= Kompiuterių tinklų saugumo pagrindų namų darbų sąrašas = Užsirašyti prieš pristatant namų dabą - būtina! ||'''Nr.''' ||'''1 terminas''' ||'''2 terminas''' ||'''3 terminas''' ||'''Vardas Pavardė''' || ||1 ||CIO ||CISO ||CSO ||Loreta Balandytė || ||2 ||CTO ||CEO ||ISSO ||Karolis Balsys || ||3 ||AAA (authentication, authorization and accounting) ||AAD (additional authenticated data) ||ABAC (attribute base daccess control) || Arūnas Bekintis || ||4 ||ADS (alternate data stream) ||GINA (graphic identification and authentication) ||LM (lan manager) ||Deividas Brasas || ||5 ||AK (authorization key) ||AKID (authorization key identifier) ||AKM (authentication and key management) || || ||6 ||BCP (business continuity plan) ||BRP (busines recovery plan) ||DRP (disaster recovery plan) ||Gžegož Chatkevič || ||7 ||CA (certificate authority) ||FPKIA (federal public key infrastructure architecture) ||FPKIPA (federal public key infrastructure policy authority) ||Donatas Čepelis || ||8 ||FDE (full disk encryption) ||FEK (file encryption key) ||GMK (group master key) ||Tomas Čižauskas|| ||9 ||GPO (group policy object) ||DEP (data execution prevention) ||DRA (data recovery agent) ||Vladimiras Diudenko || ||10 ||DRM (digital rights management) ||EDI (electronic data interchange) ||JRE (java runtime environment) ||Saulius Dreinius || ||11 ||LUA (limited user account) ||Administrator (admin) ||root ||Rolandas Galdikas || ||12 ||MBR ||CPU ring ||HKLM || Povilas Jasaitis || ||13 ||I3P ||ISACA ||ISC2 ||Marius Jasiulionis || ||14 ||ICF (internet conection firewall) ||ICS (internet conection sharing) ||IE ||Edvinas Jodokas || ||15 ||NTLM ||NTFS ||Bitlocker ||Marijan Jurgo || ||16 ||CRAMM ||OSSTMM ||ISO27002 ||Gediminas Krištopaitis || ||17 ||ISO27001 ||ISO27004 ||ISO27005 ||Dovilė Kurpytė || ||18 ||OVAL (open vulnerability and assesment language) ||Vulnerability ||Exploit ||Rimas Mickevičius || ||19 ||PAP ||PEAP ||MS-CHAP || || ||20 ||PCI (payment card industry) ||SOX ||HIPAA ||Mindaugas Mikėnas || ||21 ||MSK (master session key) ||SK (session key) ||EAP-SIM ||Mindaugas Miškinis || ||22 ||NAC (network access control) ||PNAC (network access control) ||NAP (network access control) ||Titas Savickas || ||23 ||RTO ||RPO ||SLA ||Karolis Stankus || ||24 ||KPI ||KGI ||MTTF || Daugirdas Stirbys || ||25 ||SAM ||WSUS ||TPM (trusted platform module) ||Povilas Straksas || ||26 ||SCADA ||SEM (security event management) ||SIEM (security information and event management) ||Dmitrij Šiškin || ||27 ||SSH ||SFTP ||SCP ||Vaiva Šlegerytė || ||28 ||RSN (robust security network) ||RSNA (robust security network) ||RSNIE (robust security network information element) ||Aleksejus Venzlauskas || ||29 ||XOR ||MOD ||Chinese reminder theorem || || ||30 ||SSL sertifikatų tipai ||Heshavimo protokolas ||SSL ir TLS palyginimas ||Pavelas Zolotariovas || ||31 || || || || || ||32 || || || || ||