Skip to main content

Currently Skimming:


Pages 73-75

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 73...
... 73 Glossary Actor -- An individual or group that can manifest a threat. Attribution -- Information on an actor, primarily to specify their identity, location, motives, and level of sophistication.
From page 74...
... 74 Guidebook on Best Practices for Airport Cybersecurity Vulnerability -- A weakness that exposes data and/or systems to threat. Vulnerability is introduced by the lack of countermeasures to adequately protect an asset (Committee on National Security Systems 2010)
From page 75...
... Glossary, Abbreviations, Acronyms, and Symbols 75 ICS Industrial Control Systems IDS Intrusion Detection Systems IEC International Electrotechnical Commission IPS Intrusion Prevention Systems ISAC Information Sharing and Analysis Center ISO International Organization for Standardization IT Information Technology KSAs Knowledge, Skills, and Abilities LAN Local Area Network MDM Mobile Device Management MS-ISAC Multi-State Information Sharing and Analysis Center NACS Network Access Control System NCIC National Crime Information Center NERC North American Electric Reliability Corporation NICE National Initiative for Cybersecurity Education NIST National Institute of Standards and Technology NSA National Security Agency OMB Office of Management and Budget PAC Programmable Automation Controller PARCS Parking Access and Revenue Control Systems PCI Payment Card Industry PCI DSS Payment Card Industry Data Security Standards PII Personally Identifiable Information PLC Programmable Logic Controller POS Point of Sale PSK Pre-shared Key SCADA Supervisory Control and Data Acquisition SDLC Software Development Life Cycle SIEM Security Information and Event Management SLA Service Level Agreement SMS Short Message Service SQL Structured Query Language SSI Sensitive Security Information SSL Secure Sockets Layer TRB Transportation Research Board URL Uniform Resource Locator USB Universal Serial Bus VPN Virtual Private Network WAN Wide Area Network WEP Wired Equivalent Privacy WIPS Wireless Intrusion Prevention System WPA-2 Wi-Fi Protected Access Symbols The following symbols have been used in this document: Threat Countermeasure Resource Target Multimedia

Key Terms



This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.