Glossary of Acronyms
There are 10 kinds of people in the world -
Those who understand binary, and those who don't.
Acronym | Term |
(ISC)² | International Information Systems Security Certification Consortium |
1xRTT | One Times Radio Transmission Technology |
2FA/TFA | Two Factor Authentication |
3DES | Triple Data Encryption Algorithm |
3DES | Triple Data Encryption Standard |
3FA | Three Factor Authentication |
3G | 3rd Generation |
3GPP | 3rd Generation Partnership Project |
3GPP2 | 3rd Generation Partnership Project 2 |
3PAO | Third Party Assessor Organization |
4D QL | 4D Query Language |
4FA, | Four Factor Authentication |
A | Address Resource Record Type |
A&A | Assessment & Authorization |
AA | Abac Attribute Authority |
AAA | Access Approval Authority |
AAA | Army Audit Agency |
AAA | Authentication Authorization Accounting |
AAAK | Authentication |
AAC | Application Authentication Cryptogram |
AAD | Additional Authenticated Data |
AAL | Authentication Assurance Level |
AAR | After Action Report |
AAS | Adaptive Antenna System |
ABAC | Attribute Based Access Control |
ABB | Architecture Building Blocks |
ABCS | Army Battle Command System |
AC | Application Cryptogram |
ACA | Access Control Authority |
ACA | Affordable Care Act |
ACCM | Asset Configuration Compliance Module |
ACE | Access Control Entry |
ACES | Automated Continuing Evaluation System |
ACID | Atomicity Consistency Isolation Durability |
ACK | Acknowledgement |
ACL | Access Control List |
ACM | Association For Computing Machinery |
ACO | Accountable Care Organizations |
ACO | Authenticated Cipher offset |
ACSI | Assistant Chief of Staff For Intelligence (Army) |
AD | Active Directory |
AD | Authenticated Data |
ADB | Android Debug Bridge |
ADC | Analog To Digital Converter |
ADF | Automatic Document Feeder |
ADFS | Active Directory Federation Services |
ADH | Anonymous Diffie Hellman |
ADOT | Academic Directors of Technology |
ADP | Automated Data Processing |
ADPSO | Automated Data Processing Security Officer |
ADPSSO | Automated Data Processing System Security Officer |
ADR | Adjudicative Desk Reference |
ADS | Alternate Data Stream |
ADS | Automated Data System |
ADT | Android Development Tools |
ADT | Admissions Discharge & Transfer |
AES | Advanced Encryption Standard |
AES-256 | Advanced Encryption Standard 256 |
AES-512 | Advanced Encryption Standard 512 |
AES-CBC | Advanced Encryption Standard Cipher Block Chaining |
AES-CTR | Advanced Encryption Standard Counter Mode |
AF | Air Force |
AFAIK | As Far As I Know |
AFB | Air Force Base |
AFC4A | Air Force C4 Agency |
AFCAF | Air Force Central Adjudication Facility |
AFH | Adaptive Frequency Hopping |
AFI | Air Force Instruction |
AFIWC | Air Force Information Warfare Center |
AFMAN | Air Force Manual |
AFOSF | Air Force Office of Security Forces |
AFOSI | Air Force Office of Special Investigation |
AFOSP | Air Force Office of Security Police |
AFP | Apple Filing Protocol |
AFPC | Air Force Personnel Center |
AFPD | Air Force Policy Directive |
AFR | Air Force Regulation |
AFSCO | Air Force Security Clearance Office |
AG | Attorney General |
AG/SCM | Advisory Group/Security Countermeasures |
A-GPS | Assisted Global Positioning System |
AGS | Architectural Graphic Standards |
AH | Authentication Header |
AI | Artificial Intelligence |
AIA | Air Intelligence Agency |
AIA | Army Intelligence Agency |
AICPA | American Institute of Certified Public Accountants |
AID | Application Identifier |
AIDC | Automatic Identification & Data Capture |
AIM | Association For Automatic Identification & Mobility |
AIMS | Automated Infrastructure Management System |
AIP | Application Interchange Profile |
AIS | Artificial Intelligence System |
AIS | Automated Information Systems |
AISS | Automated Information Systems Security |
AISSP | Automated Information Systems Security Plan |
AIT | Automatic Identification Technology |
AIX | Advanced Interactive Executive |
AJAX | Asynchronous JavaScript & XML |
AK | Authorization Key |
AKID | Authorization Key Identifier |
AKM | Authentication & Key Management |
ALE | Annualized Loss Expectancy |
ALG | Application Layer Gateway |
ALU | Arithmetic Logic Unit |
AMA | Ask Me Anything |
AMI | Amazon Machine Image |
AMIDS | Audit Monitoring & Intrusion Detection System |
AMPS | Advanced Mobile Phone System |
ANACI | Access National Agency Check With Written Inquiries |
ANF | Application Normative Framework |
ANN | Artificial Neural Network |
ANSI | American National Standards Institute |
AO | Area of Operations |
AO | Authorizing official |
AOA | Analysis of Alternatives |
AOA | Area of Application |
AODR | Authorizing official Designated Representative |
AP | Access Point |
APC | Ambulatory Payment Classification |
APEC | Asia Pacific Economic Cooperation |
API | Application Programming Interface |
APK | Android Package Kit |
APM | Actions Per Minute |
APN | Access Point Names |
APT | Advanced Persistent Threat |
APU | Accelerated Processing Unit |
APWG | Anti Phishing Working Group |
AQ-SAP | Acquisition Special Access Program |
ARC | Authorization Response Code |
ARIN | American Registry For Internet Numbers |
ARN | Amazon Resource Name |
ARO | Annualized Rate of Occurrence |
ARP | Address Resolution Protocol |
ARPA | Advanced Research Projects Agency |
ARPC | Authorization Response Cryptogram |
ARQC | Authorization Request Cryptogram |
ARRA | American Recovery & Reinvestment Act |
AS | Authentication Server |
AS | Autonomous System |
ASAP | As Soon As Possible |
ASC | Anti Spyware Coalition |
ASC | X9 Accredited Standards Committee X9 |
ASCII | American Standard Code For Information Interchange |
ASCLD-LAB | The American Society of Crime Laboratory Directors Laboratory Accreditation Board |
ASD (C31) | Assistant Secretary of Defense For Command Control Communication & Intelligence |
ASDR | Application Security Desk Reference |
ASG | Abstract Semantic Graph |
ASG | Auto Scaling Group |
ASIMS | Automated Security Incident Measuring System |
ASLR | Address Space Layout Randomization |
ASN | Autonomous System Number |
ASN.1 | Abstract Syntax Notation 1 |
ASP | Active Server Pages |
ASP | Application Service Provider |
ASSIST | Automated System Security Incident Support Team |
AST | Abstract Syntax Tree |
ASV | Approved Scanning Vendor |
ASVS | Application Security Verification Standards |
ATA | Advanced Technology Attachment |
ATC | Anatomical Therapeutic Chemical Classification System |
ATC | Application Transaction Counter |
ATC | Authorization To Connect |
ATD | Authorization Termination Date |
ATIM | Announcement Traffic Indication Message |
ATM | Asynchronous Transfer Mode |
ATM | Automatic Teller Machine |
ATO | Authorization To Operate |
ATX | Advanced Technology Extended |
AU | Activation Unit |
AUP | Acceptable Use Policy |
AUP | Agreed Upon Procedures |
AV | Antivirus |
AVIEN | Anti Virus Information Exchange Network |
AVP | Attribute Value Pair |
AVX | Advanced Vector Extensions |
AWS | Amazon Web Services |
AZ | Availability Zone |
b | Bit |
B | Byte |
B2B | Business To Business |
B2C | Business To Consumer |
BA | Business Associate |
BAA | Business Associate Agreement |
BAPI | Biometric Application Programming Interface |
BASE | Basically Available Soft State Eventually Consistent |
Bash | Bourne Again Shell |
BBS | Bulletin Board System |
BC | Business Continuity |
BCM | Business Continuity Management |
BCP | Best Current Practice |
BCP | Business Continuity Plan |
BCWP | Budgeted Cost of Work Performed |
BCWS | Budgeted Cost of Work Scheduled |
BDM | Banner Document Management |
BGAN | Broadband Global Area Network |
BGP | Border Gateway Protocol |
BGP-4 | Border Gateway Protocol 4 |
BI | Business Intelligence |
BIA | Bump In The Api |
BIA | Business Impact Analysis |
BINAS | Biosafety Information Network Advisory System |
BioAPI | Biometric Application Programming Interface |
BIOS | Basic Input Output System |
BIPN | Background Investigation Plus Current National Agency Check |
BIS | Bureau of Industry & Security |
BISS | Base & Installation Security System |
BITS | Background Intelligent Transfer Service |
BITS | Bump In The Stack |
Blob | Binary Large Object |
BMA | Business Mission Area |
BMS | Balanced Magnetic Switch |
BPEL | Business Process Execution Language |
BPML | Business Process Modeling Language |
BPO | Business Process Outsourcing |
BPSS | Business Process Specification Schema |
BREW | Binary Runtime Environment For Wireless |
BRM | Business Reference Model |
BRP | Business Recovery (Resumption) Plan |
BS | Base Station |
BS | British Standard |
BSC | Base Station Controller |
BSC | Binary Synchronous Communications |
BSI | British Standards Institution |
BSIA | British Security Industry Association |
BSIMM | Building Security In Maturity Model |
BSoD | Blue Screen of Death |
BSP | Best Security Practice |
BSS | Basic Service Set |
BSSID | Basic Service Set Identifier |
BT | Bluetooth |
BTL | Block Transformation Layer |
BTNS | Better Than Nothing Security |
BTS | Base Transceiver Station |
BU | Binding Update |
BUA | Binding Update Acknowledgement |
BYOA | Bring Your Own Apps |
BYOC | Bring Your Own Cloud |
BYOD | Bring Your Own Device |
BYOE | Bring Your Own Encryption |
BYOI | Bring Your Own Identity |
BYON | Bring Your Own Network |
C&A | Certification & Accreditation |
C&A WG | Certification & Accreditation Working Group |
C2 | Command & Control |
C2W | Command & Control Warfare |
C4 | Command Control Communications & Computers |
C4ISR | Command Control Communications Computer Intelligence Surveillance & Reconnaissance |
CA | Certificate Authority |
CA | Certification Agent |
CAAP | Critical Asset Assurance Program |
CaaS | Compliance As A Service |
CaaS | Content As A Service |
CAB | Change Advisory Board |
CAC | Common Access Card |
CADE | Corporate Average Data Center Efficiency |
CAIDA | Cooperative Association For Internet Data Analysis |
CAK | Card Authentication Key |
CAL | Category Assurance List |
CAM | Card Authentication Method |
CAN | Computer Network Attack |
CAN-SPAM | Controlling The Assault of Non Solicited Pornography & Marketing Act |
CAO | Contract Administration Office |
CAP | Connection Approval Program |
CAP | Controlled Access Program |
CAP | Corrective Action Plan |
CAPCO | Controlled Access Program Coordination Office |
CAPEC | Common Attack Pattern Enumeration & Classification |
CAPEX | Capital Expenditure |
CAPK | Certificate Authority Public Key |
CAPTCHA | Completely Automated Public Turing Test To Tell Computers & Humans Apart |
CARO | Computer Antivirus Research Organization |
CARVER | Criticality Accessibility Recuperability Vulnerability Effect & Recognizability |
CAS | Casualty Actuarial Society |
CAS | Central Authentication System |
CASB | Cloud Access Security Broker |
CAV | Card Authentication Value |
CAVP | Cryptographic Algorithm Validation Program |
CAVS | Connected & Automated Vehicles |
CBA | Cost Benefit Analysis |
CBAC | Context Based Access Control |
CBC | Cipher Block Chaining |
CBC-MAC | Cipher Block Chaining Message Authentication Code |
CBEFF | Common Biometric Exchange File Format |
CBI | Confidential Business Information |
CBIPM | Confidential Business Information Protective Measure |
CBSP | Cloud Based Security Providers |
CC | Common Criteria |
CCA | Clinger Cohen Act |
CCA | Cloud Computing Agreements |
CCB | Change Control Board |
CCB | Configuration Control Board |
CCE | Common Configuration Enumeration |
CCEVS | Common Criteria Evaluation & Validation Scheme |
CCI | Control Correlation Identifier |
CCIPS | Computer Crime & Intellectual Property Section |
CCK | Complementary Code Keying |
CCM | Cloud Controls Matrix |
CCM | Counter Mode With CBC MAC |
CCMP | Counter Mode With Cipher Block Chaining Message Authentication Code Protocol |
CCP | Common Control Provider |
CCRA | Cloud Computing Reference Architecture |
CCRA | Common Criteria Recognition Arrangement |
CCSS | Common Configuration Scoring System |
CCT | Correlated Color Temperature |
CCTA | Central Computer & Telecommunications Agency |
CCTL | Common Criteria Testing Laboratory |
ccTLD | Country Code Top Level Domain |
CCTV | Closed Circuit Television |
CD | Checking Disabled |
CD | Compact Disc |
CD | Cross Domain |
CDA | Combined Dynamic Data Authentication |
CDC | Centers For Disease Control |
CDE | Cardholder Data Environment |
CDFS | Compact Disc File System |
CDMA | Code Division Multiple Access |
CDMI | Cloud Data Management Interface |
CDN | Content Delivery Network |
CDN | Content Distribution Network |
CDO | Chief Data Officer |
CDR | Call Detail Records |
CDR | Critical Design Review |
CD-R | Compact Disc Recordable |
CD-ROM | Compact Disc Read Only Memory |
CD-RW | Compact Disc Rewritable |
CDS | Cross Domain Solution |
CDSE | Center For Development of Security Excellence |
CDSSO | Cross Domain Single Sign On |
CE | Compromising Emanations |
CE | Covered Entity |
CEM | Common Evaluation Methodology |
CEO | Chief Executive Officer |
CER | Canonical Encoding Rules |
CER | Crossover Error Rate |
CERIAS | Center For Education & Research In Information Assurance & Security |
CERT | Computer Emergency Response Team |
CERT/CC | Cert/Coordination Center |
CF | Compact Flash |
CFAA | Computer Fraud & Abuse Act |
CFB | Cipher Feedback |
CFI | Computer & Financial Investigations |
CFO | Chief Financial Officer |
CFR | Code Federal Regulations |
CFR | Code of Federal Regulations |
CFTT | Computer Forensics Tool Testing |
CGA | Cryptographically Generated Addresses |
CGI | Common Gateway Interface |
CHAP | Challenge Handshake Authentication Protocol |
CHUID | Cardholder Unique Identifier |
CI | Counterintelligence |
CI | Critical Information |
CI/CD | Continuous Integration/Continuous Deployment |
CIA | Central Intelligence Agency |
CIAC | Computer Incident Advisory Capability |
CIAO | Critical Infrastructure Assurance Office |
CIAR | Counterintelligence Awareness & Reporting |
CID | Card Id |
CID | Cryptogram Information Data |
CIDR | Classless Inter Domain Routing |
CIFA | Counterintelligence Field Activity |
CIFS | Common Internet File System |
CIHI | Canadian Institute For Health Information |
CIIA | Critical Infrastructure Information Act |
CIK | Crypto Ignition Key |
CIO | Chief Information Officer |
CIP | Critical Infrastructure Protection |
CIPA | Classified Information Procedures Act |
CIPC | Critical Infrastructure Protection Committee |
CIPSEA | Confidential Information Protection & Statistical Efficiency Act |
CIPWG | Critical Infrastructure Protection Working Group |
CIR | Committed Information Rate |
CIRC | Computer Incident Response Capability |
CIRC | Computer Incident Response Center |
CIRDB | Cerias Incident Response Database |
CIRT | Computer Incident Response Team |
CIS | Center For Internet Security |
CIS | Cryptologic Information System |
CISA | C4I Integration Support Activity |
CISA | Certified Information Systems Auditor |
CISARA | Counterintelligence Security Countermeasures & Related Activities |
CISC | Complex Instruction Set Computing |
CISM | Certified Information Systems Security Manager |
CISO | Chief Information Security Officer |
CISO | Counterintelligence Support Officer |
CISP | Counterintelligence Support Plan |
CISSM | Component Information System Security Manager |
CISSP | Certified Information Systems Security Professional |
CITAC | Computer Investigation & Infrastructure Threat Assessment Center |
CITS | Cooperative Intelligent Transportation System |
CJCS | Chairman of The Joint Chiefs of Staff |
CJCSI | Chairman Joints Chiefs of Staff Instruction |
CKTS | Computerized Key Telephone System |
CLAS | Classified By |
CLASP | Comprehensive Lightweight Application Security Process |
CLF | Common Log Format |
CLI | Command Line Interface |
CLOB | Character Large Object |
CLOUD | Clarifying Lawful Overseas Use of Data |
CLR | Common Language Runtime |
cm | Centimeter |
CM | Classification Management |
CM | Configuration Management |
CM | Content Management |
CM | Countermeasure |
CMA | Certificate Management Authority |
CMAC | Cipher Based Method Authentication Code |
CMB | Change Management Board |
CMB | Configuration Management Board |
CMDB | Configuration Management Database |
CMDS | Computer Misuse Detection System |
CME | Common Malware Enumeration |
CMI | Classified Military Information |
CMIWG | Classification Markings & Implementation Working Group |
CMM | Capability Maturity Model |
CMMI | Capability Maturity Model Integration |
CMOS | Complementary Metal Oxide Semiconductor |
CMP | Configuration Management Plan |
CMPL | Civil Monetary Penalties Law |
CMS | Centers For Medicare & Medicaid Services |
CMS | Comsec Management System |
CMS | Configuration Management System |
CMS | Content Management System |
CMS | Cryptographic Message Syntax |
CMSS | Common Misuse Scoring System |
CMVP | Cryptographic Module Validation Program |
CN | Common Name |
CN | Correspondent Node |
CNA | Computer Network Attack |
CNAME | Canonical Name |
CNAP | Cybersecurity National Action Plan |
CNCI | Comprehensive National Cybersecurity Initiative |
CND | Computer Network Defense |
CNDSP | Computer Network Defense Service Provider |
CNE | Computer Network Exploitation |
CNN | Convolutional Neural Network |
CNSI | Classified National Security Information |
CNSS | Committee On National Security Systems |
CNSSD | Committee On National Security Systems Directives |
CNSSI | Committee On National Security Systems Instruction |
CNSSP | Committee On National Security Systems Policy |
CO | Cyberspace Operations |
CoA | Care of Address |
COBIT | Control Objectives For Information & Related Technologies |
codec | Coder/Decoder |
COE | Common Operating Environment |
COI | Conflict of Interest |
COM | Component Object Model |
COMINT | Communications Intelligence |
CompaaS | Compute As A Service |
COMSEC | Communications Security |
CONOPS | Concept of Operations |
COO | Chief Operating Officer |
COOP | Continuity of Operations |
COOP | Continuity of Operations Plan |
COPPA | Children’S Online Privacy Protection Act |
CORBA | Common Object Request Broker Architecture |
CORS | Cross Origin Resource Sharing |
COSO | Commission of Sponsoring Organizations of The Treadway Commission |
COTM | Communications On The Move |
COTS | Commercial off The Shelf |
CP | Certificate Policy |
CP | Contingency Plan |
CPA | Certified Public Accountant |
CPA | Cost Per Action |
CPC | Cost Per Click |
CPE | Common Platform Enumeration |
CPI | Compression Parameter Index |
CPL | Cost Per Lead |
CPM | Cost Per Thousand Impressions |
CPM | Critical Path Method |
CPNI | Center For The Protection of National Infrastructure |
CPO | Chief Privacy Officer |
CPS | Certificate Practice Statement |
CPS | Cyber Physical System |
CPSO | Command Program Security Officer |
CPSO | Contractor Program Security Officer |
CPT | Current Procedural Terminology |
CPTED | Crime Prevention Through Environmental Design |
CPU | Central Processing Unit |
CPWG | Crime Prevention Working Group |
CR | Conversion Rate |
CRAM | Challenge Response Authentication Mechanism |
CRAMM | Ccta Risk Analysis & Management Method |
CRC | Cyclic Redundancy Check |
CRC–32 | Cyclic Redundancy Check–32 |
CRG | Compliance Review Group |
CRL | Certificate Revocation List |
CRM | Customer Relationship Management |
CRO | Chief Risk Officer |
CRO | Conversion Rate Optimization |
CRT | Cathode Ray Tube |
CRYPTO | Cryptography |
CS | Client/Server |
CS | Comment Spamming |
CSA | Child Support Agency |
CSA | Cloud Security Alliance |
CSA | Cloud Services Agreement |
CSA | Cognizant Security Agency |
CSA | Cognizant Security Authority |
CSA | Computer Security Act |
CSC | Card Security Code |
CSCS | Contract Security Classification Specification |
CSE | Center For Security Evaluation |
CSEA | Cyber Security Enhancement Act |
CSEC | Cyber Security Education Consortium |
CSF | Common Security Framework |
CSIA | Cyber Security Industries Alliance |
CSIL | Critical & Sensitive Information List |
CSIR | Computer (& Network) Security Incident Response |
CSIRC | Computer Security Incident Response Capability |
CSIRT | Computer Security Incident Response Team |
CSISM | Communications Security (COMSEC) Supplement To The Industrial Security Manual |
CSMA / CD | Carrier Sense Multiple Access/Collision Detection |
CSO | Chief Security Officer |
CSO | Cognizant Security Office |
CSO | Computer Security Object |
CSP | Cloud Service Provider |
CSP | Content Security Policy |
CSP | Credentials Service Provider |
CSR | Certificate Signing Request |
CSRC | Computer Security Resource Center |
CSRDA | Cyber Security Research & Development Act of 2002 |
CSRF | Cross Site Request Forgery |
CSS | Cascading Style Sheet |
CSS | Central Security Service |
CSS | Constant Surveillance Service |
CSSIA | Center For Systems Security & Information Assurance |
CSSM | Communications Computer System Security Manager |
CSSO | Computer Systems Security Officers |
CST | Construction Surveillance Technician |
CSV | Comma Separated Values |
CT | Computed Tomography |
CT | Counter Terrorism |
CTA | Call To Action |
CTC | Connectionist Temporal Classification |
CTC | Counterterrorist Center |
CTCPEC | Canadian Trusted Computer Product Evaluation Criteria |
CTO | Chief Technology Officer |
CTP | Composite Theoretical Performance |
CTR | Click Through Rate |
CTR | Counter Mode Encryption |
CTS | Click Through Rate |
CTS | Computerized Telephone System |
CTS | Cosmic Top Secret |
CTSA | Cosmic Top Secret Atomal |
CTTA | Certified Transient Electromagnetic Pulse Emanation Standard (Tempest) Technical Authority |
CUDA | Compute Unified Device Architecture |
CUI | Controlled Unclassified Information |
CV | Computer Vision |
C-V2X | Cellular Vehicle To Everything |
CVC | Card Validation Code |
CVD | Card Verification Data |
CVE | Common Vulnerabilities & Exposures |
CVE | Elo Verification Code |
CVM | Card Verification Method |
CVN | Card Validation Number |
CVR | Card Verification Result |
CVSS | Common Vulnerability Scoring System |
CVV | Card Verification Value |
CW | Code Word |
CW | Cyber Warfare |
CWE | Common Weakness Enumeration |
CWSS | Common Weakness Scoring System |
CX | Customer Experience |
CYBEX | Cybersecurity Information Exchange |
CYOD | Choose Your Own Device |
D2D | Device To Device |
DA | Destination Address |
DA | Domain Authority |
DAA | Designated Approving Authority |
DaaS | Desktop As A Service |
DAC | Discretionary Access Control |
DAD | Duplicate Address Detection |
DAM | Database Activity Monitoring |
DAM | Digital Asset Management |
DAML | DARPA Agent Markup Language |
DAMP | Database Activity Monitoring & Prevention |
D-AMPS | Digital Advanced Mobile Phone Service |
DAO | Data Access Object |
DAR | Degree Audit Report |
DARPA | Defense Advanced Research Projects Agency |
DAS | Direct Attached Storage |
DASD | Deputy Assistant Secretary of Defense |
DASD (DT&E) | Deputy Assistant Secretary of Defense For Developmental Test & Evaluation |
DAST | Dynamic Application Security Testing |
DATO | Denial of Authorization To Operate |
DBA | Database Administrator |
DBaaS | Database As A Service |
dBm | Decibels Referenced To One Milliwatt |
DBMS | Database Management System |
DC | Data Center |
DC | Domain Controller |
DC3 | DOD Cyber Crime Center |
DCaaS | Data Center As A Service |
DCC | Defensive Counter Cyber |
DCE | Distributed Computing Environment |
DCFL | Defense Computer Forensics Lab |
DCHC | Defense Counterintelligence & Human Intelligence Center |
DCI | Director of Central Intelligence |
DCI SSC | Director of Central Intelligence Special Security Center |
DCID | Director of Central Intelligence Directive |
DCL | Declassify |
DCMA | Defense Contract Management Agency |
DCMO | Deputy Chief Management Office |
DCOM | Distributed Component Object Model |
DCPDS | Defense Civilian Personnel Data System |
DCS | Defense Clandestine Service |
DCS | Distributed Control System |
DCSINT | Deputy Chief of Staff For Intelligence Army |
DD | Defense Department |
DDA | Designated Disclosure Authority |
DDA | Standard Dynamic Data Authentication |
DDAL | Delegation of Disclosure Authority Letter |
DDEP | Defense Data Exchange Program |
DDL | Data Definition Language |
DDMS | Department of Defense Metadata Specification |
DDNS | Dynamic Domain Name Services |
DDOL | Dynamic Data Authentication Data |
DDoS | Distributed Denial of Service |
DDR3 | Double Data Rate Type 3 |
DEA | Data Encryption Algorithm |
DECL | Declassify |
DEK | Data Encryption Key |
DEP | Data Execution Prevention |
DES | Data Encryption Standard |
DFARS | Defense Federal Acquisition Regulation Supplement |
DFS | Distributed File System |
DFS | Dynamic Frequency Selection |
DH | Diffie Hellman |
DHAAD | Dynamic Home Agent Address Discovery |
DHCP | Dynamic Host Configuration Protocol |
DHCPv6 | Dynamic Host Configuration Protocol For Internet Protocol V6 |
DHS | U.S. Department of Homeland Security |
DIA | Defense Intelligence Agency |
DIAC | Defense Intelligence Analysis Center |
DIACAP | Department of Defense Information Assurance Certification & Accreditation Process |
DIACCS | Defense Ia Command & Control System |
DIAM | Defense Intelligence Agency Manual |
DIAMOND | Defense Intrusion Analysis & Monitoring Desk |
DIAP | Defense Information Assurance Program |
DIB | Defense Industrial Base |
DIC | Defense Intelligence Community |
DICOB | Defense Industrial Security Clearance Oversight Board |
DICOM | Digital Imaging & Communications In Medicine |
DIDO | Designated Intelligence Disclosure official |
DIDS | Distributed Intrusions Detection System |
DII | Defense Information Infrastructure |
DIMA | DOD Portion of The Intelligence Mission Area |
DIMS | Digital Identity Management Service |
DIN | Drug Identification Number |
DIRNSA | Director National Security Agency |
DIS | Defense Investigative Service |
DISA | Defense Information Systems Agency |
DISA | Direct Inward System Access |
DISA | U.S. Defense Information Systems Agency |
DISN | Defense Information Systems Network |
DISP | Department of Defense Industrial Security Program |
DITPR | DOD Information Technology Portfolio Repository |
DITSCAP | Department of Defense Information Technology Security Certification & Accreditation Process |
DITSWG | Defense Information Technology Security Working Group |
DKIM | Domain Keys Identified Mail |
DLL | Dynamic Link Library |
DLP | Data Loss Prevention |
DLT | Distributed Ledger Technology |
DM | Direct Message |
DMA | Direct Memory Access |
DMARC | Domain Based Message Authentication Reporting & Conformance |
DMC | Defense Megacenter |
DMCA | Digital Millennium Copyright Act |
DMDC | Defense Manpower Data Center |
DMF | Data Management Facility |
DML | Data Manipulation Language |
DMNS | Data Management Notification System |
DMS | Data Management System |
DMS | Database Migration Service |
DMS | Defense Message System |
DMVPN | Dynamic Multipoint VPN |
DMZ | Demilitarized Zone |
DN | Distinguished Name |
DN | Domain Name |
DNA | Deoxyribonucleic Acid |
DNI | Director of National Intelligence |
DNI | Director of Naval Intelligence |
DNP | Distributed Network Protocol |
DNS | Domain Name Server |
DNS | Domain Name System |
DNSBL | Domain Name System Blacklist |
DNSSEC | Domain Name System Security Extensions |
DOC | U.S. Department of Commerce |
DoD | U.S. Department of Defense |
DoD ISRMC | DOD Information Security Risk Management Committee |
DoDAF | Department of Defense Architecture Framework |
DoDD | Department of Defense Directive |
DoDI | DOD Instruction |
DoDIIS | Department of Defense Intelligence Information System |
DODIN | Department of Defense Information Networks |
DoDIS | Department of Defense Information System |
DoDM | DOD Manual |
DOE | U.S. Department of Energy |
DOI | Domain of Interpretation |
DOJ | U.S. Department of Justice |
DOM | Document Object Model |
DoN | Department of The Navy |
DoS | Denial of Service |
DOS | Disk Operating System |
DOT&E | Director Operational Test & Evaluation |
DPA | Data Protection Act |
DPA | Differential Power Analysis |
DPH | Department of Public Health |
DPIA | Data Protection Impact Assessment |
DPO | Data Protection Officer |
DQL | Data Query Language |
DR | Disaster Recovery |
DRA | Data Recovery Agent |
DRAM | Dynamic Random Access Memory |
DRB | Defense Resources Board |
DRDA | Distributed Relational Database Architecture |
DREAD | Disaster Reproducibility Exploitability Affected Users & Discoverability |
DREN | Defense Research & Engineering Network |
DRM | Digital Rights Management |
DRMO | Defense Reutilization Management Office |
DRP | Disaster Recovery Plan |
DRS | Distributed Resource Scheduler |
DS | Delegation Signer |
DS | Direct Support |
DS | Distribution System |
DS | Field Differentiated Services Field |
DSA | Data Sharing Agreement |
DSA | Designated Security Authority |
DSA | Digital Signature Algorithm |
DSAWG | Defense Ia Security Accreditation Working Group |
DSB | Defensive Security Brief |
DSBS | Dual Sensor Brake Support |
DSCA | Defense Security Cooperation Agency |
DSEC | Director of Security |
DSL | Digital Subscriber Line |
DSLAM | Digital Subscriber Line Access Multiplexer |
DSMC | Defense Systems Management College |
DSML | Directory Services Markup Language |
DSN | Defense Switched Network |
DSN | Delivery Status Notification |
DSOD | Dynamic Separation of Duty |
DSS | Defense Security Service |
DSS | Digital Signature Standard |
DSSCS | Defense Special Security Communication System |
DSS-PIC | DSS Personnel Investigations Center |
DSSS | Defense Special Security System |
DSTM | Dual Stack Transition Mechanism |
DT | Directory Traversal |
DT/PT | Directory / Path Traversal |
DT&E | Developmental Test & Evaluation |
DTC | Distributed Transaction Coordinator |
DTD | Document Type Definition |
DTIC | Defense Technical Information Center |
DTLS | Datagram Transport Layer Security |
DTM | Data Transmission Media |
DTM | Directive Type Memorandum |
DTP | Dynamic Trunking Protocol |
DTR | Derived Test Requirement |
DTSA | Defense Technology Security Administration |
DUA | Data Use Agreement |
DUID | DHCP Unique Identifier |
DVD | Digital Versatile Disc |
DVD | Digital Video Disk |
DVD-R | Digital Video Disc Recordable |
DVD-RAM | Digital Versatile Disc Random Access Memory |
DVD-ROM | Digital Video Disc Read Only Memory |
DVD-RW | Digital Video Disc Rewritable |
DVMRP | Distant Vector Multicast Routing Protocol |
DVR | Digital Video Recorder |
DVR | Digital Voice Recorder |
DW | Data Warehouse |
E/APL | Evaluated Approved Product |
EA | Electronic Attack |
EA | Enterprise Architecture |
EA | Evolutionary Acquisition |
EAC | Electronic Access Control |
EAC | Estimate At Completion |
EAI | Enterprise Application Integration |
EAL | Evaluation Assurance Level |
EAP | Extensible Authentication Protocol |
EAP-FAST | Extensible Authentication Protocol Flexible Authentication Via Secure Tunneling |
EAPOL | Extensible Authentication Protocol Over LAN |
EAPOL-KCK | Extensible Authentication Protocol Over LAN Key Confirmation Key |
EAPOL-KEK | Extensible Authentication Protocol Over LAN Key Encryption Key |
EAP-TLS | Extensible Authentication Protocol Transport Layer Security |
EAP-TTLS | Extensible Authentication Protocol Tunneled Transport Layer Security |
EBGP | Exterior Border Gateway Protocol |
EBS | Amazon Elastic Block Store |
ebXML | Electronic Business Extensible Markup Language |
ebXML | Electronic Business Using Extensible Markup Language |
EC2 | Elastic Compute Cloud |
EC2N | Elliptic Curve Over G[2N] |
ECB | Electronic Code Book |
ECC | Elliptic Curve Cryptography |
ECC | Error Correction Code |
ECDH | Elliptic Curve Diffie Hellman |
ECDSA | Elliptic Curve Digital Signature Algorithm |
ECM | Enterprise Configuration Manager |
ECM | Enterprise Content Management |
ECP | Encryption Control Protocol |
ECP | Engineering Change Proposal |
ECPA | Electronic Communications Privacy Act |
ECS | Ec2 Container Service |
EDGE | Enhanced Data For Global Evolution |
EDI | Electronic Data Interchange |
EDR | Endpoint Detection & Response |
EDR | Enhanced Data Rate |
EEPROM | Electrically Erasable Programmable Read Only Memory |
EF | Exposure Factor |
EFI | Extensible Firmware Interface |
EFOIA | Electronic Freedom of Information Act |
EFS | Elastic File System |
EFS | Encrypting File System |
EGP | Exterior Gateway Protocol |
EH | Extension Header |
EHR | Electronic Health Record |
EI | Email Injection |
EICAR | European Institute For Computer Antivirus Research |
EIEMA | Enterprise Information Environment Mission Area |
EIGRP | Enhanced Interior Gateway Routing Protocol |
EIK | EAP Integrity Key |
EIP | Elastic IP |
EITDR | Enterprise Information Technology Database Repository |
EK | Endorsement Key |
ELB | Elastic Load Balancer |
Electronic Mail | |
eMASS | Enterprise Mission Assurance Support Service |
eMBB | Enhanced Mobile Broadband |
EMM | Enterprise Mobility Management |
EMP | Electromagnetic Pulse |
EMR | Elastic Map Reduce |
EMR | Electronic Medical Record |
EMS | Energy Management System |
EMS | Enhanced Messaging Service |
EMS | Enterprise Messaging System |
EMSK | Extended Master Session Key |
EMTALA | Emergency Medical Treatment & Labor Act |
EMV | Europay Mastercard Visa Specification |
EMVCo | EMV Specifications Company |
EnCE | Encase Certified Examiner |
EnCEP | Encase Certified Ediscovery Practitioner |
ENI | Elastic Network Interface |
ENISA | European Network & Information Security Agency |
ENRP | Endpoint Handlespace Redundancy Protocol |
EOF | End of File |
EOL | End of Life |
EOP | Executive Office of The President |
EP | Eligible Provider |
EPA | Environmental Protection Agency |
EPAL | Enterprise Privacy Authorization Language |
EPC | Electronic Product Code |
EPCIS | Electronic Product Code Information Services |
EPHI | Electronic Protected Health Information |
EPITS | Essential Program Information Technologies & Systems |
EPROM | Erasable Programmable Read Only Memory |
EPS | Events Per Second |
EPSQ | Electronic Personnel Security Questionnaire |
ERM | Enterprise Risk Management |
ERP | Enterprise Resource Planning |
ES | Amazon Elasticsearch Service |
ES | Electronic Surveillance |
ESAPI | Enterprise Security Application Programming Interface |
ESB | Enterprise Service Bus |
ESMS | Enterprise Security Management System |
ESMTP | Extended Simple Mail Transfer Protocol |
ESN | Electronic Serial Number |
ESP | Encapsulating Security Payload |
ESS | Electronic Security System |
ESS | Extended Service Set |
ESX | Elastic Sky X |
ET | Electronic Transmission |
ETA | Education Training & Awareness |
ETAPWG | Education Training Awareness & Professionalization Working Group |
ETC | Estimate To Complete |
ETSI | European Telecommunications Standards Institute |
ETZ | Equipment Transient Electromagnetic Pulse Emanation Standard (Tempest) Zone |
EU | European Union |
EU DP | European Union Data Protection |
EUI-64 | Extended Unique Identifier 64 Bit |
EULA | End User License Agreement |
EUP | Enterprise Unified Process |
EV | Extended Validation |
EV-DO | Evolution Data Optimized |
EVM | Earned Value Management |
EW | Electronic Warfare |
EWS | Electronic Warfare Support |
EXIF | Exchangeable Image File Format |
EXT | Extended File System |
EXT2 | Second Extended File System |
ext2fs | Second Extended Filesystem |
EXT3 | Third Extended File System |
ext3fs | Third Extended Filesystem |
EXT4 | Fourth Extended File System |
FaaS | Function As A Service |
FAFSA | Free Application For Federal Student Aid |
FAIR | Factor Analysis of Information Risk |
FAQ | Frequently Asked Questions |
FAR | False Acceptance Rate |
FAR | Federal Acquisition Regulation |
FASC-N | Federal Agency Smart Credential Number |
FASP | Federal Agency Security Practices |
FAT | Factory Acceptance Testing |
FAT | File Allocation Table |
FAT16 | File Allocation Table (16 Bit) File System |
FB | |
FBCA | Federal Bridge Certification Authority |
FBI | Federal Bureau of Investigation |
FBIS | Foreign Broadcast Information Service |
FCC | Federal Communications Commission |
FCIP | Foreign Counterintelligence Program |
FCL | Facility Security Clearance |
FCL | Final Checklist List |
FCPF | Federal PKI Common Policy Framework |
FCRA | Fair Credit Reporting Act |
FCS | Frame Check Sequence |
FDA | Food & Drug Administration |
FDCC | Federal Desktop Core Configuration |
FDCE | Federated Development & Certification Environment |
FDDI | Fiber Distributed Data Interface |
FDE | Full Disk Encryption |
FDIC | Federal Deposit Insurance Corporation |
FDMA | Frequency Division Multiple Access |
FEA | Federal Enterprise Architecture |
FEAF | Federal Enterprise Architecture Framework |
FEK | File Encryption Key |
FEMA | Federal Emergency Management Agency Only Memory |
FER | Failure To Enroll Rate |
FFIEC | Federal Financial Institutions Examination Council |
FFMIA | Federal Financial Management Improvement Act |
FHIR | Fast Healthcare Interoperability Resources |
FHSS | Frequency Hopping Spread Spectrum |
FI | Foreign Intelligence |
FIAM | Federated Identity & Access Management |
FIB | Forwarding Information Base |
FICC | Federal Identity Credentialing Committee |
FIDS | Facility Intrusion Detection System |
FIE | Foreign Intelligence Entity |
FIFO | First In First Out |
FILO | First In Last Out |
FIM | Federated Identity Management |
FIM | File Integrity Monitoring |
Fios | Fiber Optic Service |
FIPS | Federal Information Processing Standard |
FIPSPUB | Federal Information Processing Standard Publication |
FIRST | Forum of Incident Response & Security Teams |
FIS | Foreign Intelligence Services |
FISA | Foreign Intelligence Surveillance Act |
FISCAM | Federal Information System Controls Audit Manual |
FISD | Federal Investigative Services Division |
FISINT | Foreign Instrumentation Signals Intelligence |
FISMA | Federal Information Security Management Act |
FISSEA | Federal Information Systems Security Educators’ Association |
FIT | Foreign Inspection Team |
FIU | Field Investigative Unit |
FIWC | Fleet Information Warfare Center |
FLETC | Federal Law Enforcement Training Center |
FLOPS | Floating Point Operations Per Second |
FM | Frequency Modulated |
FMR | False Match Rate |
FMS | Fluhrer Mantin Shamir |
FN | Foreign National |
FNMR | False Non Match Rate |
FOIA | Freedom of Information Act |
FOIA/PA | Freedom of Information Act/Privacy Act |
FOMO | Fear of Missing Out |
FOSS | Free & Open Source Software |
FOV | Field of View |
FPC | Federal Preparedness Circular |
FPE | Format Preserving Encryption |
FPGA | Field Programmable Gate Array |
FPKI | Federal Public Key Infrastructure |
FPKIA | Federal Public Key Infrastructure Architecture |
FPKIPA | Federal Public Key Infrastructure Policy Authority |
FPN | Fixed Pattern Noise |
FPU | Floating Point Unit |
FQDN | Fully Qualified Domain Name |
FRAM | Ferroelectric Random Access Memory |
FRAP | Facilitated Risk Analysis Process |
FRCP | Federal Rules of Civil Procedure |
FRD | Formerly Restricted Data |
FRD | Functional Requirements Document |
FRR | False Rejection Rate |
FSB | Frontside Bus |
FSO | Facility Security Officer |
FSO | Field Security Office |
FTC | Federal Trade Commission |
FTCA | Federal Trade Commission Act |
FTP | File Transfer Protocol |
FTPS | File Transfer Protocol Secure |
FTS | Federal Telecommunications Service |
FTZ | Facilities Transient Electromagnetic Pulse Emanation Standard (Tempest) Zone |
FUD | Fully Undetectable |
FUS | Fast User Switching |
FY | Fiscal Year |
G2 | Assistant Chief of Staff G2 Intelligence |
G-2 | Staff Intelligence Officer |
GA | Google Analytics |
GAAP | Generally Accepted Accounting Principles |
GAO | U.S. Government Accountability Office |
GAPP | Generally Accepted Privacy Principles |
GB | Gigabyte |
GCCS | Global Command & Control System |
GCLB | Google Cloud Load Balancer |
GCM | Galois / Counter Mode |
GCP | Google Cloud Platform |
GCS | Google Cloud Storage |
GCSS | Global Combat Support System |
GDIP | General Defense Intelligence Programs |
GDPR | General Data Protection Regulation |
GEOINT | Geospatial Intelligence |
GFAC | Generalized Framework For Access Control |
GFE | Government Furnished Equipment |
GFIRST | Government Forum of Incident Response & Security Teams |
GHz | Gigahertz |
GIF | Graphics Interchange Format |
GIG | Global Information Grid |
GII | Global Information Infrastructure |
GINA | Graphical Identification & Authentication |
GIS | Geographic Information Systems |
GISRA | Government Information Security Reform Act |
GKEK | Group Key Encryption Key |
GLB | Gramm Leach Bliley Act |
GLBA | Gramm Leach Bliley Act |
GMITS | Guidelines For The Management of It Security |
GMK | Group Master Key |
GNU | Gnu'S Not Unix! |
GnuPG | Gnu Privacy Guard |
GOSC | Global Operations & Security Center |
GOTS | Government off The Shelf |
GPGPU | General Purpose Computation On Graphics Processing Units |
GPIO | General Purpose Input/Output |
GPL | General Public License |
GPMC | Group Policy Management Console |
GPO | Group Policy Object |
GPRS | General Packet Radio Service |
GPS | Global Positioning System |
GR | Graceful Restart |
GRC | Governance Risk Management & Compliance |
GRE | Generic Routing Encapsulation |
GRS | General Records Schedule |
GS1 | Global Standards One |
GSA | U.S. General Services Administration |
GSC | Government Security Committee |
GSII | Government Services Information Infrastructure |
GSM | Global System For Mobile Communications |
GSOIA | General Security of Information Agreement |
GSOMIA | General Security of Military Information Agreement |
GSSAPI | Generic Security Services Application Program Interface |
GTC | Generic Token Card |
GTEK | Group Traffic Encryption Key |
GTK | Group Temporal Key |
gTLD | Generic Top Level Domain |
GTSM | Generalized Ttl Security Mechanism |
GUI | Graphical User Interface |
GUID | Globally Unique Identifier |
HA | High Availability |
HA | Home Agent |
HAC | High Availability Clusters |
HAG | High Assurance Guard |
HAL | Hardware Abstraction Layer |
HAR | Http Archive |
HBSS | Host Based Security System |
HCERA | Health Care & Education Reconciliation Act |
HCI | Host Controller Interface |
HCISPP | Healthcare Information Security & Privacy Practitioner |
HDD | Hard Disk Drive |
HDFS | Hadoop Distributed File System |
HDMI | High Definition Multimedia Interface |
HERF | Hazards of Electromagnetic Radiation To Fuel |
HERO | Hazards of Electromagnetic Radiation To Ordnance |
HERP | Hazards of Electromagnetic Radiation To Personnel |
HF | High Frequency |
HFS | Hierarchical File System |
HFS+ | Hierarchical File System Plus |
HHS | U.S. Department of Health & Human Services |
HI | Header Injection / HTTP response splitting |
HICS | Hospital Incident Command System |
HIDS | Host Based Intrusion Detection System |
HIE | Health Information Exchange |
HINFO | Host Information |
HIP | Host Identity Protocol |
HIPAA | Health Insurance Portability & Accountability Act |
HIPERLAN | High Performance Radio Local Area Network |
HIPS | Host Based Intrusion Prevention System |
HIT | Healthcare Information Technology |
HITECH | Health Information Technology For Economic & Clinical Health |
HITRUST | Health Information Trust Alliance |
HITS | Hyperlink Induced Topic Search |
HIV | Human Immunodeficiency Virus |
HKLM | HKEY Local_Machine |
HL7 | Health Level 7 |
HMAC | Hash Message Authentication Code |
HMD | Head Mounted Displays |
HMI | Human Machine Interface |
HMO | Health Maintenance Organization |
HOIS | Hostile Intelligence Services |
HP CSA | Hp Cloud Service Automation |
HPA | Host Protected Area |
HPC | High Performance Compute |
HPFS | High Performance File System |
HPSCI | House Permanent Select Committee On Intelligence |
HR | Human Resources |
HRM | Human Resource Management |
HSA | Homeland Security Act |
HSARPA | Homeland Security Advanced Research Projects Agency |
HSDPA | High Speed Downlink Packet Access |
HSF | Heat Sink & Fan |
HSM | Hardware Security Module |
HSPA | High Speed Packet Access |
HSPA+ | Evolved High Speed Packet Access Or High Speed Packet Access |
HSPD | Homeland Security Presidential Directive |
HTCIA | High Technology Crime Investigation Association |
HTCP | Hyper Text Caching Protocol |
HTML | Hypertext Markup Language |
HTTP | Hypertext Transfer Protocol |
HTTPS | Hypertext Transfer Protocol Secure |
HUMINT | Human Intelligence |
HVA | Hazard Vulnerability Analysis |
HVAC | Heating Ventilation & Air Conditioning |
HVM | Hardware Virtual Machine |
Hz | Hertz |
I&A | Identification & Authentication |
I&W | Indications & Warning |
I/O | Input/Output |
I3A | International Imaging Industry Association |
I3P | Institute For Information Infrastructure Protection |
IA | Information Assurance |
IA | Institutional Analytics |
IA | Intelligence Activity |
IAA | Interim Access Authorization |
IaaS | Infrastructure As A Service |
IAB | Internet Architecture Board |
IaC | Infrastructure As Code |
IAC | Internal Audit & Compliance |
IAC | Issuer Action Codes |
IACIS | International Association of Computer Investigative Specialists |
IACSE | Interagency Advisory Committee On Security Equipment |
IAD | Information Assurance Document |
IAG | Information Assurance Group |
IAIP | Information Analysis & Infrastructure Protection |
IAM | Identity & Access Management |
IAM | Information Assurance Manager |
IANA | Internet Assigned Numbers Authority |
IAO | Information Assurance Officer |
IAPM | Information Assurance Program Manager |
IAPWG | Information Assurance Policy Working Group |
IASE | Information Assurance Support Environment |
IASL | Information Assurance Senior Leadership |
IAST | Interactive Application Security Test |
IATAC | Information Assurance Technology Analysis Center |
IATC | Interim Authority To Connect |
IATF | Information Assurance Technical Framework |
IATO | Interim Authority To Operate |
IATT | Interim Authorization To Test |
IAVA | Information Assurance Vulnerability Alert |
IAX 2 | Inter Asterisk Exchange |
IBC | Iterated Block Cipher |
IBE | Identity Based Encryption |
iBGP | Internal Border Gateway Protocol |
IBIS | Issue Based Information System |
IBMJSSE | IBM Java Secure Socket Extension |
IBN | Intent Based Networking |
IBR | Integrated Baseline Review |
IBSS | Independent Basic Service Set |
IC | Integrated Circuit |
IC | Intelligence Community |
IC3 | Internet Crime Complaint Center |
ICAC | Internet Crimes Against Children |
ICAMP | Incident Cost Analysis & Modeling Project |
ICANN | Internet Corporation For Assigned Names & Numbers |
ICC | Integrated Circuit Card |
ICCID | Integrated Circuit Card Identifier |
ICCP | Inter Control Center Communications Protocol |
ICD | Intelligence Community Directive |
ICD | Interface Control Document |
ICD | International Classification of Diseases |
ICD-10 | International Classification of Diseases Version 10 |
ICF | Internet Connection Firewall |
ICFR | Internal Control Over Financial Reporting |
ICM | Integer Counter Mode |
ICMP | Internet Control Message Protocol |
ICO | Information Commisioner's Office |
ICP | Initial Control Point |
ICP | Internet Cache Protocol |
ICS | Industrial Control System |
ICS | Internet Connection Sharing |
ICSA | International Computer Security Association |
ICT | Information & Communication Technology |
ICV | Integrity Check Value |
ICV | Intelligent Connected Vehicles |
ID | Identification |
IDaaS | Identity As A Service |
IDART | Information Design Assurance Red Team |
IDC | International Data Center |
IDE | Integrated Development Environment |
IDE | Integrated Device Electronics |
IDE | Integrated Drive Electronics |
IDE | Intrusion Detection Equipment |
IdEA | Identity Entitlement & Access Management |
IDEA | International Data Encryption Algorithm |
iDEN | Integrated Digital Enhanced Network |
ID-FF | Identity Federation Framework |
IDL | Interface Definition Language |
IdM | Identity Management |
IDMEF | Intrusion Detection Message Exchange Format |
IDMS | Identity Management System |
IdP | Identity Provider |
IDPS | Intrusion Detection & Prevention System |
IDS | Intrusion Detection System |
IDS/IDP | Intrusion Detection/Intrusion Detection & Prevention |
ID-SIS | Identity Service Interface Specifications |
ID-WSF | Identity Web Services Framework |
IE | Internet Explorer |
IEC | International Electrotechnical Commission |
IED | Intelligent Electronic Device |
IEEE | Institute of Electrical & Electronics Engineers |
IEEE-SA | IEEE Standards Association |
IEID | International Exchange of Infrasound Data |
IERD | International Exchange of Radionuclide Data |
IESD | International Exchange of Seismological Data |
IESG | Internet Security Steering Group |
IETF | Internet Engineering Task Force |
IFTTT | If This Then That |
IG | Internet Gateway |
IGMP | Internet Group Management Protocol |
IGP | Interior Gateway Protocol |
IGRP | Interior Gateway Routing Protocol |
IID | Interface Identifier |
IIF | Information In Identifiable Form |
IIHI | Individually Identifiable Health Information |
IIOC | Independent International Organization For Certification |
IIOP | Internet Inter Orb Protocol |
IIS | Internet Information Services |
IKE | Internet Key Exchange |
ILM | Information Lifecycle Management |
IM | Instant Messaging |
IMAP | Internet Message Access Protocol |
IMEI | International Mobile Equipment Identity |
IMM | Information Management Model |
IMS | Intelligent Maintenance Systems |
IMSI | International Mobile Subscriber Identity |
IMT-2000 | International Mobile Telecommunications 2000 |
INCITS | International Committee For Information Technology Standards |
INCOSE | International Council of Systems Engineering |
INFOCONs | Information Operations Conditions |
INFOSEC | Information Systems Security |
INFOSYS | Information Systems |
INTERPOL | International Police Organization |
IO | Information Operations |
IO | Information Owner |
IO | Insertion Order |
IOC | Indicators of Compromise |
IOPS | Input/Output Operations Per Second |
IOSS | Interagency Operations Security (OPSEC) Support Staff |
IoT | Internet of Things |
IP | Intellectual Property |
IP | Internet Protocol |
IPA | Initial Privacy Assessment |
IPA | Intrusion Prevention Appliance |
IPB | Intelligence Preparation of The Battlefield |
IPComp | Internet Protocol Payload Compression Protocol |
IPComp | IP Payload Compression |
IPMO | Infosec Program Management Office |
IPng | Internet Protocol Next Generation |
IPP | Information Protection Policy |
IPPD | Integrated Product & Process Development |
IPR | Internet Protocol Router |
IPS | Intrusion Prevention System |
IPSAC | Interagency Security Classification Appeals Panel |
IPSec | Internet Protocol Security |
IPSec VPN | Internet Protocol Security Virtual Private Network |
IPT | Integrated Product Team |
IPTF | Infrastructure Protection Task Force |
IPv4 | Internet Protocol Version 4 |
IPv6 | Internet Protocol Version 6 |
IPX | Internet Packet Exchange |
IPX | Internetwork Packet Exchange |
IPX/SPX | Internetwork Packet Exchange / Sequenced Packet Exchange |
IR | Incident Response |
IR | Infrared |
IR | Interagency Report |
IRB | Institutional Review Board |
IRC | Infosec Research Council |
IRC | Internet Relay Chat |
IrDA | Infrared Data Association |
IRM | Information Resource Management |
IRM | Information Rights Management |
IRP | Incident Response Plan |
IRQ | Interrupt Request Line |
IRS | Incident Reporting Structure |
IRS | Internal Revenue Service |
IRT | Incident Response Team |
IRTF | Internet Research Task Force |
IS | Information System |
ISA | Interconnection Security Agreement |
ISA | International Security Agreement |
ISA | International Society of Automation |
ISAC | Information Sharing & Analysis Center |
ISACA | Information Systems Audit & Control Association |
ISAKMP | Internet Security Association & Key Management Protocol |
ISAM | Indexed Sequential Access Method |
ISAP | Information Security Automation Program |
ISAPI | Internet Server Application Programming Interface |
ISATAP | Intra Site Automatic Tunnel Addressing Protocol |
ISCM | Information Security Continuous Monitoring |
ISCOM | Naval Investigative Service Command |
iSCSI | Internet Small Computer Systems Interface |
ISD | Information Storage Device |
ISD | Inspectable Space Determination |
ISDN | Integrated Services Digital Network |
ISF | Information Security Forum |
ISFD | Industrial Security Facilities Database |
ISG | Information Security Governance |
ISID | Industrial Security Incident Database |
IS-IS | Intermediate System To Intermediate System |
ISM | Industrial |
ISM | Information Security Manager |
ISM | Information Security Marking |
ISMS | Information Security Management System |
ISO | Information System Owner |
ISO | International Organization For Standardization |
ISO/IEC | International Organization For Standardization/ International |
ISOO | Information Security Oversight Office |
ISP | Internet Service Provider |
ISPG | Intelligence Programs Support Group |
ISR | Interrupt Service Routine |
ISRMC | Information Security Risk Management Committee |
ISRP | Information Systems Requirements Package |
ISS | Information Systems Security |
ISS | Inspection Support Staff |
ISS | Integrated Safeguards Subgroup |
ISSA | Information Systems Security Association |
ISSE | Information System Security Engineer |
ISSEA | International Systems Security Engineering Association |
ISSEP | Information System Security Engineering Professional |
ISSM | Information System Security Manager |
ISSO | Information System Security Officer |
ISSP | Information Systems Security Professional |
ISSPM | Information Systems Security Program Manager |
ISSR | Information Systems Security Representative |
ISWG | Industrial Security Working Group |
IT | Information Technology |
ITA | Information Technology Agreement |
ITAA | Information Technology Association of America |
ITAB | Information Technology Acquisition Board |
ITAC | Intelligence & Threat Analysis Center |
ITAM | Information Technology Asset Management |
ITF | Interrogator Talks First |
ITIL | Information Technology Infrastructure Library |
ITL | Information Technology Laboratory |
ITMRA | Information Technology Management Reform Act |
ITSEC | Information Technology Security Evaluation Criteria |
ITU | International Telecommunications Union |
ITU-T | International Telecommunication Union Telecommunication Standardization Sector |
IUT | Implementation Under Test |
IV | Initialization Vector |
IV&V | Independent Verification & Validation |
IVR | Interactive Voice Response |
IW | Information Warfare |
IW-D | Information Warfare – Defensive |
J2 | Intelligence Directorate Joint Command |
JAB | Joint Authorization Board |
JAD | Joint Analysis Development |
Java | Java Platform |
Java EE | Java Enterprise Edition |
JAXR | Java API For XML Registries |
JCAHO | Joint Commission On Accreditation of |
JCCC | Joint Communications Control Center |
JCE | Java Cryptography Extension |
JCIDS | Joint Capabilities Integration & Development System |
JCITA | Joint Counterintelligence Training Academy |
JCS | Joint Chiefs of Staff |
JDBC | Java Database Connectivity |
JDIICS | Joint DII Control Systems |
JDK | Java Development Kit |
JeOS | Just Enough Operating System |
JFFS2 | Journaling Flash File System |
JFS | Journaling File System |
JID | Joint Intrusion Detection |
JIE | Joint Information Environment |
JIEO | Joint Interoperability Engineering Organization |
JIT | Just In Time |
JIWG | Joint Ia Operations Working Group |
JMIC | Joint Military Intelligence College |
JMIP | Joint Military Intelligence Programs |
JMITC | Joint Military Intelligence Training Center |
JPAS | Joint Personnel Adjudication System |
JPEG | Joint Photographic Experts Group |
JPO | Joint Program Office |
JPO STC | Joint Program Office For Special Technical Countermeasures |
JRE | Java Runtime Environment |
JROC | Joint Requirements Oversight Council |
JS | JavaScript |
JSAIWG | Joint Sensitive Compartmented Information (Sci) Accreditation/Inspection Working Group |
JSF | Javaserver Faces |
J-SIIDS | Joint Services Interior Intrusion Detection System |
JSM | Java Security Manager |
JSON | JavaScript Object Notation |
JSP | Java Server Pages |
JSSE | Java Secure Socket Extension |
JTAG | Joint Test Action Group |
JTC1 | Joint Technical Committee 1 (International Organization For Standardization [ISO]/International Electrotechnical Commission [IEC]) |
JTF-CNO | Joint Task Force – Computer Network Operations |
JVM | Java Virtual Machine |
JWICS | Joint Worldwide Intelligence Communication System |
JWID | Joint Warrior Interoperability Demonstration |
JWT | JSON Web Token |
KB | Kilobyte |
KB | Knowledge Base |
Kbps | Kilobit Per Second |
KDC | Key Distribution Center |
KEK | Key Encryption Key |
KG | Key Generator |
KGD | Key Generation & Distribution |
kHz | Kilohertz |
KINK | Kerberized Internet Negotiation of Keys |
KLOC | Thousands of Lines of Code |
KMC | Key Management Center |
KMI | Key Management Infrastructure |
KMIP | Key Management Interoperability Protocol |
KMS | Key Management Service |
KMS | Key Management System |
KPI | Key Performance Indicator |
KRI | Key Risk Indicator |
KS | Knowledge Service |
KSG | Key Stream Generator |
KSK | Key Signing Key |
KVM | Kernel Based Virtual Machine |
KVM | Keyboard Video Mouse |
L2CAP | Logical Link Control & Adaptation Protocol |
L2F | Layer 2 Forwarding |
L2TP | Layer 2 Tunneling Protocol |
L2VPN | Layer 2 Virtual Private Network |
L3VPN | Layer 3 Virtual Private Network |
LAA | Limited Access Authorization |
LAC | Local Agency Check |
LACNIC | Latin American & Caribbean IP Addresses Registry |
LAN | Local Area Network |
LB | Load Balancer |
LBA | Logical Block Addressing |
LBAC | Lattice Based Access Control |
LBAP | Layer Based Access Protocol |
LBI | Limited Background Investigation |
LBIP | Limited Background Investigation Plus Current National Agency Check |
LBIX | Limited Background Investigation Expanded |
LCD | Liquid Crystal Display |
LCG | Linear Congruential Generators |
LCP | Link Control Protocol |
LDA | Local Delivery Agent |
LDAP | Lightweight Directory Access Protocol |
LDAPI | LDAP Injection |
LDAPS | Lightweight Directory Access Protocol Over SSL |
LDP | Label Distribution Protocol |
LE | Law Enforcement |
LE/CI | Law Enforcement & Counterintelligence |
LEA | Law Enforcement Agency |
LED | Light Emitting Diode |
LF | Low Frequency |
LFC | Local Files Check |
LFI | Local File Inclusion |
LFN | Long Filename |
LFSR | Linear Feedback Shift Register |
LIMDIS | Limited Distribution |
LIR | Local Internet Registry |
LLC | Logical Link Control |
LLT | Low Latency Transport |
LM | Lan Manager |
LMP | Link Manager Protocol |
LMS | Learning Management System |
LN | Local Network |
LNN | Learning Neural Networks |
LOC | Location |
LOINC | Logical Observation Identifiers Names & Codes |
LOS | Line of Sight |
LR | Logistic Regression |
LRA | Local Registration Authority |
LSI | Latent Semantic Indexing |
LSTM | Long Short Term Memory |
LT | Leadership Team |
LTE | Long Term Evolution |
LTE-A | LTE Advanced |
LU6.2 | Logical Unit Version 6.2 |
LUA | Limited User Account |
LUN | Logical Unit Number |
m | Meter |
M&A | Merger & Acquisitions |
M2M | Machine To Machine |
MA | Mission Area |
MAC | Mandatory Access Control |
MAC | Media Access Control |
MAC | Medium Access Control |
MAC | Message Authentication Code |
MAF | Multi Mode Authentication Framework |
MAM | Mobile Application Management |
MAMP | Mac OS X Apache MySQL and PHP |
MAN | Metropolitan Area Network |
MANET | Mobile Ad Hoc Network |
MAPS | Mail Abuse Prevention System |
MASINT | Measurement & Signature Intelligence |
MB | Megabyte |
MBP | Macbook Pro |
Mbps | Megabits Per Second |
MBR | Master Boot Record |
MBSA | Microsoft Baseline Security Analyzer |
MCA | Micro Channel Architecture |
MCC | Mobile Country Codes |
MCDES | Malicious Code Detection & Eradication System |
MCIS | Miami Computing & Information Services |
MCM | Mobile Content Management |
MCS | Miami Computing Services |
MD | Message Digest |
MD5 | Message Digest 5 |
MDC | Modular Data Center |
MDI | Medical Device Integration |
MDI | Medium Dependent Interface |
MDM | Mobile Device Management |
MDN | Mobile Directory Number |
MDS2 | Manufacturer Disclosure Statement For Medical Device Security |
ME | Mobile Equipment |
MED | Multi Exit Discriminator |
MEID | Mobile Equipment Identifier |
MEP | Message Exchange Pattern |
MES | Manufacturing Execution System |
MFA | Multi Factor Authentication |
MFT | Master File Table |
MGCP | Media Gateway Control Protocol |
MHz | Megahertz |
MI | Machine Intelligence |
MI | Military Intelligence |
MIB | Management Information Base |
MIC | Mandatory Integrity Control |
MIC | Message Integrity Check |
MIKEY | Multimedia Internet Keying |
MIM | Microsoft Identity Manager |
MIM | Mobile Information Management |
MIME | Multipurpose Internet Mail Extensions |
MIMO | Multiple Input |
MIN | Mobile Identification Number |
MInE | Miami Information Environment |
Mini SD | Mini Secure Digital |
MIP | Mobile Internet Protocol |
MIPS | Million Instructions Per Second |
MIS | Management Information System |
MITM | Man In The Middle |
ML | Machine Learning |
MLD | Multicast Listener Discovery |
MLS | Multilevel Security |
MLS WG | Multilevel Security Working Group |
MMC | Microsoft Management Console |
MMC | Multimediacard |
MMCmobile | Multimediacard Mobile |
MMS | Multimedia Message Service |
MMS | Multimedia Messaging Service |
mMTC | Massive Machine Type Communications |
MN | Mobile Node |
MNB | Miami Notebook |
MNC | Mobile Network Codes |
MNS | Mission Needs Statement |
MO | Magneto Optical |
MOA | Memorandum of Agreement |
MOBIKE | IKEv2 Mobility & Multihoming Protocol |
MODP | Modular Exponential |
MOSS | Mime Object Security Services |
MOU | Memorandum of Understanding |
MOVS | Modes of Operation Validation System |
MP3 | Moving Picture Experts Group Layer 3 |
MP4 | Moving Pictures Experts Group 4 |
MPA | Mobile Prefix Advertisement |
MPLS | Multi Protocol Label Switching |
MPP | Massive Parallel Processing |
MPS | Mobile Prefix Solicitation |
MQV | Menezes Qu Vanstone |
MRI | Magnetic Resonance Imaging |
MS | Microsoft |
MS | Mobile Subscriber |
MSA | Master Service Agreement |
MSC | Mobile Switching Center |
MS-CHAP | Microsoft Challenge Handshake Authentication Protocol |
MSD | Magnetic Stripe Data |
MS-DOS | Microsoft Disk Operating System |
MSDP | Multicast Source Discovery Protocol |
MSEC | Multicast Security |
MSEL | Master Scenario Events List |
MSIL | Microsoft Intermediate Language |
MS-ISAC | Multi State Information Sharing & Analysis Center |
MSISDN | Mobile Subscriber Integrated Services Digital Network |
MSK | Master Session Key |
MSKB | Microsoft Knowledge Base |
MSP | Managed Service Provider |
MSSP | Managed Security Service Provider |
MSTSC | Microsoft Terminal Service Client |
MSWG | Metadata Standards Working Group |
MTA | Mail Transfer Agent |
MTBF | Mean Time Between Failures |
MTD | Maximum Tolerable Downtime |
MTD | Memory Technical Driver |
MTM | Mobile Trusted Module |
MTPOD | Maximum Tolerable Period of Disruption |
MTSO | Mobile Telephone Switching Office |
MTTF | Mean Time To Failure |
MTTR | Mean Time To Repair |
MTU | Master Telemetry Unit |
MTU | Master Terminal Unit |
MTU | Maximum Transmission Unit |
MU | Meaningful Use |
MUA | Mail User Agent |
MUTV | Miami University Television |
MVC | Model View Controller |
mW | Milliwatt |
MWB | Malwarebytes |
MX | Mail Exchanger |
NA | Neighbor Advertisement |
NA | Not Applicable |
NaaS | Network As A Service |
NAC | Network Access Control |
NACI | National Agency Check & Inquiries |
NACIC | National Counterintelligence Center |
NACK | Negative Acknowledgement |
NACK | Negative Acknowledgement Protocol |
NAP | Network Access Protection |
NARA | National Archives & Records Administration |
NAS | Network Access Server |
NAS | Network Attached Storage |
NAT | Network Address Translation |
NATO | North Atlantic Treaty Organization |
NAT-PT | Network Address Translation—Protocol Translation |
NAT-T | Network Address Translation Traversal |
NBA | Network Behavior Analysis |
NBAD | Network Behavior Anomaly Detection |
NBE | Network Based Evidence |
NC | Non Compliant |
NCC | National Cybersecurity Center |
NCCIC | National Cybersecurity & Communications Integration Center |
NCES | Netcentric Enterprise Services |
NCIC | National Crime Information Center |
NCIS | Naval Criminal Investigation Service |
NCP | National Checklist Program |
NCRAL | National Cyber Risk Alert Level |
NCS | National Communications System |
NCS | National Cryptologic School |
NCSA | National Cyber Security Alliance |
NCSAM | National Cyber Security Awareness Month |
NCSC | National Computer Security Center |
NCSD | National Cyber Security Division |
NCSI | NIST National Center For Standards & Certification Information |
ND | Neighbor Discovery |
NDA | Non Disclosure Agreement |
NDAC | Non Discretionary Access Control |
NDP | Neighbor Discovery Protocol |
NDU | National Defense University |
Net | Network |
NetBEUI | NetBIOS Extended User Interface |
NetBIOS | Network Basic Input/Output System |
NetBT | NetBIOS Over TCP/IP |
NETMGR | Network Manager |
NetOps | Network Operations |
NFAT | Network Forensic Analysis Tool |
NFC | Near Field Communication |
NFIB | National Foreign Intelligence Board |
NFIP | National Foreign Intelligence Program |
NFS | Network File System |
NFV | Network Function Virtualization |
NGA | National Geospatial Intelligence Agency |
NGFW | Next Generation Firewall |
NGIC | National Ground Intelligence Center |
NH | Next Header |
NHS | National Health Service |
NI | Natural Intelligence |
NIAC | National Infrastructure Advisory Council |
NIACAP | National Information Assurance Certification & Accreditation Process |
NIAP | National Information Assurance Partnership |
NIC | Network Interface Card |
NICC | National Infrastructure Coordinating Center |
NICCS | National Initiative For Cybersecurity Careers & Studies |
NICE | National Initiative For Cybersecurity Education |
NID | Network Intrusion Detector |
NIDS | Network Intrusion Detection System |
NII | National Information Infrastructure |
NIJ | National Institute of Justice |
NINO | Nothing In Nothing Out |
NIPC | National Infrastructure Protection Center |
NIPRNET | Non Secure/Unclassified Internet Protocol Router Network |
NIPS | Network Based Intrusion Prevention System |
NIS | Network Information System |
NISAC | National Infrastructure Simulation & Analysis Center |
NISCC | National Infrastructure Security Coordination Center |
NISP | National Industrial Security Program |
NISPOM | National Industrial Security Program Operating Manual |
NIST | National Institute of Standards & Technology |
NISTIR | National Institute of Standards & Technology Interagency Report |
NITB | National Infosec Technical Baseline |
NLNN | Non Learning Neural Networks |
NLOS | Non Line of Sight |
NLP | Natural Language Processing |
NLSP | Network Layer Security Protocol |
NLU | Natural Language Understanding |
NMAP | Network Mapper |
NMS | Network Management System |
NNTP | Network News Transfer Protocol |
NOC | Network Operations Center |
NOS | Network Operating System |
NOSC | Network Operation Security Center |
NoSQL | Non Structured Query Language |
NPI | New Product Introduction |
NPIVP | NIST Personal Identity Verification Program |
NPP | Notice of Privacy Practices |
NPPI | Nonpublic Personal Information |
NPS | Net Promoter Score |
NPV | Net Present Value |
NS | Name Server |
NS | Neighbor Solicitation |
NS/EP | National Security & Emergency Preparedness |
NSA | National Security Agency |
NSA/CSS | National Security Agency/Central Security Service |
NSAPI | Netscape Server Application Programming Interface |
NSAPI | Network Service Access Point Identifier |
NSC | National Security Council |
NSD | National Security Directive |
NSEC | Next Secure |
NSI | National Security Information |
NSIRC | National Security Incident Response Center |
NSOC | National Security Operations Center |
NSP | Network Service Provider |
NSRL | National Software Reference Library |
NSS | National Security System |
NSS | Network Security Services |
NSTAC | National Security Telecommunication Advisory Committee |
NSTB | National SCADA Test Bed |
NSTISSAM | National Security Telecommunications & Information Systems Security Advisory Memorandum |
NSTISSC | National Security Telecommunications & Information Systems Security Committee |
NSTISSD | National Security Telecommunications & Information Systems Security Directive |
NSTISSI | National Security Telecommunications & Information Systems Security Instruction |
NSTISSP | National Security Telecommunications & Information Systems Security Policy |
NSU | Non Standard Usage |
NTFS | New Technology File System |
NTISSC | National Telecommunications & Information Systems Security Committee |
NTLM | NT LAN Manager |
NTP | Network Time Protocol |
NTTAA | National Technology Transfer & Advancement Act of 1995 |
NUD | Neighbor Unreachability Detection |
NVD | National Vulnerability Database |
NVLAP | National Voluntary Laboratory Accreditation Program |
NVRAM | Non Volatile Random Access Memory |
NW3C | National White Collar Crime Center |
NX | No Execute |
OASD | Office of The Assistant Secretary of Defense |
OASIS | Organization For The Advancement of Structured Information Standards |
OAuth | Open Authorization |
OAuth2 | Open Authorization Version 2 |
OBIEE | Oracle Business Intelligence Enterprise Edition |
OCC | Office of The Comptroller of The Currency |
OCIL | Open Checklist Interactive Language |
OCIO | Office of The Chief Information Officer |
OCO | offensive Cyberspace Operations |
OCR | Office For Civil Rights |
OCSP | Online Certificate Status Protocol |
OCTAVE | Operationally Critical Threat Asset & Vulnerability Evaluation |
ODBC | Open Database Connectivity |
ODCI | Office of The Director of Central Intelligence |
ODF | Open Document Format |
ODNI | Office of The Director of National Intelligence |
OECD | Organisation For Economic Co Operation & Development |
OEM | Original Equipment Manufacturer |
OEP | Occupant Emergency Plan |
OFB | Output Feedback |
OFDM | Orthogonal Frequency Division Multiplexing |
OGSA | Open Grid Services Architecture |
OHA | Open Handset Alliance |
OIDC | OpenID Connect |
OIG | Office of Inspector General |
OIG DoD | Office of The Inspector General of The Department of Defense |
OIS | Office Information System |
OLA | Operational Level Agreement |
OLAP | Online Analytical Processing |
OLE | Object Linking & Embedding |
OLTP | Online Transaction Processing |
OMB | Office of Management & Budget |
ONC | Office of The National Coordinator |
ONF | Organization Normative Framework |
ONS | Object Naming Service |
OOB | Out of Band |
OOP | Object Oriented Programming |
OPC | Ole For Process Control |
OpenPGP | An Open Specification For Pretty Good Privacy |
OPEX | Operational Expenditure |
OPM | U.S. Office of Personnel Management |
OPSEC | Operational Security |
ORA | Organization Registration Authority |
ORB | Open Relay Blacklist |
ORD | Operational Requirements Document |
ORNL | Oak Ridge National Laboratory |
OS | Operating System |
OSA | Open Security Architecture |
OSCI | OS Command Injection |
OSD | Object Based Storage Device |
OSD | Office of The Secretary of Defense |
OSD/JS | Office of The Secretary of Defense/Joint Staff |
OSHA | Occupational Safety & Health Administration |
OSI | Open System Interconnection |
OSINT | Open Source Intelligence |
OSP | Organizational Security Policies |
OSPF | Open Shortest Path First |
OSS | Open Source Software |
OSSTMM | Open Source Security Testing Methodology Manual |
OSVDB | Open Source Vulnerability Database |
OT&E | Operational Test & Evaluation |
OTA | Over The Air |
OTP | One Time Password |
OTT | Over The Top |
OU | Organizational Unit |
OUSD (P) | Office of The Under Secretary of Defense (Policy) |
OVAL | Open Vulnerability & Assessment Language |
OWASP | Open Web Application Security Project |
OWL-S | Web Ontology Language For Services |
P2P | Peer To Peer |
P2PE | Point To Point Encryption |
P2V | Physical To Virtual |
PaaS | Platform As A Service |
PAC | Privilege Attribute Certificate |
PAC | Protected Access Credential |
PACS | Physical Access Control Systems |
PACS | Picture Archiving & Communication System |
PAD | Packet Assembler Disassembler |
PAD | Peer Authorization Database |
PA-DSS | Payment Application Data Security Standard |
PAM | Pluggable Authentication Module |
PAM | Privileged Access Management |
PAN | Personal Area Network |
PAN | Primary Account Number |
PAO | Principal Authorizing official |
PAOS | Reverse HTTP Binding For Soap |
PAP | Password Authentication Protocol |
PAP | Policy Access Point |
PAS | Publicly Available Specification |
PASTA | Process For Attack Simulation & Threat Analysis |
PAT | Port Address Translation |
P-ATO | Provisional Authorization To Operate |
PBA | Pre Boot Authentication |
PBAC | Policy Based Access Control |
PBC | Prepared By Client |
PBCC | Packet Binary Convolution Code |
PBE | Pre Boot Environment |
PBKDF1 | Password Based Key Derivation Function 1 |
PBKDF2 | Password Based Key Derivation Function 2 |
PBN | Private Blog Network |
PBX | Private Branch Exchange |
PC | Personal Computer |
PCB | Printed Circuit Board |
PCC | Proof Carrying Code |
PCCIP | President’s Commission On Critical Infrastructure Protection |
PCI | Payment Card Industry |
PCI | Personal Identity Verification Card Issuer |
PCI DSS | Payment Card Industry Data Security Standard |
PCI PA DSS | Payment Card Industry Payment Application Data Security Standard |
PCI-SCC | Payment Card Industry Security Standards Council |
PCI-X | Peripheral Component Interconnect Extended |
PCMCIA | Personal Computer Memory Card International Association |
PCN | Process Control Network |
PCP | Payload Compression Protocol |
PCS | Process Control System |
PCSF | Process Control System Forum |
PCSRF | Process Control Security Requirements Forum |
PDA | Personal Digital Assistant |
PDD | Presidential Decision Directive |
Portable Document Format | |
PDI | Physical Device Identifiers |
PDM | Precedence Diagramming Method |
PDP | Packet Data Protocol |
PDP | Policy Decision Point |
PDS | Practice Dangerous To Security |
PDS | Protected Distribution System |
PDS | Public Domain Software |
PDU | Power Distribution Units |
PDU | Protocol Data Unit |
PEAP | Protected Extensible Authentication Protocol |
PED | Pin Entry Devices |
PED | Portable Electronic Device |
PEM | Privacy Enhanced Mail |
PEM | Program Element Monitor |
PEP | Policy Enforcement Point |
PERT | Program Evaluation & Review Technique |
PFS | Perfect Forward Secrecy |
PGP | Pretty Good Privacy |
PHI | Protected Health Information |
PHOTINT | Photographic Intelligence |
PHP | Hypertext Preprocessor |
PHPCI | PHP Command Injection |
PHR | Personal Health Record |
PHY | Physical |
PI | Police Intelligence |
PI | Preliminary Inquiry |
PIA | Privacy Impact Assessment |
PICS | Platform For Internet Content Selection |
PID | Personnel Identification Data |
PII | Personally Identifiable Information |
PIM | Personal Information Management |
PIM-SM | Protocol Independent Multicast—Sparse Mode |
PIN | Personal Identification Number |
PIP | Policy Information Point |
PIPEDA | Personal Information Protection & Electronic Documents Act |
PIR | Passive Infrared Sensor |
PIR | Public Interest Registry |
PIT | Platform Information Technology |
PIV | Personal Identity Verification |
PIX | Proprietary Application Identifier Extension |
PKC | Public Key Cryptography |
PKCS | Public Key Cryptography Standard |
PKI | Public Key Infrastructure |
PKM | Privacy Key Management |
PKMv1 | Privacy Key Management Protocol Version 1 |
PKMv2 | Privacy Key Management Protocol Version 2 |
PL | Public Law |
PLC | Programmable Logic Controller |
PM | Private Message |
PM | Program Manager |
PM | Project Manager |
PM/SM | Program Manager/System Manager |
PMA | Policy Management Authority |
PMBOK | Project Management Body of Knowledge |
PMK | Pairwise Master Key |
PMKSA | Pairwise Master Key Security Association |
PMO | Program Management Office |
PMP | Point To Multipoint |
PMP | Program Management Plan |
PMTU | Path Maximum Transmission Unit |
PMU | Power Management Unit |
PN | Packet Number |
PNG | Portable Network Graphics |
POA&M | Plan of Action & Milestones |
POC | Point of Contact |
POC | Proof of Concept |
PoE | Power Over Ethernet |
POM | Program Objective Memorandum |
PON | Passive Optical Network |
POODLE | Padding Oracle On Downgraded Legacy Encryption |
POP | Post Office Protocol |
POP | Point of Presence |
POP3 | Post Office Protocol Version 3 |
POS | Point of Sale |
POS | Point of Service |
POSIX | Portable Operating System Interface |
POST | Power On Self Test |
PoT | Proof of Technology |
POTS | Plain Old Telephone Service |
PP | Protection Profile |
PPACA | Patient Protection & Affordable Care Act |
PPC | Pay Per Click |
PPGA | Plastic Pin Grid Array |
PPP | Point To Point Protocol |
PPP | Program Protection Plan |
PPS | Internet Protocol Suite & Associated Ports |
PPSM | Ports Protocols & Services Management |
PPTP | Point To Point Tunneling Protocol |
PPVPN | Provisioner Provided Virtual Private Network |
PQQ | Pre Qualification Questionnaire |
PR | Pagerank |
PRA | Paperwork Reduction Act |
PRAM | Parameter Random Access Memory |
Pre-PAK | Pre Primary Authorization Key |
PRF | Pseudorandom Function |
PRISMA | Program Review For Information |
PRNG | Pseudo Random Number Generator |
PRNU | Photo Response Non Uniformity |
PROM | Programmable Read Only Memory |
PROPIN | Proprietary Information |
PS | Physical Security |
PSE | Packet Switching Exchange |
PSK | Pre Shared Key |
PSTN | Public Switched Telephone Network |
PSU | Power Supply Unit |
PT | Path Traversal |
PTA | Privacy Threshold Analysis |
PTK | Pairwise Transient Key |
PTP | Packet Transfer Protocol |
PTT | Push To Talk |
PTV | Perceived Target Value |
PUB | Publication |
PUE | Power Usage Effectiveness |
PUK | Personal Unlocking Key |
PUM | Potentially Unwanted Modification |
PV | Paravirtualization |
PVC | Permanent Virtual Circuit |
PVG | Patch & Vulnerability Group |
PXE | Preboot Execution Environment |
QA | Quality Assurance |
QBE | Query By Example |
QDD | Query Deserves Diversity |
QDF | Query Deserves Freshness |
QEMU | Quick Emulator |
QoP | Quality of Protection |
QoS | Quality of Service |
QR code | Quick Response Code |
QRA | Quantitative Risk Analysis |
QSA | Qualified Security Assessor |
QUIC | Quick UDP Internet Connections |
R&D | Research & Development |
R/W | Read/Write |
RA | Receiver Address |
RA | Registration Authority |
RA | Remote Assistance |
RA | Router Advertisement |
RACF | Resource Access Control Facility |
RACI | Responsible Accountable Consulted & Informed |
RAD | Rapid Application Development |
RAdAC | Risk Adaptive Access Control |
RADIUS | Remote Authentication Dial In User Service |
RAID | Redundant Array of Independent Disks |
RAM | Random Access Memory |
RAN | Radio Access Network |
RAR | Risk Assessment Report |
RARP | Reverse Address Resolution Protocol |
RAS | Remote Access Services |
RASP | Runtime Application Self Protection |
RAT | Remote Access Tools |
RAT | Remote Administration Tool |
RBAC | Role Based Access Control |
RBD | Reliability Block Diagrams |
RBIA | Risk Based Internal Audit |
RC2 | Rivest Cipher 2 |
RC4 | Rivest Cipher 4 |
RC5 | Rivest Cipher 5 |
RCA | Root Cause Analysis |
RCE | Remote Code Execution |
RCE | Route Cache Entry |
RCERTs | Regional Computer Emergency Response Teams |
RCFL | Regional Computer Forensics Laboratory |
RCM | Responsibility Center Management |
RCP | Remote Copy Protocol |
RD | Restricted Data |
RDBMS | Relational Database Management System |
RDF | Resource Description Framework |
RDP | Remote Desktop Protocol |
RDRAM | RAMBUS Dynamic Random Access Memory |
RDSMS | Relational Data Stream Management System |
RDT&E | Research Development Test & Evaluation |
REL | Rights Expression Language |
REP | Robots Exclusion Protocol |
REST | Representational State Transfer |
RF | Radio Frequency |
RF | Random Forest |
RFC | Request For Comments |
RFD | Route Flap Damping |
RFI | Radio Frequency Interference |
RFI | Remote File Inclusion |
RFI | Representative of A Foreign Interest |
RFI | Request For Information |
RFID | Radio Frequency Identification |
RFP | Request For Proposal |
RFU | Reserved For Future Use |
RIA | Rich Internet Application |
RIB | Routing Information Base |
RID | Real Time Inter Network Defense |
RID | Registered Application Provider Identifier |
RII | Relevant Information & Intelligence |
RIP | Routing Information Protocol |
RIPE | Ncc Réseaux Ip Européens Network Coordination Centre |
RIPEMD-160 | Race Integrity Primitives Evaluation Message Digest 160 |
RIPng | Routing Information Protocol Next Generation |
RIR | Regional Internet Registries |
RIS | Remote Installation Services |
RISC | Reduced Instruction Set Computer |
RL | Reinforcement Learning |
RMA | Reliability |
RMA | Return Material Authorization |
RMF | Risk Management Framework |
RMON | Remote Monitoring |
RNG | Random Number Generator |
RNN | Recurrent Neural Network |
ROE | Rules of Engagement |
ROI | Return On Investment |
ROM | Read Only Memory |
ROSC | Regional Operations & Security Center |
ROSI | Return On Security Investment |
RP | Relying Party |
RP | Responsible Person |
RPA | Robotic Process Automation |
RPC | Remote Procedure Call |
RPF | Reverse Path Forwarding |
RPO | Recovery Point Objective |
RR | Resource Record |
RRS | Reduced Redundancy Storage |
RRSIG | Resource Record Signature |
RS | Relay Station |
RS | Router Solicitation |
RSA | Rivest Shamir Adelman |
RSBAC | Rule Set Based Access Control |
RSN | Robust Security Network |
RSNA | Robust Security Network Association |
RSNIE | Robust Security Network Information Element |
RSO | Reduced Sign On |
RSS | Really Simple Syndication |
RSSI | Received Signal Strength Indication |
RSVP | Resource Reservation Protocol |
RT&E | Research Test & Evaluation |
RTCP | Real Time Transport Control Protocol |
RTE | Runtime Environment |
RTF | Rich Text Format |
RTLS | Real Time Location System |
RTM | Requirements Traceability Matrix |
RTO | Recovery Time Objective |
RTP | Real Time Transport Protocol |
RTSP | Real Time Streaming Protocol |
RTT | Radio Transmission Technology |
RTU | Remote Terminal Unit |
RTU | Remote Telemetry Unit |
RuBAC | Rule Based Access Control |
R-UIM | Removable User Identity Module |
RUM | Real User Measurement |
RUM | Real User Monitoring |
RUP | Rational Unified Process |
SASE | Secure Access Service Edge |
S | Secret |
S&T | Science & Technology |
S/MIME | Secure / Multipurpose Internet Mail Extensions |
S2 | Intelligence Officer U.S. Army |
S3 | Simple Storage System |
S3 IA | S3 Infrequent Access |
SA | Security Association |
SA | Source Address |
SA | System Administrator |
SaaS | Software As A Service |
SABI | Secret & Below Interoperability |
SABI WG | Secret & Below Interoperability Working Group |
SABSA | Sherwood Applied Business Security Architecture |
SACL | System Access Control List |
SACS | Security Access Control Systems |
SAD | Security Association Database |
SAES | Security Awareness & Education |
SAFECode | Software Assurance Forum For Excellence In Code |
SAFER | Secure & Fast Encryption Routine |
SAID | Security Association Identifier |
SAISO | Senior Agency Information Security Officer |
SAL | Security Assurance Level |
SAM | Secure Application Module |
SAM | Security Account Manager |
SAM | Software Asset Management |
SAMATE | Software Assurance Metrics & Tool Evaluation |
SAML | Security Assertion Markup Language |
SAMM | Software Assurance Maturity Model |
SAN | Storage Area Network |
SANS | System Administration Networking & Security Institute |
SAP | Security Assessment Plan |
SAP | Special Access Program |
SAPCO | Sap Central Office |
SAQ | Self Assessment Questionnaire |
SAR | Security Assessment Report |
SAR | Special Access Required |
SAS | Statement On Auditing Standards |
SASL | Simple Authentication & Security Layer |
SAST | Static Analysis Security Testing |
SAST | Static Application Security Testing |
SATA | Serial Advanced Technology Attachment |
SATAN | Systems Administrators’ Tool For Assessing Networks |
SBB | Solution Building Blocks |
SBC | Session Border Controller |
S-BGP | Secure Border Gateway Protocol |
SBU | Sensitive But Unclassified |
SC | Subcommittee |
SC | Supplementary Content |
SCA | Security Control Assessment / Or Security Control Assessor |
SCA | Security Control Assessor |
SCA | Software Composition Analysis |
SCA | Stored Communications Act |
SCADA | Supervisory Control & Data Acquisition |
SCAO | SIPRNET Connection Approval Office |
SCAP | Security Content Automation Protocol |
SCCM | System Center Configuration Manager |
SCCP | Skinny Client Control Protocol |
SCCVI | Secure Configuration Compliance Validation Initiative |
SCD | Source Code Disclosure |
SCE | Service Cryptologic Element |
SCG | Security Classification Guide |
SCG | Security Configuration Guide |
SCI | Sensitive Compartmented Information |
SCIF | Sensitive Compartmented Information Facility |
SCIM | System For Cross Domain Identity Management |
SCM | Search Content Marketing |
SCM | Software Configuration Management |
SCM | Supply Chain Management |
SCP | Secure Copy Protocol |
SCRI | Secure Compliance Remediation Initiative |
SCRM | Supply Chain Risk Management |
SCSI | Small Computer System Interface |
SCTP | Stream Control Transmission Protocol |
SD | Secure Digital |
SDA | Static Data Authentication |
SDD | System Design Description |
SDDC | Software Defined Data Center |
SDIO | Secure Digital Input Output |
SDK | Software Development Kit |
SDL | Security Development Lifecycle |
SDLC | Software Development Life Cycle |
SDLC | Synchronous Data Link Control |
SDLC | System Development Life Cycle |
SDN | Software Defined Network |
SDO | Standards Development Organization |
SDP | Service Discovery Protocol |
SDP | Session Description Protocol |
SDP | Software Defined Perimeter |
SDS | Software Defined Storage |
SDSL | Symmetric Digital Subscriber Line |
SD-WAN | Software Defined WAN |
SE | Social Engineering |
SE | Systems Engineer |
SEA | Search Engine Advertising |
SECaaS | Security As A Service |
SECDEF | Secretary of Defense |
SED | Self Encrypting Drive |
SEI | Software Engineering Institute |
SELC | Systems Engineering Life Cycle |
SEM | Search Engine Marketing |
SEM | Security Event Management |
SEMP | System Engineering Management Plan |
SEMS | Security Event Management System |
SEND | Secure Neighbor Discovery |
SEO | Search Engine Optimization |
SEP | Secure Entry Point |
SEP | Systems Engineering Plan |
SERM | Search Engine Reputation Management |
SERP | Search Engine Results Page |
SES | Amazon Simple Email System |
SET | Secure Electronic Transaction |
SET | Secure Encrypted Transaction |
SEV | Secure Encrypted Virtualization |
SF | Session Fixation |
SFA | Single Factor Authentication |
SFTP | Secure File Transfer Protocol |
SFTP | SSH File Transfer Protocol |
SGML | Standard Generalized Markup Language |
SGSN | Serving GPRS Support Node |
SGX | Software Guard Extensions |
SHA | Secure Hash Algorithm |
SHA-1 | Secure Hash Algorithm 1 |
SHA-2 | Secure Hash Algorithm 2 |
SHA-256 | Secure Hash Algorithm 256 |
shim6 | Site Multihoming By Ipv6 Intermediation |
SHS | Secure Hash Standard |
S-HTTP | Secure Hypertext Transfer Protocol |
SIA | Security Industry Association |
SIA | System Interconnection Agreement |
SIAO | Senior Information Assurance Officer |
SIC | System Identification Code |
SID | Security Identifier |
SIEM | Security Information & Event Management |
SIG | Special Interest Group |
SII | Suitability/Security Investigation Index |
SIIT | Stateless IP/ICMP Translation Algorithm |
SIL | Safety Integrity Level |
SIM | Security Information Management |
SIM | Subscriber Identity Module |
SIO | Senior Intelligence Officer |
SIO | Special Information Operations |
SIP | Session Initiation Protocol |
SIPRNet | Secret Internet Protocol Router Network |
SIS | Safety Instrumented System |
SISO | Senior Information Security Officer |
SISR | Signals Intelligence Security Regulation |
SIT | System Integration Testing |
SITR | Secret Internet Protocol Router Network Information Technology Registry |
SKE | Security Key Exchange |
SKEME | Secure Key Exchange Mechanism |
SKid | Script Kiddie |
SKIP | Simple Key– Management For Internet Protocol |
SKPP | Separation Kernel Protection Profiles |
SLA | Service Level Agreement |
SLE | Single Loss Expectancy |
SLI | Scalable Link Interface |
SLIP | Serial Line Internet Protocol |
SLO | Service Level Objective |
SLR | Service Level Requirement |
SM | Social Media |
SM | System Manager |
SMART | Self Monitoring Analysis & Reporting Technology |
SMB | Server Message Block |
SME | Subject Matter Expert |
SMI | Security Management Interface |
SMM | Social Media Marketing |
SMO | Social Media Optimization |
SMP | Social Media Platform |
SMS | Short Message Service |
SMS | Systems Management Server |
SMTP | Simple Mail Transfer Protocol |
SNA | Systems Network Architecture |
SNAP | Systems/Networks Approval Process |
SNL | Sandia National Laboratories |
SNMP | Simple Network Management Protocol |
SNOMED CT | Systematized Nomenclature of Medicine Clinical Terms |
SNS | Simple Notification Service |
SNTP | Simple Network Time Protocol |
SOA | Service Oriented Architecture |
SOA | Start of Authority |
SOAP | Simple Object Access Protocol |
soBGP | Secure Origin Border Gateway Protocol |
SOC | Security Operations Center |
SOC | Service Organization Control |
SoC | System On A Chip |
SOCKS | Socket Secure |
SoD | Segregation of Duties |
SoD | Separation of Duties |
SOHO | Small Office / Home Office |
SOMAP | Security Officers Management & Analysis Project |
SOMF | Service Oriented Modeling Framework |
SONET | Synchronous Optical Networking |
SOO | Statement of Objectives |
SOP | Standard Operating Procedure |
SOR | System of Records |
SORN | System of Records Notice |
SOS | System of Systems |
SOW | Statement of Work |
SOX | Sarbanes Oxley |
SP | Security Plan |
SP | Service Pack |
SP | Special Publication |
SPA | Simple Power Analysis |
SPAN | Switched Port Analyzer |
SPAP | Shiva Password Authentication Protocol |
SPB | Security Policy Board |
SPD | Security Policy Database |
SPF | Sender Policy Framework |
SPI | Schedule Performance Index |
SPI | Security Parameter Index |
SPI | Sensitive Personal Information |
SPI | Stateful Packet Inspection |
SPL | Structured Product Labeling |
SPML | Service Provisioning Markup Language |
SPNEGO | Simple & Protected GSSAPI Negotiation Mechanism |
SPOF | Single Point of Failure |
SPP-ICS | System Protection Profile For Industrial Control Systems |
SPX | Sequenced Packet Exchange |
SQL | Structured Query Language |
SQLi | SQL Injection |
SQS | Simple Queue Service |
SQUARE | Security Quality Requirements Engineering |
SR | Service Release |
SR | Speech Recognition |
SRAM | Static Random Access Memory |
SRE | Site Reliability Engineering |
SRES | Signed Response |
SRG | Security Requirements Guide |
sRGB | Standard Red Green Blue |
SRS | Software Requirements Specification |
SRTM | Security Requirements Traceability Matrix |
SRTP | Secure Real Time Transport Protocol |
SS | Subscriber Station |
SS7 | Signaling System #7 |
SSAA | Systems Security Authorization Agreement |
SSAE 16 | Statement On Standards For Attestation Engagements 16 |
SSD | Solid State Drive |
SSDC | Space & Strategic Defense Command |
SSDP | Simple Service Discovery Protocol |
SSE | Server Side Encryption |
SSE | System Security Engineering |
SSE-CMM | Systems Security Engineering Capability Maturity Model |
SSEM | System Security Engineering |
SSH | Secure Shell |
SSI | Server Side Includes |
SSID | Service Set Identifier |
SSII | Suitability/Security Investigations Index |
SSL | Secure Socket Layer |
SSL | Secure Sockets Layer |
SSL VPN | Secure Sockets Layer Virtual Private Network |
SSLF | Specialized Security Limited Functionality |
SSM | Site Security Manager |
SSM | System Security Manager |
SSMP | System Security Management Plan |
SSN | Social Security Number |
SSO | Single Sign On |
SSoD | Static Separation of Duty |
SSP | Secure Simple Pairing |
SSP | System Security Plan |
SSPI | Security Support Provider Interface |
SSRF | Server Side Request Forgery |
SSTP | Secure Socket Tunneling Protocol |
ST | Security Target |
ST&E | Security Test & Evaluation |
STA | Station |
STaaS | Storage As A Service |
STAC | Student Technology Advisory Committee |
STAR | Security Trust & Assurance Registry |
STIG | Security Technical Implementation Guide |
STIGs | Security Technical Implementation Guides |
STIX | Structured Threat Information Expression |
STP | Security Test Plan |
STP | Spanning Tree Protocol |
STRIDE | Spoofing Tampering Repudiation Information Disclosure Denial of Service Elevation of Privilege |
STS | Security Token Service |
SUID | Set User Id |
SVG | Scalable Vector Graphics |
SVM | Support Vector Machine |
SWEBOK | Software Engineering Body of Knowledge |
SWGDE | Scientific Working Group On Digital Evidence |
SWS | Simple Workflow Service |
SWSA | Semantic Web Services Initiative Architecture |
SYN | Synchronization |
SZ | Security Zone |
T&E | Test & Evaluation |
TA | Test Assertion |
TA | Transmitter Address |
TaaS | Testing As A Service |
TAC | Terminal Action Code |
TACACS | Terminal Access Controller Access Control System |
TACACS+ | Terminal Access Controller Access Control System Plus |
TADR | Threat Agent Detection & Response |
TAG | Technical Advisory Group |
TAP | Terminal Access Point |
TARA | Threat Assessment & Remediation Analysis |
TB | Terabyte |
TC | Technical Committee |
TC | Transaction Certificate |
TC68 | ISO/IEC Technical Committee 68 |
TCB | Trusted Computing Base |
TCO | Total Cost of Ownership |
TCP | Transmission Control Protocol |
TCP/IP | Transmission Control Protocol/Internet Protocol |
TCSEC | Trusted Computer System Evaluation Criteria |
TCSEC / ITSEC | Trusted Computer System Evaluation Criteria / Information Technology Security Evaluation Criteria |
TDE | Transparent Data Encryption |
TDEA | Triple Data Encryption Algorithm |
TDM | Time Division Multiplexing |
TDMA | Time Division Multiple Access |
TDS | Tabular Data Stream |
TEID | Tunnel Endpoint Identifier (GTPv1) |
TEK | Traffic Encryption Key |
TEMP | Test & Evaluation Master Plan |
TERENA | Trans European Research & Education Networking Association |
TFN | Tribe Flood Network |
TFT | Thin Film Transistor |
TFTP | Trivial File Transfer Protocol |
TGS | Ticket Granting Service |
TGT | Ticket Granting Ticket |
THREATCON | Threat Condition |
TIA | Telecommunications Industry Association |
TIARA | Tactical Intelligence & Related Activities |
TID | Tag Identifier |
TID | Tamper Indicating Device |
TID | Tunnel Identifier (GTPv0) |
TIFF | Tagged Image File Format |
TIMS | Treaty Information Management System |
TIP | Technology Innovation Program |
TISS | Telecommunications & Automated Information Systems Security |
TK | Temporal Key |
TKIP | Temporal Key Integrity Protocol |
TLD | Top Level Domain |
TLS | Transport Layer Security |
TMO | Technology Management Office |
TMOVS | Modes of Operation Validation System For The Triple DES Algorithm |
TOC / TOU | Time of Check / Time of Use |
ToD | Time of Day |
TOE | Target of Evaluation |
TOGAF | The Open Group Architecture Framework |
Tor | The Onion Router |
ToS | Terms of Service |
TOS | Trusted Operating System |
ToS | Type of Service |
TPA | Third Party Administrator |
TPC | Transmission Power Control |
TPM | Technical Performance Measurement |
TPM | Trusted Platform Module |
TPS | Transaction Per Second |
TPS | Transaction Processing System |
TPU | Tensor Processing Unit |
TR | Technical Report |
TRANSEC | Transmission Security |
TRMC | Test Resource Management Center |
TRT | Transport Relay Translator |
TS | Technical Specification |
TSA | Time Stamping Authority |
TSC | TKIP Sequence Counter |
TSIG | Secret Key Transaction Authentication For DNS |
TSIG | Transaction Signature |
TSN | Transitional Security Network |
TSN | Trusted Systems & Networks |
TSP | Time Stamp Protocol |
TT&E | Test |
TTF | Tag Talks First |
TTF | TrueType Font |
TTL | Time To Live |
TTLS | Tunneled Transport Layer Security |
TTP | Tactics Techniques & Procedures |
TTP | Trusted Third Party |
TTY | Teletype |
TVR | Terminal Verification Results |
TWAIN | Toolkit Without An Informative Name |
TXT | Text |
U | Unclassified |
U.S. | United States |
U.S.C. | United States Code |
UA | Universal Analytics |
UAA | Uncontrolled Access Area |
UAC | User Account Control |
UART | Universal Asynchronous Receiver/Transmitter |
UAT | User Acceptance Testing |
UBA / UEBA | User Behavior Analytics |
UBR | Universal Description |
UC | Unified Capabilities |
UC | Unified Communications |
UCAO | Unclassified Connection Approval Office |
UCC | Uniform Code Council |
UCDMO | Unified Cross Domain Management Office |
UCE | Unsolicited Commercial Email |
UCMJ | Uniform Code of Military Justice |
UCNI | Unclassified Controlled Nuclear Information |
UD | Unauthorized Disclosure |
UDDI | Universal Description Discovery & Integration |
UDF | Universal Disk Format |
UDID | Unique Device Identifier |
UDP | User Datagram Protocol |
UEFI | Unified Extensible Firmware Interface |
UFS | Unix File System |
UHF | Ultra High Frequency |
UI | User Interface |
UI/UX | User Interface/User Experience |
UICC | Universal Integrated Circuit Card |
UK | United Kingdom |
UL | Underwriters’ Laboratories |
ULA | Unique Local Address |
ULP | Upper Layer Protocol |
UML | Unified Modeling Language |
UMLS | Unified Medical Language System |
UMPC | Ultra Mobile Personal Computer |
UMTS | Universal Mobile Telecommunications System |
UNC | Universal Naming Convention |
UNII | Unlicensed National Information Infrastructure |
UPC | Universal Product Code |
UPN | User Principal Name |
UPnP | Universal Plug & Play |
UPS | Uninterruptible Power Supply |
UR | User Representative |
URI | Uniform Resource Identifier |
URL | Uniform Resource Locator |
URLLC | Ultra Reliable & Low Latency Communications |
US | United States |
USACIDU | United States Army Criminal Investigation Command |
USAF | United States Air Force |
USB | Universal Serial Bus |
US-CERT | United States Computer Emergency Readiness Team |
USD (AT&L) | Under Secretary of Defense For Acquisition Technology & Logistics |
USD (I) | Under Secretary of Defense For Intelligence |
USD (P&R) | Under Secretary of Defense For Personnel & Readiness |
USD (P) | Under Secretary of Defense For Policy |
USIM | Universal Subscriber Identity Module |
USPS | United States Postal Service |
USSAN | United States Security Authority/North Atlantic Treaty Organization (Nato) |
USSID | United States Signals Intelligence Directive |
USSTRATCOM | United States Strategic Command |
UTC | Coordinated Universal Time |
UTF | Unicode Transformation Format |
UTM | Unified Threat Management |
UUCP | Unix To Unix Copy Protocol |
UUID | Universally Unique Identifier |
UWB | Ultrawideband |
V2I | Vehicle To Infrastructure |
V2N | Vehicle To Network |
V2P | Vehicle To Passenger |
V2R | Vehicle To Roadway |
V2V | Vehicle To Vehicle |
V2X | Vehicle To Everything |
VAAP | Vulnerability & Assessment Program |
VAN | Value Added Network |
VAS | Vulnerability Assessment System |
VB | Visual Basic |
VB.NET | Visual Basic .Net |
VBA | Visual Basic For Applications |
VBS | Visual Basic Script |
VCI | Virtual Channel Identifier |
vCPE | Virtualized Customer Premises Equipment |
VCS | Veritas Cluster Server |
VCS | Version Control Systems |
VDC | Virtual Data Center |
VDI | Virtual Desktop Infrastructure |
VDU | Visual Display Unit |
VFAT | Virtual File Allocation Table |
VFD | Variable Frequency Drive |
VG | Volume Group |
VGA | Video Graphics Array |
VHD | Virtual Hard Drive |
VHF | Very High Frequency |
VIN | Vehicle Identification Number |
VIP | Virtual IP Address |
VLAN | Virtual Local Area Network |
VLB | VESA Local Bus |
VM | Virtual Machine |
VMS | Voice Mail Service |
VMS | Vulnerability Management System |
VNC | Virtual Network Computing |
VNIC | Virtual Network Interface Card |
VoIP | Voice Over Internet Protocol |
VOIPSA | Voice Over IP Security Alliance |
VPC | Virtual Private Cloud |
VPDN | Virtual Private Dial Up Network |
VPG | Virtual Private Gateway |
VPI | Virtual Path Identifier |
VPN | Virtual Private Network |
VPNC | Virtual Private Network Consortium |
VPS | Virtual Private Server |
VRRP | Virtual Router Redundancy Protocol |
VSM | Virtual Supervisor Module |
VTL | Virtual Tape Library |
VXLAN | Virtual Extensible Local Area Network |
W3C | World Wide Web Consortium |
WAF | Web Application Firewall |
WAIS | Wide Area Information Server |
WAMP | Windows Apache MySQL and PHP |
WAN | Wide Area Network |
WAP | Web Application Protection |
WAP | Wireless Access Point |
WAP | Wireless Access Protocol |
WAP | Wireless Application Protocol |
WaSP | Web Standards Project |
WAVE | Wireless Access For Vehicular Environment |
WAYF | Where Are You From |
WBS | Work Breakdown Structure |
WCCP | Web Cache Coordination Protocol |
W-CDMA | Wideband Code Division Multiple Access |
WDDM | Windows Display Driver Model |
WDS | Wireless Distribution System |
WebDAV | Web Distributed Authoring & Versioning |
WEP | Wired Equivalent Privacy |
WfMC | Workflow Management Coalition |
WfMS | Workflow Management System |
WG | Working Group |
WHO | World Health Organization |
WiDEN | Wideband Integrated Digital Enhanced Network |
WIDPS | Wireless Intrusion Detection & Prevention System |
WiMAX | Worldwide Interoperability For Microwave Access |
WIMP | Windows Icons Menus Pointer |
WINS | Windows Internet Name Service |
WIPO | World Intellectual Property Organization |
WLAN | Wireless Local Area Network |
WMA | Warfighting Mission Area |
WMAN | Wireless Metropolitan Area Network |
WMI | Windows Management Instrumentation |
WML | Wired Markup Language |
WMM | WiFi Multimedia |
WORM | Write Once Read Many |
WP | Wordpress |
WPA | WiFi Protected Access |
WPA2 | WiFi Protected Access 2 |
WPAN | Wireless Personal Area Network |
WRT | Work Recovery Time |
WS | Web Services |
WS- | Web Services Authorization |
WSDL | Web Services Definition Language |
WSH | Windows Script Host |
WS-I | Web Services Interoperability |
WS-Policy | Web Services Policy |
WS-Privacy | Web Services Privacy |
WSS4J | Web Services Security For Java |
WS-Secure Conversation | Web Services Secure Conversation |
WS-Security | Web Services Security |
WS-Trust | Web Services Trust |
WSUS | Windows Server Update Services |
WTLS | Wireless Transport Layer Security |
WTO | World Trade Organization |
WVE | Wireless Vulnerabilities & Exploits |
WWAN | Wireless Wide Area Network |
WWN | World Wide Name |
WWW | World Wide Web |
WYSIWYG | What You See Is What You Get |
XaaS | Anything As A Service |
XACL | XML Access Control Language |
XACML | Extensible Access Control Markup Language |
XAML | Extensible Application Markup Language |
XCBC | Xor Cipher Block Chaining |
XCCDF | Extensible Configuration Checklist Description Format |
XDR | External Data Representation |
XHTML | Extensible Hypertext Markup Language |
XKMS | XML Key Management Specification |
XLC | Expedited Life Cycle |
XML | Extensible Markup Language |
XMP | Extensible Metadata Platform |
XMPP | Extensible Messaging & Presence Protocol |
XOR | Exclusive Or |
XPathI | XPath Injection |
XrML | Extensible Rights Markup Language |
XSD | XML Schema Definition |
XSL | Extensible Stylesheet Language |
XSLT | Extensible Stylesheet Language Transformation |
XSS | Cross Site Scripting |
YAML | YAML Ain’t Markup Language |
ZIF | Zero Insertion Force |
ZMOT | Zero Moment of Truth |
ZSK | Zone Signing Key |