Appendix A List of Acronyms¶
AD |
Active Directory |
AES |
Advanced Encryption Standard |
AE Title |
Application Entity Title |
CA |
Certificate Authority |
CIDR |
Classless Inter-Domain Routing |
CPU |
Central Processing Unit |
CSR |
Certificate Signing Request |
DB |
Database |
DC |
Domain Controller |
DCS:SA |
Data Center Security: Server Advanced |
DHCP |
Dynamic Host Configuration Protocol |
DICOM |
Digital Imaging and Communications in Medicine |
DNS |
Domain Name System |
EDR |
Endpoint Detection and Response |
FMC |
Firepower Management Center |
FTD |
Firepower Threat Defense |
GB |
gigabyte |
GUI |
Graphical User Interface |
HD |
Hard Drive |
HDO |
Healthcare Delivery Organization |
HIP |
Host Identity Protocol |
HL7 |
Health Level 7 |
http |
Hypertext Transfer Protocol |
https |
Hyper Text Transfer Protocol Secure |
IDN |
Identity Defined Networking |
IIS |
Internet Information Services |
IoT |
Internet of Things |
IP |
Internet Protocol |
IPv4 |
Internet Protocol Version 4 |
ISO |
International Organization for Standardization |
IT |
Information Technology |
LDAP |
Lightweight Directory Access Protocol |
MB |
Megabyte |
MPPS |
Modality Performed Procedure Step |
NAT |
Network Address Translation |
NCCoE |
National Cybersecurity Center of Excellence |
NIST |
National Institute of Standards and Technology |
NTP |
Network Time Protocol |
OS |
Operating System |
OVA |
Open Virtual Appliance or Application |
OVF |
Open Virtualization Format |
PACS |
Picture Archiving and Communication System |
PKCS |
Public Key Cryptography Standards |
PKI |
Public Key Infrastructure |
QR Code |
Quick Response Code |
RAM |
Random Access Memory |
RIS |
Radiology Information System |
SCP |
Service Class Provider |
SEP |
Symantec Endpoint Protection |
SEPM |
Symantec Endpoint Protection Manager |
SMS |
Short Message Service |
SP |
Special Publication |
SQL |
Structured Query Language |
SSL/TLS |
Secure Sockets Layer/Transport Layer Security |
TCP/IP |
Transmission Control Protocol/Internet Protocol |
UDM |
Universal Data Manager |
UDP |
User Datagram Protocol |
URL |
Uniform Resource Locator |
VIP |
Validation and ID Protection |
VLAN |
Virtual Local Area Network |
VM |
Virtual Machine |
VNA |
Vendor Neutral Archive |
WAN |
Wide Area Network |
WLM |
Workload Management |
Appendix B References¶
- C1
Docker. Install Docker Desktop on Windows. Available: https://docs.docker.com/docker-for-windows/install/.
- C2
Microsoft Docs. Install SQL Server from the Installation Wizard (Setup). Available: https://docs.microsoft.com/en-us/sql/database-engine/install-windows/install-sql-server-from-the-installation-wizard-setup?view=sql-server-2017.
- C3
K. McKay and D. Cooper, Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations, National Institute of Standards and Technology (NIST) Special Publication (SP) 800-52 Revision 2, NIST, Gaithersburg, Md., Aug. 2019. Available: https://doi.org/10.6028/NIST.SP.800-52r2.
- C4
DVTk. DVTk open source project main contributors ICT Group and Philips. Available: https://www.dvtk.org/.
- C5
Microsoft TechNet. Building Your First Domain Controller on 2012 R2. Available: https://social.technet.microsoft.com/wiki/contents/articles/22622.building-your-first-domain-controller-on-2012-r2.aspx.
- C6
Microsoft TechNet. Installing and Configuring DHCP role on Windows Server 2012. Available: https://blogs.technet.microsoft.com/teamdhcp/2012/08/31/installing-and-configuring-dhcp-role-on-windows-server-2012/.
- C7
DigiCert. CSR Creation Instructions for Microsoft Servers. Available: https://www.digicert.com/util/csr-creation-microsoft-servers-using-digicert-utility.htm.
- C8
Cisco. Cisco Firepower Management Center Virtual for VMware Deployment Quick Start Guide. Available: https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/vmware/fmcv/FMCv-quick.html.
- C9
Cisco. Cisco Firepower Threat Defense Virtual for VMware Getting Started Guide. Available: https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/vmware/ftdv/ftdv-vmware-gsg.html.
- C10
Cisco Systems, Inc. Basic Policy Creation for Firepower. Jan. 30, 2019. Available: https://www.cisco.com/c/dam/en/us/td/docs/security/firepower/Self-Help/Basic_Policy_Creation_on_Cisco_Firepower_Devices.pdf.
- C11
Cisco Systems, Inc. Cisco Stealthwatch: Installation and Configuration Guide 7.0. 2019. Available: https://www.cisco.com/c/dam/en/us/td/docs/security/stealthwatch/system_installation_configuration/SW_7_0_0_Installation_and_Configuration_Guide_DV_3_1.pdf.
- C12
G. O’Brien et al., Securing Wireless Infusion Pumps in Healthcare Delivery Organizations, NIST SP 1800-8, NIST, Gaithersburg, Md., Aug. 2018. Available: https://www.nccoe.nist.gov/sites/default/files/library/sp1800/hit-wip-nist-sp1800-8.pdf.
- C13
Microsoft. Storage Account Overview. Available: https://docs.microsoft.com/en-us/azure/storage/common/storage-account-overview?toc=/azure/storage/blobs/toc.json.
- C14
TDi Technologies, External Authentication libraries, ConsoleWorks Cybersecurity Operations Platform. Available: https://support.tditechnologies.com/content/external-authentication-libraries.