12.07.2015 Views

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

IIAEA International A<strong>to</strong>mic Energy AgencyICA Iranian <strong>Cyber</strong> ArmyICCP Inter Control Center Pro<strong>to</strong>colICT industrial control systemsIDF Israeli Defense ForcesIDS intrusion detection systemIEEE Institute of Electrical and Electronics EngineersINEW Integrated Network Electronic <strong>Warfare</strong>IO information operationsIP Internet Pro<strong>to</strong>colIP intellectual propertyIR information requirements, pieces of information collected by intelligence professionals that are thought <strong>to</strong> havea significant impact on the success or failure of a military operation.IRC Internet Relay ChatIRGC Iranian Revolutionary Guard CorpsIRL In Real LifeISP Internet service providerISR intelligence, surveillance, and reconnaissanceIT information technologyIW information warfareJJAM Jaysh Al-MahdiKkey logger malware designed <strong>to</strong> record all the keystrokes of the victim and report them <strong>to</strong> a third partyKH Kata’ib HezbollahLLIC Low Intensity ConflictLOIC Low Orbit Ion CannonLTG Lieutenant GeneralMmalware malicious softwareMBR master boot recordMCO major combat operationsMeK Mujahedeen-e-KhalqMITM Man-In-the-MiddleMTI moving target indica<strong>to</strong>rMTS multispectral targeting systemNNATO North Atlantic Treaty OrganizationNGO nongovernmental organizationGLOSSARY309

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!