12.07.2015 Views

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

310 GLOSSARYNIST National Institute of Standards and TechnologyNPD the (German) neo-NAZI Political PartyNSA National Security AgencyOOB order of battleOHHDL Office of His Holiness the Dalai LamaOOP object-oriented programmingOPSEC operational securityOPT Occupied Palestinian Terri<strong>to</strong>riesOSINT open source intelligencePPDF Portable Document Format, a file format used by Adobe Acrobatphishing social engineering attacks in which mass e-mails are sent out <strong>to</strong> a population in order <strong>to</strong> entice them <strong>to</strong> openan attachment or click on a link that causes a piece of malware <strong>to</strong> infect their system, often resulting in their computersfalling under control of an adversary, often using a botnet.PIR priority information requirementsPLA People’s Liberation Army (of China)PLC programmable logic controllerPLF People’s Liberation FrontPMOI People’s Mujahedeen of IranPoP Point of PresencePPT the older file format for Microsoft PowerPoint that is susceptible <strong>to</strong> compromisePRC People’s Republic of ChinaPSYOP psychological operationsRR&S reconnaissance and surveillanceRAM Random Access Memory (the temporary memory of a computer system)RAT Remote Access ToolRBN Russian Business NetworkRDP Remote Desk<strong>to</strong>p Pro<strong>to</strong>colRIM Research In Motion, makers of the BlackBerry mobile deviceRMA Revolution in Military AffairsRTU remote terminal unitRUNET the Russian InternetSSACEUR Supreme Allied Commander of European Forces (the military commander of NATO)SAR synthetic aperture radarSATCOM satellite communicationSBU Sensitive But UnclassifiedSCADA supervisory control and data acquisitionSCM Software Configuration Management systemscript kiddies amateur hackers who merely follow instructions for a given hack or exploit—rather than using technology<strong>to</strong> fully understand or create their own exploits

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!