FDM

Frequency division multiplexing

FEK

File encryption key

FFC

Finite field cryptography

FMEA

Failure mode and effect analysis

FMR

False match rate

FRR

False rejection rate

FSM

Finite-state-machine

FTP

File transfer protocol

G

G2B

Government-to-business electronic commerce model

G2C

Government-to-citizens electronic commerce model

G2E

Government-to-employees electronic commerce model

G2G

Government-to-government electronic commerce model

GCM

Galois counter mode

GKEK

Group key encryption key

GMAC

Galois message authentication code

GPS

Global positioning system

GSM

Global system for mobile communications

GSSP

Generally accepted system security principles

GTC

Generic token card

GUI

Graphical user interface

H

HA

High availability

HAZMAT

Hazardous materials

HDL

Hardware description language

HDLC

High-level data-link control

HDSL

High data rate DSL

HERF

Hazards of electromagnetic radiation to fuel

HERO

Hazards of electromagnetic radiation to ordnance

HERP

Hazards of electromagnetic radiation to people

HERM

Hazards of electromagnetic radiation to materials

HIP

Host identity protocol

HMAC

Hash-based (keyed-hash) message authentication code

HSSI

High-speed serial interface

HTML

Hypertext markup language

HTTP

Hypertext transfer protocol

HTTPS

Hypertext transfer protocol over SSL

HVAC

Heating, ventilation, and air conditioning

I

IA

Identification and authentication/Information assurance

I/O

Input/output

IAB

Internet architecture board

IAM

Information Assurance Manager/Infosec Assessment Methodology

IAO

Information assurance officer

IATF

Information assurance technical framework

IBAC

Identity-based access control

IBC

Iterated block cipher

IBE

Identity-based encryption

IBGP

Internal border gateway protocol

IC

Integrated circuit

ICMP

Internet control message protocol

ICP

Internet cache protocol

ICSA

International computer security association

ICV

Integrity check value

ID

Identification

IDE

Integrated drive electronics

IDEA

International data encryption algorithm

IDMS

Identity management system

IDPS

Intrusion detection and prevention system

IDS

Intrusion detection system

IE

Internet Explorer

IEC

International electro-technical commission

IEEE

Institute of electrical and electronics engineers

IETF

Internet engineering task force

IGMP

Internet group management protocol

IGRP

Interior gateway routing protocol

IGP

Interior Gateway Protocol

IKE

Internet key exchange

IM

Instant messaging

IMAP

Internet Message Access Protocol

IMM

Information management model

IOCE

International organization on computer evidence

IP

Internet Protocol

IPA

Initial privacy assessment

IPComp

Internet Protocol payload compression protocol

IPS

Intrusion prevention system

IPsec

Internet Protocol security

IPX

Internetwork packet exchange

IRC

Internet relay chat

IRTF

Internet research task force

IS

Information system

ISA

Industry-standard architecture

ISAKMP

Internet security association and key management protocol

ISATAP

Intra-site automatic tunnel addressing protocol

ISC2

International information systems security certification and consortium institute

ISDL

ISDN-based DSL

ISDN

Integrated services digital network

ISF

Information security forum

ISID

Industrial security incident database

ISLAN

Integrated services LAN

ISMAN

Integrated services MAN

ISO

International organization for standardization

ISP

Internet service provider

ISSA

Information Systems Security Association

ISSO

Information systems security officer

IT

Information technology

ITL

Information technology laboratory

ITSEC

Information Technology Security Evaluation Criteria

ITU

International Telecommunication Union

IV

Initialization vector

J

JAD

Joint application design

JBOD

Just a bunch of disks

JCP

Java community process

JIT

Just-in-time

JPEG

Joint photographic experts group

JRE

Java runtime environment

JSM

Java security manager

JSP

Java server page

JVM

Java virtual machine

K

KDC

Key distribution center

KEK

Key encryption key

KG

Key generator

KGD

Key generation and distribution

KMF