Digital transformation through effective cybersecurity
  • Digital Transformation
  • Corporate Cybersecurity
  • Security / IT Primer
  • Advisory Services
  • Contact

Glossary of Acronyms

 

There are 10 kinds of people in the world -

Those who understand binary, and those who don't.


Glossary Search

Type an acronym/word/phrase above and press Enter to search the page. Press Enter again to jump to next search result.

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Acronym Term
(ISC)² International Information Systems Security Certification Consortium
1xRTT One Times Radio Transmission Technology
2FA/TFA Two Factor Authentication
3DES Triple Data Encryption Algorithm
3DES Triple Data Encryption Standard
3FA Three Factor Authentication
3G 3rd Generation
3GPP 3rd Generation Partnership Project
3GPP2 3rd Generation Partnership Project 2
3PAO Third Party Assessor Organization
4D QL 4D Query Language
4FA, Four Factor Authentication
A Address Resource Record Type
A&A Assessment & Authorization
AA Abac Attribute Authority
AAA Access Approval Authority
AAA Army Audit Agency
AAA Authentication Authorization Accounting
AAAK Authentication
AAC Application Authentication Cryptogram
AAD Additional Authenticated Data
AAL Authentication Assurance Level
AAR After Action Report
AAS Adaptive Antenna System
ABAC Attribute Based Access Control
ABB Architecture Building Blocks
ABCS Army Battle Command System
AC Application Cryptogram
ACA Access Control Authority
ACA Affordable Care Act
ACCM Asset Configuration Compliance Module
ACE Access Control Entry
ACES Automated Continuing Evaluation System
ACID Atomicity Consistency Isolation Durability
ACK Acknowledgement
ACL Access Control List
ACM Association For Computing Machinery
ACO Accountable Care Organizations
ACO Authenticated Cipher offset
ACSI Assistant Chief of Staff For Intelligence (Army)
AD Active Directory
AD Authenticated Data
ADB Android Debug Bridge
ADC Analog To Digital Converter
ADF Automatic Document Feeder
ADFS Active Directory Federation Services
ADH Anonymous Diffie Hellman
ADOT Academic Directors of Technology
ADP Automated Data Processing
ADPSO Automated Data Processing Security Officer
ADPSSO Automated Data Processing System Security Officer
ADR Adjudicative Desk Reference
ADS Alternate Data Stream
ADS Automated Data System
ADT Android Development Tools
ADT Admissions Discharge & Transfer
AES Advanced Encryption Standard
AES-256 Advanced Encryption Standard 256
AES-512 Advanced Encryption Standard 512
AES-CBC Advanced Encryption Standard Cipher Block Chaining
AES-CTR Advanced Encryption Standard Counter Mode
AF Air Force
AFAIK As Far As I Know
AFB Air Force Base
AFC4A Air Force C4 Agency
AFCAF Air Force Central Adjudication Facility
AFH Adaptive Frequency Hopping
AFI Air Force Instruction
AFIWC Air Force Information Warfare Center
AFMAN Air Force Manual
AFOSF Air Force Office of Security Forces
AFOSI Air Force Office of Special Investigation
AFOSP Air Force Office of Security Police
AFP Apple Filing Protocol
AFPC Air Force Personnel Center
AFPD Air Force Policy Directive
AFR Air Force Regulation
AFSCO Air Force Security Clearance Office
AG Attorney General
AG/SCM Advisory Group/Security Countermeasures
A-GPS Assisted Global Positioning System
AGS Architectural Graphic Standards
AH Authentication Header
AI Artificial Intelligence
AIA Air Intelligence Agency
AIA Army Intelligence Agency
AICPA American Institute of Certified Public Accountants
AID Application Identifier
AIDC Automatic Identification & Data Capture
AIM Association For Automatic Identification & Mobility
AIMS Automated Infrastructure Management System
AIP Application Interchange Profile
AIS Artificial Intelligence System
AIS Automated Information Systems
AISS Automated Information Systems Security
AISSP Automated Information Systems Security Plan
AIT Automatic Identification Technology
AIX Advanced Interactive Executive
AJAX Asynchronous JavaScript & XML
AK Authorization Key
AKID Authorization Key Identifier
AKM Authentication & Key Management
ALE Annualized Loss Expectancy
ALG Application Layer Gateway
ALU Arithmetic Logic Unit
AMA Ask Me Anything
AMI Amazon Machine Image
AMIDS Audit Monitoring & Intrusion Detection System
AMPS Advanced Mobile Phone System
ANACI Access National Agency Check With Written Inquiries
ANF Application Normative Framework
ANN Artificial Neural Network
ANSI American National Standards Institute
AO Area of Operations
AO Authorizing official
AOA Analysis of Alternatives
AOA Area of Application
AODR Authorizing official Designated Representative
AP Access Point
APC Ambulatory Payment Classification
APEC Asia Pacific Economic Cooperation
API Application Programming Interface
APK Android Package Kit
APM Actions Per Minute
APN Access Point Names
APT Advanced Persistent Threat
APU Accelerated Processing Unit
APWG Anti Phishing Working Group
AQ-SAP Acquisition Special Access Program
ARC Authorization Response Code
ARIN American Registry For Internet Numbers
ARN Amazon Resource Name
ARO Annualized Rate of Occurrence
ARP Address Resolution Protocol
ARPA Advanced Research Projects Agency
ARPC Authorization Response Cryptogram
ARQC Authorization Request Cryptogram
ARRA American Recovery & Reinvestment Act
AS Authentication Server
AS Autonomous System
ASAP As Soon As Possible
ASC Anti Spyware Coalition
ASC X9 Accredited Standards Committee X9
ASCII American Standard Code For Information Interchange
ASCLD-LAB The American Society of Crime Laboratory Directors Laboratory Accreditation Board
ASD (C31) Assistant Secretary of Defense For Command Control Communication & Intelligence
ASDR Application Security Desk Reference
ASG Abstract Semantic Graph
ASG Auto Scaling Group
ASIMS Automated Security Incident Measuring System
ASLR Address Space Layout Randomization
ASN Autonomous System Number
ASN.1 Abstract Syntax Notation 1
ASP Active Server Pages
ASP Application Service Provider
ASSIST Automated System Security Incident Support Team
AST Abstract Syntax Tree
ASV Approved Scanning Vendor
ASVS Application Security Verification Standards
ATA Advanced Technology Attachment
ATC Anatomical Therapeutic Chemical Classification System
ATC Application Transaction Counter
ATC Authorization To Connect
ATD Authorization Termination Date
ATIM Announcement Traffic Indication Message
ATM Asynchronous Transfer Mode
ATM Automatic Teller Machine
ATO Authorization To Operate
ATX Advanced Technology Extended
AU Activation Unit
AUP Acceptable Use Policy
AUP Agreed Upon Procedures
AV Antivirus
AVIEN Anti Virus Information Exchange Network
AVP Attribute Value Pair
AVX Advanced Vector Extensions
AWS Amazon Web Services
AZ Availability Zone
b Bit
B Byte
B2B Business To Business
B2C Business To Consumer
BA Business Associate
BAA Business Associate Agreement
BAPI Biometric Application Programming Interface
BASE Basically Available Soft State Eventually Consistent
Bash Bourne Again Shell
BBS Bulletin Board System
BC Business Continuity
BCM Business Continuity Management
BCP Best Current Practice
BCP Business Continuity Plan
BCWP Budgeted Cost of Work Performed
BCWS Budgeted Cost of Work Scheduled
BDM Banner Document Management
BGAN Broadband Global Area Network
BGP Border Gateway Protocol
BGP-4 Border Gateway Protocol 4
BI Business Intelligence
BIA Bump In The Api
BIA Business Impact Analysis
BINAS Biosafety Information Network Advisory System
BioAPI Biometric Application Programming Interface
BIOS Basic Input Output System
BIPN Background Investigation Plus Current National Agency Check
BIS Bureau of Industry & Security
BISS Base & Installation Security System
BITS Background Intelligent Transfer Service
BITS Bump In The Stack
Blob Binary Large Object
BMA Business Mission Area
BMS Balanced Magnetic Switch
BPEL Business Process Execution Language
BPML Business Process Modeling Language
BPO Business Process Outsourcing
BPSS Business Process Specification Schema
BREW Binary Runtime Environment For Wireless
BRM Business Reference Model
BRP Business Recovery (Resumption) Plan
BS Base Station
BS British Standard
BSC Base Station Controller
BSC Binary Synchronous Communications
BSI British Standards Institution
BSIA British Security Industry Association
BSIMM Building Security In Maturity Model
BSoD Blue Screen of Death
BSP Best Security Practice
BSS Basic Service Set
BSSID Basic Service Set Identifier
BT Bluetooth
BTL Block Transformation Layer
BTNS Better Than Nothing Security
BTS Base Transceiver Station
BU Binding Update
BUA Binding Update Acknowledgement
BYOA Bring Your Own Apps
BYOC Bring Your Own Cloud
BYOD Bring Your Own Device
BYOE Bring Your Own Encryption
BYOI Bring Your Own Identity
BYON Bring Your Own Network
C&A Certification & Accreditation
C&A WG Certification & Accreditation Working Group
C2 Command & Control
C2W Command & Control Warfare
C4 Command Control Communications & Computers
C4ISR Command Control Communications Computer Intelligence Surveillance & Reconnaissance
CA Certificate Authority
CA Certification Agent
CAAP Critical Asset Assurance Program
CaaS Compliance As A Service
CaaS Content As A Service
CAB Change Advisory Board
CAC Common Access Card
CADE Corporate Average Data Center Efficiency
CAIDA Cooperative Association For Internet Data Analysis
CAK Card Authentication Key
CAL Category Assurance List
CAM Card Authentication Method
CAN Computer Network Attack
CAN-SPAM Controlling The Assault of Non Solicited Pornography & Marketing Act
CAO Contract Administration Office
CAP Connection Approval Program
CAP Controlled Access Program
CAP Corrective Action Plan
CAPCO Controlled Access Program Coordination Office
CAPEC Common Attack Pattern Enumeration & Classification
CAPEX Capital Expenditure
CAPK Certificate Authority Public Key
CAPTCHA Completely Automated Public Turing Test To Tell Computers & Humans Apart
CARO Computer Antivirus Research Organization
CARVER Criticality Accessibility Recuperability Vulnerability Effect & Recognizability
CAS Casualty Actuarial Society
CAS Central Authentication System
CASB Cloud Access Security Broker
CAV Card Authentication Value
CAVP Cryptographic Algorithm Validation Program
CAVS Connected & Automated Vehicles
CBA Cost Benefit Analysis
CBAC Context Based Access Control
CBC Cipher Block Chaining
CBC-MAC Cipher Block Chaining Message Authentication Code
CBEFF Common Biometric Exchange File Format
CBI Confidential Business Information
CBIPM Confidential Business Information Protective Measure
CBSP Cloud Based Security Providers
CC Common Criteria
CCA Clinger Cohen Act
CCA Cloud Computing Agreements
CCB Change Control Board
CCB Configuration Control Board
CCE Common Configuration Enumeration
CCEVS Common Criteria Evaluation & Validation Scheme
CCI Control Correlation Identifier
CCIPS Computer Crime & Intellectual Property Section
CCK Complementary Code Keying
CCM Cloud Controls Matrix
CCM Counter Mode With CBC MAC
CCMP Counter Mode With Cipher Block Chaining Message Authentication Code Protocol
CCP Common Control Provider
CCRA Cloud Computing Reference Architecture
CCRA Common Criteria Recognition Arrangement
CCSS Common Configuration Scoring System
CCT Correlated Color Temperature
CCTA Central Computer & Telecommunications Agency
CCTL Common Criteria Testing Laboratory
ccTLD Country Code Top Level Domain
CCTV Closed Circuit Television
CD Checking Disabled
CD Compact Disc
CD Cross Domain
CDA Combined Dynamic Data Authentication
CDC Centers For Disease Control
CDE Cardholder Data Environment
CDFS Compact Disc File System
CDMA Code Division Multiple Access
CDMI Cloud Data Management Interface
CDN Content Delivery Network
CDN Content Distribution Network
CDO Chief Data Officer
CDR Call Detail Records
CDR Critical Design Review
CD-R Compact Disc Recordable
CD-ROM Compact Disc Read Only Memory
CD-RW Compact Disc Rewritable
CDS Cross Domain Solution
CDSE Center For Development of Security Excellence
CDSSO Cross Domain Single Sign On
CE Compromising Emanations
CE Covered Entity
CEM Common Evaluation Methodology
CEO Chief Executive Officer
CER Canonical Encoding Rules
CER Crossover Error Rate
CERIAS Center For Education & Research In Information Assurance & Security
CERT Computer Emergency Response Team
CERT/CC Cert/Coordination Center
CF Compact Flash
CFAA Computer Fraud & Abuse Act
CFB Cipher Feedback
CFI Computer & Financial Investigations
CFO Chief Financial Officer
CFR Code Federal Regulations
CFR Code of Federal Regulations
CFTT Computer Forensics Tool Testing
CGA Cryptographically Generated Addresses
CGI Common Gateway Interface
CHAP Challenge Handshake Authentication Protocol
CHUID Cardholder Unique Identifier
CI Counterintelligence
CI Critical Information
CI/CD Continuous Integration/Continuous Deployment
CIA Central Intelligence Agency
CIAC Computer Incident Advisory Capability
CIAO Critical Infrastructure Assurance Office
CIAR Counterintelligence Awareness & Reporting
CID Card Id
CID Cryptogram Information Data
CIDR Classless Inter Domain Routing
CIFA Counterintelligence Field Activity
CIFS Common Internet File System
CIHI Canadian Institute For Health Information
CIIA Critical Infrastructure Information Act
CIK Crypto Ignition Key
CIO Chief Information Officer
CIP Critical Infrastructure Protection
CIPA Classified Information Procedures Act
CIPC Critical Infrastructure Protection Committee
CIPSEA Confidential Information Protection & Statistical Efficiency Act
CIPWG Critical Infrastructure Protection Working Group
CIR Committed Information Rate
CIRC Computer Incident Response Capability
CIRC Computer Incident Response Center
CIRDB Cerias Incident Response Database
CIRT  Computer Incident Response Team
CIS Center For Internet Security
CIS Cryptologic Information System
CISA C4I Integration Support Activity
CISA  Certified Information Systems Auditor
CISARA Counterintelligence Security Countermeasures & Related Activities
CISC Complex Instruction Set Computing
CISM Certified Information Systems Security Manager
CISO Chief Information Security Officer
CISO Counterintelligence Support Officer
CISP Counterintelligence Support Plan
CISSM Component Information System Security Manager
CISSP Certified Information Systems Security Professional
CITAC Computer Investigation & Infrastructure Threat Assessment Center
CITS Cooperative Intelligent Transportation System
CJCS Chairman of The Joint Chiefs of Staff
CJCSI Chairman Joints Chiefs of Staff Instruction
CKTS Computerized Key Telephone System
CLAS Classified By
CLASP Comprehensive Lightweight Application Security Process
CLF Common Log Format
CLI Command Line Interface
CLOB Character Large Object
CLOUD Clarifying Lawful Overseas Use of Data
CLR Common Language Runtime
cm Centimeter
CM Classification Management
CM Configuration Management
CM Content Management
CM Countermeasure
CMA Certificate Management Authority
CMAC Cipher Based Method Authentication Code
CMB Change Management Board
CMB Configuration Management Board
CMDB Configuration Management Database
CMDS Computer Misuse Detection System
CME Common Malware Enumeration
CMI Classified Military Information
CMIWG Classification Markings & Implementation Working Group
CMM Capability Maturity Model
CMMI Capability Maturity Model Integration
CMOS Complementary Metal Oxide Semiconductor
CMP Configuration Management Plan
CMPL Civil Monetary Penalties Law
CMS Centers For Medicare & Medicaid Services
CMS Comsec Management System
CMS Configuration Management System
CMS Content Management System
CMS Cryptographic Message Syntax
CMSS Common Misuse Scoring System
CMVP Cryptographic Module Validation Program
CN Common Name
CN Correspondent Node
CNA Computer Network Attack
CNAME Canonical Name
CNAP Cybersecurity National Action Plan
CNCI Comprehensive National Cybersecurity Initiative
CND Computer Network Defense
CNDSP Computer Network Defense Service Provider
CNE Computer Network Exploitation
CNN Convolutional Neural Network
CNSI Classified National Security Information
CNSS Committee On National Security Systems
CNSSD Committee On National Security Systems Directives
CNSSI Committee On National Security Systems Instruction
CNSSP Committee On National Security Systems Policy
CO Cyberspace Operations
CoA Care of Address
COBIT Control Objectives For Information & Related Technologies
codec Coder/Decoder
COE Common Operating Environment
COI Conflict of Interest
COM Component Object Model
COMINT Communications Intelligence
CompaaS Compute As A Service
COMSEC Communications Security
CONOPS Concept of Operations
COO Chief Operating Officer
COOP Continuity of Operations
COOP Continuity of Operations Plan
COPPA Children’S Online Privacy Protection Act
CORBA Common Object Request Broker Architecture
CORS Cross Origin Resource Sharing
COSO Commission of Sponsoring Organizations of The Treadway Commission
COTM Communications On The Move
COTS Commercial off The Shelf
CP Certificate Policy
CP Contingency Plan
CPA Certified Public Accountant
CPA Cost Per Action
CPC Cost Per Click
CPE Common Platform Enumeration
CPI Compression Parameter Index
CPL Cost Per Lead
CPM Cost Per Thousand Impressions
CPM Critical Path Method
CPNI Center For The Protection of National Infrastructure
CPO Chief Privacy Officer
CPS Certificate Practice Statement
CPS Cyber Physical System
CPSO Command Program Security Officer
CPSO Contractor Program Security Officer
CPT Current Procedural Terminology
CPTED Crime Prevention Through Environmental Design
CPU Central Processing Unit
CPWG Crime Prevention Working Group
CR Conversion Rate
CRAM Challenge Response Authentication Mechanism
CRAMM Ccta Risk Analysis & Management Method
CRC Cyclic Redundancy Check
CRC–32 Cyclic Redundancy Check–32
CRG Compliance Review Group
CRL Certificate Revocation List
CRM Customer Relationship Management
CRO Chief Risk Officer
CRO Conversion Rate Optimization
CRT Cathode Ray Tube
CRYPTO Cryptography
CS Client/Server
CS Comment Spamming
CSA Child Support Agency
CSA Cloud Security Alliance
CSA Cloud Services Agreement
CSA Cognizant Security Agency
CSA Cognizant Security Authority
CSA Computer Security Act
CSC Card Security Code
CSCS Contract Security Classification Specification
CSE Center For Security Evaluation
CSEA Cyber Security Enhancement Act
CSEC Cyber Security Education Consortium
CSF Common Security Framework
CSIA Cyber Security Industries Alliance
CSIL Critical & Sensitive Information List
CSIR Computer (& Network) Security Incident Response
CSIRC Computer Security Incident Response Capability
CSIRT Computer Security Incident Response Team
CSISM Communications Security (COMSEC) Supplement To The Industrial Security Manual
CSMA / CD Carrier Sense Multiple Access/Collision Detection
CSO Chief Security Officer
CSO Cognizant Security Office
CSO Computer Security Object
CSP Cloud Service Provider
CSP Content Security Policy
CSP Credentials Service Provider
CSR Certificate Signing Request
CSRC Computer Security Resource Center
CSRDA Cyber Security Research & Development Act of 2002
CSRF Cross Site Request Forgery
CSS Cascading Style Sheet
CSS Central Security Service
CSS Constant Surveillance Service
CSSIA Center For Systems Security & Information Assurance
CSSM Communications Computer System Security Manager
CSSO Computer Systems Security Officers
CST Construction Surveillance Technician
CSV Comma Separated Values
CT Computed Tomography
CT Counter Terrorism
CTA Call To Action
CTC Connectionist Temporal Classification
CTC Counterterrorist Center
CTCPEC Canadian Trusted Computer Product Evaluation Criteria
CTO Chief Technology Officer
CTP Composite Theoretical Performance
CTR Click Through Rate
CTR Counter Mode Encryption
CTS Click Through Rate
CTS Computerized Telephone System
CTS Cosmic Top Secret
CTSA Cosmic Top Secret Atomal
CTTA Certified Transient Electromagnetic Pulse Emanation Standard (Tempest) Technical Authority
CUDA Compute Unified Device Architecture
CUI Controlled Unclassified Information
CV Computer Vision
C-V2X Cellular Vehicle To Everything
CVC Card Validation Code
CVD Card Verification Data
CVE Common Vulnerabilities & Exposures
CVE Elo Verification Code
CVM Card Verification Method
CVN Card Validation Number
CVR Card Verification Result
CVSS Common Vulnerability Scoring System
CVV Card Verification Value
CW Code Word
CW Cyber Warfare
CWE Common Weakness Enumeration
CWSS Common Weakness Scoring System
CX Customer Experience
CYBEX Cybersecurity Information Exchange
CYOD Choose Your Own Device
D2D Device To Device
DA Destination Address
DA Domain Authority
DAA Designated Approving Authority
DaaS Desktop As A Service
DAC Discretionary Access Control
DAD Duplicate Address Detection
DAM Database Activity Monitoring
DAM Digital Asset Management
DAML DARPA Agent Markup Language
DAMP Database Activity Monitoring & Prevention
D-AMPS Digital Advanced Mobile Phone Service
DAO Data Access Object
DAR Degree Audit Report
DARPA Defense Advanced Research Projects Agency
DAS Direct Attached Storage
DASD Deputy Assistant Secretary of Defense
DASD (DT&E) Deputy Assistant Secretary of Defense For Developmental Test & Evaluation
DAST Dynamic Application Security Testing
DATO Denial of Authorization To Operate
DBA Database Administrator
DBaaS Database As A Service
dBm Decibels Referenced To One Milliwatt
DBMS Database Management System
DC Data Center
DC Domain Controller
DC3 DOD Cyber Crime Center
DCaaS Data Center As A Service
DCC Defensive Counter Cyber
DCE Distributed Computing Environment
DCFL Defense Computer Forensics Lab
DCHC Defense Counterintelligence & Human Intelligence Center
DCI Director of Central Intelligence
DCI SSC Director of Central Intelligence Special Security Center
DCID Director of Central Intelligence Directive
DCL Declassify
DCMA Defense Contract Management Agency
DCMO Deputy Chief Management Office
DCOM Distributed Component Object Model
DCPDS Defense Civilian Personnel Data System
DCS Defense Clandestine Service
DCS Distributed Control System
DCSINT Deputy Chief of Staff For Intelligence Army
DD Defense Department
DDA Designated Disclosure Authority
DDA Standard Dynamic Data Authentication
DDAL Delegation of Disclosure Authority Letter
DDEP Defense Data Exchange Program
DDL Data Definition Language
DDMS Department of Defense Metadata Specification
DDNS Dynamic Domain Name Services
DDOL Dynamic Data Authentication Data
DDoS Distributed Denial of Service
DDR3 Double Data Rate Type 3
DEA Data Encryption Algorithm
DECL Declassify
DEK Data Encryption Key
DEP Data Execution Prevention
DES Data Encryption Standard
DFARS Defense Federal Acquisition Regulation Supplement
DFS Distributed File System
DFS Dynamic Frequency Selection
DH Diffie Hellman
DHAAD Dynamic Home Agent Address Discovery
DHCP Dynamic Host Configuration Protocol
DHCPv6 Dynamic Host Configuration Protocol For Internet Protocol V6
DHS U.S. Department of Homeland Security
DIA Defense Intelligence Agency
DIAC Defense Intelligence Analysis Center
DIACAP Department of Defense Information Assurance Certification & Accreditation Process
DIACCS Defense Ia Command & Control System
DIAM Defense Intelligence Agency Manual
DIAMOND Defense Intrusion Analysis & Monitoring Desk
DIAP Defense Information Assurance Program
DIB Defense Industrial Base
DIC Defense Intelligence Community
DICOB Defense Industrial Security Clearance Oversight Board
DICOM Digital Imaging & Communications In Medicine
DIDO Designated Intelligence Disclosure official
DIDS Distributed Intrusions Detection System
DII Defense Information Infrastructure
DIMA DOD Portion of The Intelligence Mission Area
DIMS Digital Identity Management Service
DIN Drug Identification Number
DIRNSA Director National Security Agency
DIS Defense Investigative Service
DISA Defense Information Systems Agency
DISA Direct Inward System Access
DISA U.S. Defense Information Systems Agency
DISN Defense Information Systems Network
DISP Department of Defense Industrial Security Program
DITPR DOD Information Technology Portfolio Repository
DITSCAP Department of Defense Information Technology Security Certification & Accreditation Process
DITSWG Defense Information Technology Security Working Group
DKIM Domain Keys Identified Mail
DLL Dynamic Link Library
DLP Data Loss Prevention
DLT Distributed Ledger Technology
DM Direct Message
DMA Direct Memory Access
DMARC Domain Based Message Authentication Reporting & Conformance
DMC Defense Megacenter
DMCA Digital Millennium Copyright Act
DMDC Defense Manpower Data Center
DMF Data Management Facility
DML Data Manipulation Language
DMNS Data Management Notification System
DMS Data Management System
DMS Database Migration Service
DMS Defense Message System
DMVPN Dynamic Multipoint VPN
DMZ Demilitarized Zone
DN Distinguished Name
DN Domain Name
DNA Deoxyribonucleic Acid
DNI Director of National Intelligence
DNI Director of Naval Intelligence
DNP Distributed Network Protocol
DNS Domain Name Server
DNS Domain Name System
DNSBL Domain Name System Blacklist
DNSSEC Domain Name System Security Extensions
DOC U.S. Department of Commerce
DoD U.S. Department of Defense
DoD ISRMC DOD Information Security Risk Management Committee
DoDAF Department of Defense Architecture Framework
DoDD Department of Defense Directive
DoDI DOD Instruction
DoDIIS Department of Defense Intelligence Information System
DODIN Department of Defense Information Networks
DoDIS Department of Defense Information System
DoDM DOD Manual
DOE U.S. Department of Energy
DOI Domain of Interpretation
DOJ U.S. Department of Justice
DOM Document Object Model
DoN Department of The Navy
DoS Denial of Service
DOS Disk Operating System
DOT&E Director Operational Test & Evaluation
DPA Data Protection Act
DPA Differential Power Analysis
DPH Department of Public Health
DPIA Data Protection Impact Assessment
DPO Data Protection Officer
DQL Data Query Language
DR Disaster Recovery
DRA Data Recovery Agent
DRAM Dynamic Random Access Memory
DRB Defense Resources Board
DRDA Distributed Relational Database Architecture
DREAD Disaster Reproducibility Exploitability Affected Users & Discoverability
DREN Defense Research & Engineering Network
DRM Digital Rights Management
DRMO Defense Reutilization Management Office
DRP Disaster Recovery Plan
DRS Distributed Resource Scheduler
DS Delegation Signer
DS Direct Support
DS Distribution System
DS Field Differentiated Services Field
DSA Data Sharing Agreement
DSA Designated Security Authority
DSA Digital Signature Algorithm
DSAWG Defense Ia Security Accreditation Working Group
DSB Defensive Security Brief
DSBS Dual Sensor Brake Support
DSCA Defense Security Cooperation Agency
DSEC Director of Security
DSL Digital Subscriber Line
DSLAM Digital Subscriber Line Access Multiplexer
DSMC Defense Systems Management College
DSML Directory Services Markup Language
DSN Defense Switched Network
DSN Delivery Status Notification
DSOD Dynamic Separation of Duty
DSS Defense Security Service
DSS Digital Signature Standard
DSSCS Defense Special Security Communication System
DSS-PIC DSS Personnel Investigations Center
DSSS Defense Special Security System
DSTM Dual Stack Transition Mechanism
DT Directory Traversal
DT/PT Directory / Path Traversal
DT&E Developmental Test & Evaluation
DTC Distributed Transaction Coordinator
DTD Document Type Definition
DTIC Defense Technical Information Center
DTLS Datagram Transport Layer Security
DTM Data Transmission Media
DTM Directive Type Memorandum
DTP Dynamic Trunking Protocol
DTR Derived Test Requirement
DTSA Defense Technology Security Administration
DUA Data Use Agreement
DUID DHCP Unique Identifier
DVD Digital Versatile Disc
DVD Digital Video Disk
DVD-R Digital Video Disc Recordable
DVD-RAM Digital Versatile Disc Random Access Memory
DVD-ROM Digital Video Disc Read Only Memory
DVD-RW Digital Video Disc Rewritable
DVMRP Distant Vector Multicast Routing Protocol
DVR Digital Video Recorder
DVR Digital Voice Recorder
DW Data Warehouse
E/APL Evaluated Approved Product
EA Electronic Attack
EA Enterprise Architecture
EA Evolutionary Acquisition
EAC Electronic Access Control
EAC Estimate At Completion
EAI Enterprise Application Integration
EAL Evaluation Assurance Level
EAP Extensible Authentication Protocol
EAP-FAST Extensible Authentication Protocol Flexible Authentication Via Secure Tunneling
EAPOL Extensible Authentication Protocol Over LAN
EAPOL-KCK Extensible Authentication Protocol Over LAN Key Confirmation Key
EAPOL-KEK Extensible Authentication Protocol Over LAN Key Encryption Key
EAP-TLS Extensible Authentication Protocol Transport Layer Security
EAP-TTLS Extensible Authentication Protocol Tunneled Transport Layer Security
EBGP Exterior Border Gateway Protocol
EBS Amazon Elastic Block Store
ebXML Electronic Business Extensible Markup Language
ebXML Electronic Business Using Extensible Markup Language
EC2 Elastic Compute Cloud
EC2N Elliptic Curve Over G[2N]
ECB Electronic Code Book
ECC Elliptic Curve Cryptography
ECC Error Correction Code
ECDH Elliptic Curve Diffie Hellman
ECDSA Elliptic Curve Digital Signature Algorithm
ECM Enterprise Configuration Manager
ECM Enterprise Content Management
ECP Encryption Control Protocol
ECP Engineering Change Proposal
ECPA Electronic Communications Privacy Act
ECS Ec2 Container Service
EDGE Enhanced Data For Global Evolution
EDI Electronic Data Interchange
EDR Endpoint Detection & Response 
EDR Enhanced Data Rate
EEPROM Electrically Erasable Programmable Read Only Memory
EF Exposure Factor
EFI Extensible Firmware Interface
EFOIA Electronic Freedom of Information Act
EFS Elastic File System
EFS Encrypting File System
EGP Exterior Gateway Protocol
EH Extension Header
EHR Electronic Health Record
EI Email Injection
EICAR European Institute For Computer Antivirus Research
EIEMA Enterprise Information Environment Mission Area
EIGRP Enhanced Interior Gateway Routing Protocol
EIK EAP Integrity Key
EIP Elastic IP
EITDR Enterprise Information Technology Database Repository
EK Endorsement Key
ELB Elastic Load Balancer
email Electronic Mail
eMASS Enterprise Mission Assurance Support Service
eMBB Enhanced Mobile Broadband
EMM Enterprise Mobility Management
EMP Electromagnetic Pulse
EMR Elastic Map Reduce
EMR Electronic Medical Record
EMS Energy Management System
EMS Enhanced Messaging Service
EMS Enterprise Messaging System
EMSK Extended Master Session Key
EMTALA Emergency Medical Treatment & Labor Act
EMV Europay Mastercard Visa Specification
EMVCo EMV Specifications Company
EnCE Encase Certified Examiner
EnCEP Encase Certified Ediscovery Practitioner
ENI Elastic Network Interface
ENISA European Network & Information Security Agency
ENRP Endpoint Handlespace Redundancy Protocol
EOF End of File
EOL End of Life
EOP Executive Office of The President
EP Eligible Provider
EPA Environmental Protection Agency
EPAL Enterprise Privacy Authorization Language
EPC Electronic Product Code
EPCIS Electronic Product Code Information Services
EPHI Electronic Protected Health Information
EPITS Essential Program Information Technologies & Systems
EPROM Erasable Programmable Read Only Memory
EPS Events Per Second
EPSQ Electronic Personnel Security Questionnaire
ERM Enterprise Risk Management
ERP Enterprise Resource Planning
ES Amazon Elasticsearch Service
ES Electronic Surveillance
ESAPI Enterprise Security Application Programming Interface
ESB Enterprise Service Bus
ESMS Enterprise Security Management System
ESMTP Extended Simple Mail Transfer Protocol
ESN Electronic Serial Number
ESP Encapsulating Security Payload
ESS Electronic Security System
ESS Extended Service Set
ESX Elastic Sky X
ET Electronic Transmission
ETA Education Training & Awareness
ETAPWG Education Training Awareness & Professionalization Working Group
ETC Estimate To Complete
ETSI European Telecommunications Standards Institute
ETZ Equipment Transient Electromagnetic Pulse Emanation Standard (Tempest) Zone
EU European Union
EU DP European Union Data Protection
EUI-64 Extended Unique Identifier 64 Bit
EULA End User License Agreement
EUP Enterprise Unified Process
EV Extended Validation
EV-DO Evolution Data Optimized
EVM Earned Value Management
EW Electronic Warfare
EWS Electronic Warfare Support
EXIF Exchangeable Image File Format
EXT Extended File System
EXT2 Second Extended File System
ext2fs Second Extended Filesystem
EXT3 Third Extended File System
ext3fs Third Extended Filesystem
EXT4 Fourth Extended File System
FaaS Function As A Service
FAFSA Free Application For Federal Student Aid
FAIR Factor Analysis of Information Risk
FAQ Frequently Asked Questions
FAR False Acceptance Rate
FAR Federal Acquisition Regulation
FASC-N Federal Agency Smart Credential Number
FASP Federal Agency Security Practices
FAT Factory Acceptance Testing
FAT File Allocation Table
FAT16 File Allocation Table (16 Bit) File System
FB Facebook
FBCA Federal Bridge Certification Authority
FBI Federal Bureau of Investigation
FBIS Foreign Broadcast Information Service
FCC Federal Communications Commission
FCIP Foreign Counterintelligence Program
FCL Facility Security Clearance
FCL Final Checklist List
FCPF Federal PKI Common Policy Framework
FCRA Fair Credit Reporting Act
FCS Frame Check Sequence
FDA Food & Drug Administration
FDCC Federal Desktop Core Configuration
FDCE Federated Development & Certification Environment
FDDI Fiber Distributed Data Interface
FDE Full Disk Encryption
FDIC Federal Deposit Insurance Corporation
FDMA Frequency Division Multiple Access
FEA Federal Enterprise Architecture
FEAF Federal Enterprise Architecture Framework
FEK File Encryption Key
FEMA Federal Emergency Management Agency Only Memory
FER Failure To Enroll Rate
FFIEC Federal Financial Institutions Examination Council
FFMIA Federal Financial Management Improvement Act
FHIR Fast Healthcare Interoperability Resources
FHSS Frequency Hopping Spread Spectrum
FI Foreign Intelligence
FIAM Federated Identity & Access Management
FIB Forwarding Information Base
FICC Federal Identity Credentialing Committee
FIDS Facility Intrusion Detection System
FIE Foreign Intelligence Entity
FIFO First In First Out
FILO First In Last Out
FIM Federated Identity Management
FIM File Integrity Monitoring
Fios Fiber Optic Service
FIPS Federal Information Processing Standard
FIPSPUB Federal Information Processing Standard Publication
FIRST Forum of Incident Response & Security Teams
FIS Foreign Intelligence Services
FISA Foreign Intelligence Surveillance Act
FISCAM Federal Information System Controls Audit Manual
FISD Federal Investigative Services Division
FISINT Foreign Instrumentation Signals Intelligence
FISMA Federal Information Security Management Act
FISSEA Federal Information Systems Security Educators’ Association
FIT Foreign Inspection Team
FIU Field Investigative Unit
FIWC Fleet Information Warfare Center
FLETC Federal Law Enforcement Training Center
FLOPS Floating Point Operations Per Second
FM Frequency Modulated
FMR False Match Rate
FMS Fluhrer Mantin Shamir
FN Foreign National
FNMR False Non Match Rate
FOIA Freedom of Information Act
FOIA/PA Freedom of Information Act/Privacy Act
FOMO Fear of Missing Out
FOSS Free & Open Source Software
FOV Field of View
FPC Federal Preparedness Circular
FPE Format Preserving Encryption
FPGA Field Programmable Gate Array
FPKI Federal Public Key Infrastructure
FPKIA Federal Public Key Infrastructure Architecture
FPKIPA Federal Public Key Infrastructure Policy Authority
FPN Fixed Pattern Noise
FPU Floating Point Unit
FQDN Fully Qualified Domain Name
FRAM Ferroelectric Random Access Memory
FRAP Facilitated Risk Analysis Process
FRCP Federal Rules of Civil Procedure
FRD Formerly Restricted Data
FRD Functional Requirements Document
FRR False Rejection Rate
FSB Frontside Bus
FSO Facility Security Officer
FSO Field Security Office
FTC Federal Trade Commission
FTCA Federal Trade Commission Act
FTP File Transfer Protocol
FTPS File Transfer Protocol Secure
FTS Federal Telecommunications Service
FTZ Facilities Transient Electromagnetic Pulse Emanation Standard (Tempest) Zone
FUD Fully Undetectable
FUS Fast User Switching
FY Fiscal Year
G2 Assistant Chief of Staff G2 Intelligence
G-2 Staff Intelligence Officer
GA Google Analytics
GAAP Generally Accepted Accounting Principles
GAO U.S. Government Accountability Office
GAPP Generally Accepted Privacy Principles
GB Gigabyte
GCCS Global Command & Control System
GCLB Google Cloud Load Balancer
GCM Galois / Counter Mode
GCP Google Cloud Platform
GCS Google Cloud Storage
GCSS Global Combat Support System
GDIP General Defense Intelligence Programs
GDPR General Data Protection Regulation
GEOINT Geospatial Intelligence
GFAC Generalized Framework For Access Control
GFE Government Furnished Equipment
GFIRST Government Forum of Incident Response & Security Teams
GHz Gigahertz
GIF Graphics Interchange Format
GIG Global Information Grid
GII Global Information Infrastructure
GINA Graphical Identification & Authentication
GIS Geographic Information Systems
GISRA Government Information Security Reform Act
GKEK Group Key Encryption Key
GLB Gramm Leach Bliley Act
GLBA Gramm Leach Bliley Act
GMITS Guidelines For The Management of It Security
GMK Group Master Key
GNU Gnu'S Not Unix!
GnuPG Gnu Privacy Guard
GOSC Global Operations & Security Center
GOTS Government off The Shelf
GPGPU General Purpose Computation On Graphics Processing Units
GPIO General Purpose Input/Output
GPL General Public License
GPMC Group Policy Management Console
GPO Group Policy Object
GPRS General Packet Radio Service
GPS Global Positioning System
GR Graceful Restart
GRC Governance Risk Management & Compliance
GRE Generic Routing Encapsulation
GRS General Records Schedule
GS1 Global Standards One
GSA U.S. General Services Administration
GSC Government Security Committee
GSII Government Services Information Infrastructure
GSM Global System For Mobile Communications
GSOIA General Security of Information Agreement
GSOMIA General Security of Military Information Agreement
GSSAPI Generic Security Services Application Program Interface
GTC Generic Token Card
GTEK Group Traffic Encryption Key
GTK Group Temporal Key
gTLD Generic Top Level Domain
GTSM Generalized Ttl Security Mechanism
GUI Graphical User Interface
GUID Globally Unique Identifier
HA High Availability
HA Home Agent
HAC High Availability Clusters
HAG High Assurance Guard
HAL Hardware Abstraction Layer
HAR Http Archive
HBSS Host Based Security System
HCERA Health Care & Education Reconciliation Act
HCI Host Controller Interface
HCISPP Healthcare Information Security & Privacy Practitioner
HDD Hard Disk Drive
HDFS Hadoop Distributed File System
HDMI High Definition Multimedia Interface
HERF Hazards of Electromagnetic Radiation To Fuel
HERO Hazards of Electromagnetic Radiation To Ordnance
HERP Hazards of Electromagnetic Radiation To Personnel
HF High Frequency
HFS Hierarchical File System
HFS+ Hierarchical File System Plus
HHS U.S. Department of Health & Human Services
HI Header Injection / HTTP response splitting
HICS Hospital Incident Command System
HIDS Host Based Intrusion Detection System
HIE Health Information Exchange
HINFO Host Information
HIP Host Identity Protocol
HIPAA Health Insurance Portability & Accountability Act
HIPERLAN High Performance Radio Local Area Network
HIPS Host Based Intrusion Prevention System
HIT Healthcare Information Technology
HITECH Health Information Technology For Economic & Clinical Health
HITRUST Health Information Trust Alliance
HITS Hyperlink Induced Topic Search
HIV Human Immunodeficiency Virus
HKLM HKEY Local_Machine
HL7 Health Level 7
HMAC Hash Message Authentication Code
HMD Head Mounted Displays
HMI Human Machine Interface
HMO Health Maintenance Organization
HOIS Hostile Intelligence Services
HP CSA Hp Cloud Service Automation
HPA Host Protected Area
HPC High Performance Compute
HPFS High Performance File System
HPSCI House Permanent Select Committee On Intelligence
HR Human Resources
HRM Human Resource Management
HSA Homeland Security Act
HSARPA Homeland Security Advanced Research Projects Agency
HSDPA High Speed Downlink Packet Access
HSF Heat Sink & Fan
HSM Hardware Security Module
HSPA High Speed Packet Access
HSPA+ Evolved High Speed Packet Access Or High Speed Packet Access
HSPD Homeland Security Presidential Directive
HTCIA High Technology Crime Investigation Association
HTCP Hyper Text Caching Protocol
HTML Hypertext Markup Language
HTTP Hypertext Transfer Protocol
HTTPS Hypertext Transfer Protocol Secure
HUMINT Human Intelligence
HVA Hazard Vulnerability Analysis
HVAC Heating Ventilation & Air Conditioning
HVM Hardware Virtual Machine
Hz Hertz
I&A Identification & Authentication
I&W Indications & Warning
I/O Input/Output
I3A International Imaging Industry Association
I3P Institute For Information Infrastructure Protection
IA Information Assurance
IA Institutional Analytics
IA Intelligence Activity
IAA Interim Access Authorization
IaaS Infrastructure As A Service
IAB Internet Architecture Board
IaC Infrastructure As Code
IAC Internal Audit & Compliance
IAC Issuer Action Codes
IACIS International Association of Computer Investigative Specialists
IACSE Interagency Advisory Committee On Security Equipment
IAD Information Assurance Document
IAG Information Assurance Group
IAIP Information Analysis & Infrastructure Protection
IAM Identity & Access Management
IAM Information Assurance Manager
IANA Internet Assigned Numbers Authority
IAO Information Assurance Officer
IAPM Information Assurance Program Manager
IAPWG Information Assurance Policy Working Group
IASE Information Assurance Support Environment
IASL Information Assurance Senior Leadership
IAST Interactive Application Security Test
IATAC Information Assurance Technology Analysis Center
IATC Interim Authority To Connect
IATF Information Assurance Technical Framework
IATO Interim Authority To Operate
IATT Interim Authorization To Test
IAVA Information Assurance Vulnerability Alert
IAX 2 Inter Asterisk Exchange
IBC Iterated Block Cipher
IBE Identity Based Encryption
iBGP Internal Border Gateway Protocol
IBIS Issue Based Information System
IBMJSSE IBM Java Secure Socket Extension
IBN Intent Based Networking
IBR Integrated Baseline Review
IBSS Independent Basic Service Set
IC Integrated Circuit
IC Intelligence Community
IC3 Internet Crime Complaint Center
ICAC Internet Crimes Against Children
ICAMP Incident Cost Analysis & Modeling Project
ICANN Internet Corporation For Assigned Names & Numbers
ICC Integrated Circuit Card
ICCID Integrated Circuit Card Identifier
ICCP Inter Control Center Communications Protocol
ICD Intelligence Community Directive
ICD Interface Control Document
ICD International Classification of Diseases
ICD-10 International Classification of Diseases Version 10
ICF Internet Connection Firewall
ICFR Internal Control Over Financial Reporting
ICM Integer Counter Mode
ICMP Internet Control Message Protocol
ICO Information Commisioner's Office
ICP Initial Control Point
ICP Internet Cache Protocol
ICS Industrial Control System
ICS Internet Connection Sharing
ICSA International Computer Security Association
ICT Information & Communication Technology
ICV Integrity Check Value
ICV Intelligent Connected Vehicles
ID Identification
IDaaS Identity As A Service
IDART Information Design Assurance Red Team
IDC International Data Center
IDE Integrated Development Environment
IDE Integrated Device Electronics
IDE Integrated Drive Electronics
IDE Intrusion Detection Equipment
IdEA Identity Entitlement & Access Management
IDEA International Data Encryption Algorithm
iDEN Integrated Digital Enhanced Network
ID-FF Identity Federation Framework
IDL Interface Definition Language
IdM Identity Management
IDMEF Intrusion Detection Message Exchange Format
IDMS Identity Management System
IdP Identity Provider
IDPS Intrusion Detection & Prevention System
IDS Intrusion Detection System
IDS/IDP Intrusion Detection/Intrusion Detection & Prevention
ID-SIS Identity Service Interface Specifications
ID-WSF Identity Web Services Framework
IE Internet Explorer
IEC International Electrotechnical Commission
IED Intelligent Electronic Device
IEEE Institute of Electrical & Electronics Engineers
IEEE-SA IEEE Standards Association
IEID International Exchange of Infrasound Data
IERD International Exchange of Radionuclide Data
IESD International Exchange of Seismological Data
IESG Internet Security Steering Group
IETF Internet Engineering Task Force
IFTTT If This Then That
IG Internet Gateway
IGMP Internet Group Management Protocol
IGP Interior Gateway Protocol
IGRP Interior Gateway Routing Protocol
IID Interface Identifier
IIF Information In Identifiable Form
IIHI Individually Identifiable Health Information
IIOC Independent International Organization For Certification
IIOP Internet Inter Orb Protocol
IIS Internet Information Services
IKE Internet Key Exchange
ILM Information Lifecycle Management
IM Instant Messaging
IMAP Internet Message Access Protocol
IMEI International Mobile Equipment Identity
IMM Information Management Model
IMS Intelligent Maintenance Systems
IMSI International Mobile Subscriber Identity
IMT-2000 International Mobile Telecommunications 2000
INCITS International Committee For Information Technology Standards
INCOSE International Council of Systems Engineering
INFOCONs Information Operations Conditions
INFOSEC Information Systems Security
INFOSYS Information Systems
INTERPOL International Police Organization
IO Information Operations
IO Information Owner
IO Insertion Order
IOC Indicators of Compromise
IOPS Input/Output Operations Per Second
IOSS Interagency Operations Security (OPSEC) Support Staff
IoT Internet of Things
IP Intellectual Property
IP Internet Protocol
IPA Initial Privacy Assessment
IPA Intrusion Prevention Appliance
IPB Intelligence Preparation of The Battlefield
IPComp Internet Protocol Payload Compression Protocol
IPComp IP Payload Compression
IPMO Infosec Program Management Office
IPng Internet Protocol Next Generation
IPP Information Protection Policy
IPPD Integrated Product & Process Development
IPR Internet Protocol Router
IPS Intrusion Prevention System
IPSAC Interagency Security Classification Appeals Panel
IPSec Internet Protocol Security
IPSec VPN Internet Protocol Security Virtual Private Network
IPT Integrated Product Team
IPTF Infrastructure Protection Task Force
IPv4 Internet Protocol Version 4
IPv6 Internet Protocol Version 6
IPX Internet Packet Exchange
IPX Internetwork Packet Exchange
IPX/SPX Internetwork Packet Exchange / Sequenced Packet Exchange
IR Incident Response
IR Infrared
IR Interagency Report
IRB Institutional Review Board
IRC Infosec Research Council
IRC Internet Relay Chat
IrDA Infrared Data Association
IRM Information Resource Management
IRM Information Rights Management
IRP Incident Response Plan
IRQ Interrupt Request Line
IRS Incident Reporting Structure
IRS Internal Revenue Service
IRT Incident Response Team
IRTF Internet Research Task Force
IS Information System
ISA Interconnection Security Agreement
ISA International Security Agreement
ISA International Society of Automation
ISAC Information Sharing & Analysis Center
ISACA Information Systems Audit & Control Association
ISAKMP Internet Security Association & Key Management Protocol
ISAM Indexed Sequential Access Method
ISAP Information Security Automation Program
ISAPI Internet Server Application Programming Interface
ISATAP Intra Site Automatic Tunnel Addressing Protocol
ISCM Information Security Continuous Monitoring
ISCOM Naval Investigative Service Command
iSCSI Internet Small Computer Systems Interface
ISD Information Storage Device
ISD Inspectable Space Determination
ISDN Integrated Services Digital Network
ISF Information Security Forum
ISFD Industrial Security Facilities Database
ISG Information Security Governance
ISID Industrial Security Incident Database
IS-IS Intermediate System To Intermediate System
ISM Industrial
ISM Information Security Manager
ISM Information Security Marking
ISMS Information Security Management System
ISO Information System Owner
ISO International Organization For Standardization
ISO/IEC International Organization For Standardization/ International
ISOO Information Security Oversight Office
ISP Internet Service Provider
ISPG Intelligence Programs Support Group
ISR Interrupt Service Routine
ISRMC Information Security Risk Management Committee
ISRP Information Systems Requirements Package
ISS Information Systems Security
ISS Inspection Support Staff
ISS Integrated Safeguards Subgroup
ISSA Information Systems Security Association
ISSE Information System Security Engineer
ISSEA International Systems Security Engineering Association
ISSEP Information System Security Engineering Professional
ISSM Information System Security Manager
ISSO Information System Security Officer
ISSP Information Systems Security Professional
ISSPM Information Systems Security Program Manager
ISSR Information Systems Security Representative
ISWG Industrial Security Working Group
IT Information Technology
ITA Information Technology Agreement
ITAA Information Technology Association of America
ITAB Information Technology Acquisition Board
ITAC Intelligence & Threat Analysis Center
ITAM Information Technology Asset Management
ITF Interrogator Talks First
ITIL Information Technology Infrastructure Library
ITL Information Technology Laboratory
ITMRA Information Technology Management Reform Act
ITSEC Information Technology Security Evaluation Criteria
ITU International Telecommunications Union
ITU-T International Telecommunication Union Telecommunication Standardization Sector
IUT Implementation Under Test
IV Initialization Vector
IV&V Independent Verification & Validation
IVR Interactive Voice Response
IW Information Warfare
IW-D Information Warfare – Defensive
J2 Intelligence Directorate Joint Command
JAB Joint Authorization Board
JAD Joint Analysis Development
Java Java Platform
Java EE Java Enterprise Edition
JAXR Java API For XML Registries
JCAHO Joint Commission On Accreditation of
JCCC Joint Communications Control Center
JCE Java Cryptography Extension
JCIDS Joint Capabilities Integration & Development System
JCITA Joint Counterintelligence Training Academy
JCS Joint Chiefs of Staff
JDBC Java Database Connectivity
JDIICS Joint DII Control Systems
JDK Java Development Kit
JeOS Just Enough Operating System
JFFS2 Journaling Flash File System
JFS Journaling File System
JID Joint Intrusion Detection
JIE Joint Information Environment
JIEO Joint Interoperability Engineering Organization
JIT Just In Time
JIWG Joint Ia Operations Working Group
JMIC Joint Military Intelligence College
JMIP Joint Military Intelligence Programs
JMITC Joint Military Intelligence Training Center
JPAS Joint Personnel Adjudication System
JPEG Joint Photographic Experts Group
JPO Joint Program Office
JPO STC Joint Program Office For Special Technical Countermeasures
JRE Java Runtime Environment
JROC Joint Requirements Oversight Council
JS JavaScript
JSAIWG Joint Sensitive Compartmented Information (Sci) Accreditation/Inspection Working Group
JSF Javaserver Faces
J-SIIDS Joint Services Interior Intrusion Detection System
JSM Java Security Manager
JSON JavaScript Object Notation
JSP Java Server Pages
JSSE Java Secure Socket Extension
JTAG Joint Test Action Group
JTC1 Joint Technical Committee 1 (International Organization For Standardization [ISO]/International Electrotechnical Commission [IEC])
JTF-CNO Joint Task Force – Computer Network Operations
JVM Java Virtual Machine
JWICS Joint Worldwide Intelligence Communication System
JWID Joint Warrior Interoperability Demonstration
JWT JSON Web Token
KB Kilobyte
KB Knowledge Base
Kbps Kilobit Per Second
KDC Key Distribution Center
KEK Key Encryption Key
KG Key Generator
KGD Key Generation & Distribution
kHz Kilohertz
KINK Kerberized Internet Negotiation of Keys
KLOC Thousands of Lines of Code
KMC Key Management Center
KMI Key Management Infrastructure
KMIP Key Management Interoperability Protocol
KMS Key Management Service
KMS Key Management System
KPI Key Performance Indicator
KRI Key Risk Indicator
KS Knowledge Service
KSG Key Stream Generator
KSK Key Signing Key
KVM Kernel Based Virtual Machine
KVM Keyboard Video Mouse
L2CAP Logical Link Control & Adaptation Protocol
L2F Layer 2 Forwarding
L2TP Layer 2 Tunneling Protocol
L2VPN Layer 2 Virtual Private Network
L3VPN Layer 3 Virtual Private Network
LAA Limited Access Authorization
LAC Local Agency Check
LACNIC Latin American & Caribbean IP Addresses Registry
LAN Local Area Network
LB Load Balancer
LBA Logical Block Addressing
LBAC Lattice Based Access Control
LBAP Layer Based Access Protocol
LBI Limited Background Investigation
LBIP Limited Background Investigation Plus Current National Agency Check
LBIX Limited Background Investigation Expanded
LCD Liquid Crystal Display
LCG Linear Congruential Generators
LCP Link Control Protocol
LDA Local Delivery Agent
LDAP Lightweight Directory Access Protocol
LDAPI LDAP Injection
LDAPS Lightweight Directory Access Protocol Over SSL
LDP Label Distribution Protocol
LE Law Enforcement
LE/CI Law Enforcement & Counterintelligence
LEA Law Enforcement Agency
LED Light Emitting Diode
LF Low Frequency
LFC Local Files Check
LFI Local File Inclusion
LFN Long Filename
LFSR Linear Feedback Shift Register
LIMDIS Limited Distribution
LIR Local Internet Registry
LLC Logical Link Control
LLT Low Latency Transport
LM Lan Manager
LMP Link Manager Protocol
LMS Learning Management System
LN Local Network
LNN Learning Neural Networks
LOC Location
LOINC Logical Observation Identifiers Names & Codes
LOS Line of Sight
LR Logistic Regression
LRA Local Registration Authority
LSI Latent Semantic Indexing
LSTM Long Short Term Memory
LT Leadership Team
LTE Long Term Evolution
LTE-A LTE Advanced
LU6.2 Logical Unit Version 6.2
LUA Limited User Account
LUN Logical Unit Number
m Meter
M&A Merger & Acquisitions
M2M Machine To Machine
MA Mission Area
MAC Mandatory Access Control
MAC Media Access Control
MAC Medium Access Control
MAC Message Authentication Code
MAF Multi Mode Authentication Framework
MAM Mobile Application Management
MAMP Mac OS X Apache MySQL and PHP
MAN Metropolitan Area Network
MANET Mobile Ad Hoc Network
MAPS Mail Abuse Prevention System
MASINT Measurement & Signature Intelligence
MB Megabyte
MBP Macbook Pro
Mbps Megabits Per Second
MBR Master Boot Record
MBSA Microsoft Baseline Security Analyzer
MCA Micro Channel Architecture
MCC Mobile Country Codes
MCDES Malicious Code Detection & Eradication System
MCIS Miami Computing & Information Services
MCM Mobile Content Management
MCS Miami Computing Services
MD Message Digest
MD5 Message Digest 5
MDC Modular Data Center
MDI Medical Device Integration
MDI Medium Dependent Interface
MDM Mobile Device Management
MDN Mobile Directory Number
MDS2 Manufacturer Disclosure Statement For Medical Device Security
ME Mobile Equipment
MED Multi Exit Discriminator
MEID Mobile Equipment Identifier
MEP Message Exchange Pattern
MES Manufacturing Execution System
MFA Multi Factor Authentication
MFT Master File Table
MGCP Media Gateway Control Protocol
MHz Megahertz
MI Machine Intelligence
MI Military Intelligence
MIB Management Information Base
MIC Mandatory Integrity Control
MIC Message Integrity Check
MIKEY Multimedia Internet Keying
MIM Microsoft Identity Manager
MIM Mobile Information Management
MIME Multipurpose Internet Mail Extensions
MIMO Multiple Input
MIN Mobile Identification Number
MInE Miami Information Environment
Mini SD Mini Secure Digital
MIP Mobile Internet Protocol
MIPS Million Instructions Per Second
MIS Management Information System
MITM Man In The Middle
ML Machine Learning
MLD Multicast Listener Discovery
MLS Multilevel Security
MLS WG Multilevel Security Working Group
MMC Microsoft Management Console
MMC Multimediacard
MMCmobile Multimediacard Mobile
MMS Multimedia Message Service
MMS Multimedia Messaging Service
mMTC Massive Machine Type Communications
MN Mobile Node
MNB Miami Notebook
MNC Mobile Network Codes
MNS Mission Needs Statement
MO Magneto Optical
MOA Memorandum of Agreement
MOBIKE IKEv2 Mobility & Multihoming Protocol
MODP Modular Exponential
MOSS Mime Object Security Services
MOU Memorandum of Understanding
MOVS Modes of Operation Validation System
MP3 Moving Picture Experts Group Layer 3
MP4 Moving Pictures Experts Group 4
MPA Mobile Prefix Advertisement
MPLS Multi Protocol Label Switching
MPP Massive Parallel Processing
MPS Mobile Prefix Solicitation
MQV Menezes Qu Vanstone
MRI Magnetic Resonance Imaging
MS Microsoft
MS Mobile Subscriber
MSA Master Service Agreement
MSC Mobile Switching Center
MS-CHAP Microsoft Challenge Handshake Authentication Protocol
MSD Magnetic Stripe Data
MS-DOS Microsoft Disk Operating System
MSDP Multicast Source Discovery Protocol
MSEC Multicast Security
MSEL Master Scenario Events List
MSIL Microsoft Intermediate Language
MS-ISAC Multi State Information Sharing & Analysis Center
MSISDN Mobile Subscriber Integrated Services Digital Network
MSK Master Session Key
MSKB Microsoft Knowledge Base
MSP Managed Service Provider
MSSP Managed Security Service Provider
MSTSC Microsoft Terminal Service Client
MSWG Metadata Standards Working Group
MTA Mail Transfer Agent
MTBF Mean Time Between Failures
MTD Maximum Tolerable Downtime
MTD Memory Technical Driver
MTM Mobile Trusted Module
MTPOD Maximum Tolerable Period of Disruption
MTSO Mobile Telephone Switching Office
MTTF Mean Time To Failure
MTTR Mean Time To Repair
MTU Master Telemetry Unit
MTU Master Terminal Unit
MTU Maximum Transmission Unit
MU Meaningful Use
MUA Mail User Agent
MUTV Miami University Television
MVC Model View Controller
mW Milliwatt
MWB Malwarebytes
MX Mail Exchanger
NA Neighbor Advertisement
NA Not Applicable
NaaS Network As A Service
NAC Network Access Control
NACI National Agency Check & Inquiries
NACIC National Counterintelligence Center
NACK Negative Acknowledgement
NACK Negative Acknowledgement Protocol
NAP Network Access Protection
NARA National Archives & Records Administration
NAS Network Access Server
NAS Network Attached Storage
NAT Network Address Translation
NATO North Atlantic Treaty Organization
NAT-PT Network Address Translation—Protocol Translation
NAT-T Network Address Translation Traversal
NBA Network Behavior Analysis
NBAD Network Behavior Anomaly Detection
NBE Network Based Evidence
NC Non Compliant
NCC National Cybersecurity Center
NCCIC National Cybersecurity & Communications Integration Center
NCES Netcentric Enterprise Services
NCIC National Crime Information Center
NCIS Naval Criminal Investigation Service
NCP National Checklist Program
NCRAL National Cyber Risk Alert Level
NCS National Communications System
NCS National Cryptologic School
NCSA National Cyber Security Alliance
NCSAM National Cyber Security Awareness Month
NCSC National Computer Security Center
NCSD National Cyber Security Division
NCSI NIST National Center For Standards & Certification Information
ND Neighbor Discovery
NDA Non Disclosure Agreement
NDAC Non Discretionary Access Control
NDP Neighbor Discovery Protocol
NDU National Defense University
Net Network
NetBEUI NetBIOS Extended User Interface
NetBIOS Network Basic Input/Output System
NetBT NetBIOS Over TCP/IP
NETMGR Network Manager
NetOps Network Operations
NFAT Network Forensic Analysis Tool
NFC Near Field Communication
NFIB National Foreign Intelligence Board
NFIP National Foreign Intelligence Program
NFS Network File System
NFV Network Function Virtualization
NGA National Geospatial Intelligence Agency
NGFW Next Generation Firewall
NGIC National Ground Intelligence Center
NH Next Header
NHS National Health Service
NI Natural Intelligence
NIAC National Infrastructure Advisory Council
NIACAP National Information Assurance Certification & Accreditation Process
NIAP National Information Assurance Partnership
NIC Network Interface Card
NICC National Infrastructure Coordinating Center
NICCS National Initiative For Cybersecurity Careers & Studies
NICE National Initiative For Cybersecurity Education
NID Network Intrusion Detector
NIDS Network Intrusion Detection System
NII National Information Infrastructure
NIJ National Institute of Justice
NINO Nothing In Nothing Out
NIPC National Infrastructure Protection Center
NIPRNET Non Secure/Unclassified Internet Protocol Router Network
NIPS Network Based Intrusion Prevention System
NIS Network Information System
NISAC National Infrastructure Simulation & Analysis Center
NISCC National Infrastructure Security Coordination Center
NISP National Industrial Security Program
NISPOM National Industrial Security Program Operating Manual
NIST National Institute of Standards & Technology
NISTIR National Institute of Standards & Technology Interagency Report
NITB National Infosec Technical Baseline
NLNN Non Learning Neural Networks
NLOS Non Line of Sight
NLP Natural Language Processing
NLSP Network Layer Security Protocol
NLU Natural Language Understanding
NMAP Network Mapper
NMS Network Management System
NNTP Network News Transfer Protocol
NOC Network Operations Center
NOS Network Operating System
NOSC Network Operation Security Center
NoSQL Non Structured Query Language
NPI New Product Introduction
NPIVP NIST Personal Identity Verification Program
NPP Notice of Privacy Practices
NPPI Nonpublic Personal Information
NPS Net Promoter Score
NPV Net Present Value
NS Name Server
NS Neighbor Solicitation
NS/EP National Security & Emergency Preparedness
NSA National Security Agency
NSA/CSS National Security Agency/Central Security Service
NSAPI Netscape Server Application Programming Interface
NSAPI Network Service Access Point Identifier
NSC National Security Council
NSD National Security Directive
NSEC Next Secure
NSI National Security Information
NSIRC National Security Incident Response Center
NSOC National Security Operations Center
NSP Network Service Provider
NSRL National Software Reference Library
NSS National Security System
NSS Network Security Services
NSTAC National Security Telecommunication Advisory Committee
NSTB National SCADA Test Bed
NSTISSAM National Security Telecommunications & Information Systems Security Advisory Memorandum
NSTISSC National Security Telecommunications & Information Systems Security Committee
NSTISSD National Security Telecommunications & Information Systems Security Directive
NSTISSI National Security Telecommunications & Information Systems Security Instruction
NSTISSP National Security Telecommunications & Information Systems Security Policy
NSU Non Standard Usage
NTFS New Technology File System
NTISSC National Telecommunications & Information Systems Security Committee
NTLM NT LAN Manager
NTP Network Time Protocol
NTTAA National Technology Transfer & Advancement Act of 1995
NUD Neighbor Unreachability Detection
NVD National Vulnerability Database
NVLAP National Voluntary Laboratory Accreditation Program
NVRAM Non Volatile Random Access Memory
NW3C National White Collar Crime Center
NX No Execute
OASD Office of The Assistant Secretary of Defense
OASIS Organization For The Advancement of Structured Information Standards
OAuth Open Authorization
OAuth2 Open Authorization Version 2
OBIEE Oracle Business Intelligence Enterprise Edition
OCC Office of The Comptroller of The Currency
OCIL Open Checklist Interactive Language
OCIO Office of The Chief Information Officer
OCO offensive Cyberspace Operations
OCR Office For Civil Rights
OCSP Online Certificate Status Protocol
OCTAVE Operationally Critical Threat Asset & Vulnerability Evaluation
ODBC Open Database Connectivity
ODCI Office of The Director of Central Intelligence
ODF Open Document Format
ODNI Office of The Director of National Intelligence
OECD Organisation For Economic Co Operation & Development
OEM Original Equipment Manufacturer
OEP Occupant Emergency Plan
OFB Output Feedback
OFDM Orthogonal Frequency Division Multiplexing
OGSA Open Grid Services Architecture
OHA Open Handset Alliance
OIDC OpenID Connect
OIG Office of Inspector General
OIG DoD Office of The Inspector General of The Department of Defense
OIS Office Information System
OLA Operational Level Agreement
OLAP Online Analytical Processing
OLE Object Linking & Embedding
OLTP Online Transaction Processing
OMB Office of Management & Budget
ONC Office of The National Coordinator
ONF Organization Normative Framework
ONS Object Naming Service
OOB Out of Band
OOP Object Oriented Programming
OPC Ole For Process Control
OpenPGP An Open Specification For Pretty Good Privacy
OPEX Operational Expenditure
OPM U.S. Office of Personnel Management
OPSEC Operational Security
ORA Organization Registration Authority
ORB Open Relay Blacklist
ORD Operational Requirements Document
ORNL Oak Ridge National Laboratory
OS Operating System
OSA Open Security Architecture
OSCI OS Command Injection
OSD Object Based Storage Device
OSD Office of The Secretary of Defense
OSD/JS Office of The Secretary of Defense/Joint Staff
OSHA Occupational Safety & Health Administration
OSI Open System Interconnection
OSINT Open Source Intelligence
OSP Organizational Security Policies
OSPF Open Shortest Path First
OSS Open Source Software
OSSTMM Open Source Security Testing Methodology Manual
OSVDB Open Source Vulnerability Database
OT&E Operational Test & Evaluation
OTA Over The Air
OTP One Time Password
OTT Over The Top
OU Organizational Unit
OUSD (P) Office of The Under Secretary of Defense (Policy)
OVAL Open Vulnerability & Assessment Language
OWASP Open Web Application Security Project
OWL-S Web Ontology Language For Services
P2P Peer To Peer
P2PE Point To Point Encryption
P2V Physical To Virtual
PaaS Platform As A Service
PAC Privilege Attribute Certificate
PAC Protected Access Credential
PACS Physical Access Control Systems
PACS Picture Archiving & Communication System
PAD Packet Assembler Disassembler
PAD Peer Authorization Database
PA-DSS Payment Application Data Security Standard
PAM Pluggable Authentication Module
PAM Privileged Access Management
PAN Personal Area Network
PAN Primary Account Number
PAO Principal Authorizing official
PAOS Reverse HTTP Binding For Soap
PAP Password Authentication Protocol
PAP Policy Access Point
PAS Publicly Available Specification
PASTA Process For Attack Simulation & Threat Analysis
PAT Port Address Translation
P-ATO Provisional Authorization To Operate
PBA Pre Boot Authentication
PBAC Policy Based Access Control
PBC Prepared By Client
PBCC Packet Binary Convolution Code
PBE Pre Boot Environment
PBKDF1 Password Based Key Derivation Function 1
PBKDF2 Password Based Key Derivation Function 2
PBN Private Blog Network
PBX Private Branch Exchange
PC Personal Computer
PCB Printed Circuit Board
PCC Proof Carrying Code
PCCIP President’s Commission On Critical Infrastructure Protection
PCI Payment Card Industry
PCI Personal Identity Verification Card Issuer
PCI DSS Payment Card Industry Data Security Standard
PCI PA DSS Payment Card Industry Payment Application Data Security Standard
PCI-SCC Payment Card Industry Security Standards Council
PCI-X Peripheral Component Interconnect Extended
PCMCIA Personal Computer Memory Card International Association
PCN Process Control Network
PCP Payload Compression Protocol
PCS Process Control System
PCSF Process Control System Forum
PCSRF Process Control Security Requirements Forum
PDA Personal Digital Assistant
PDD Presidential Decision Directive
PDF Portable Document Format
PDI Physical Device Identifiers
PDM Precedence Diagramming Method
PDP Packet Data Protocol
PDP Policy Decision Point
PDS Practice Dangerous To Security
PDS Protected Distribution System
PDS Public Domain Software
PDU Power Distribution Units
PDU Protocol Data Unit
PEAP Protected Extensible Authentication Protocol
PED Pin Entry Devices
PED Portable Electronic Device
PEM Privacy Enhanced Mail
PEM Program Element Monitor
PEP Policy Enforcement Point
PERT Program Evaluation & Review Technique
PFS Perfect Forward Secrecy
PGP Pretty Good Privacy
PHI Protected Health Information
PHOTINT Photographic Intelligence
PHP Hypertext Preprocessor
PHPCI PHP Command Injection
PHR Personal Health Record
PHY Physical
PI Police Intelligence
PI Preliminary Inquiry
PIA Privacy Impact Assessment
PICS Platform For Internet Content Selection
PID Personnel Identification Data
PII Personally Identifiable Information
PIM Personal Information Management
PIM-SM Protocol Independent Multicast—Sparse Mode
PIN Personal Identification Number
PIP Policy Information Point
PIPEDA Personal Information Protection & Electronic Documents Act
PIR Passive Infrared Sensor
PIR Public Interest Registry
PIT Platform Information Technology
PIV Personal Identity Verification
PIX Proprietary Application Identifier Extension
PKC Public Key Cryptography
PKCS Public Key Cryptography Standard
PKI Public Key Infrastructure
PKM Privacy Key Management
PKMv1 Privacy Key Management Protocol Version 1
PKMv2 Privacy Key Management Protocol Version 2
PL Public Law
PLC Programmable Logic Controller
PM Private Message
PM Program Manager
PM Project Manager
PM/SM Program Manager/System Manager
PMA Policy Management Authority
PMBOK Project Management Body of Knowledge
PMK Pairwise Master Key
PMKSA Pairwise Master Key Security Association
PMO Program Management Office
PMP Point To Multipoint
PMP Program Management Plan
PMTU Path Maximum Transmission Unit
PMU Power Management Unit
PN Packet Number
PNG Portable Network Graphics
POA&M Plan of Action & Milestones
POC Point of Contact
POC Proof of Concept
PoE Power Over Ethernet
POM Program Objective Memorandum
PON Passive Optical Network
POODLE Padding Oracle On Downgraded Legacy Encryption
POP Post Office Protocol
POP Point of Presence
POP3 Post Office Protocol Version 3
POS Point of Sale
POS Point of Service
POSIX Portable Operating System Interface
POST Power On Self Test
PoT Proof of Technology
POTS Plain Old Telephone Service
PP Protection Profile
PPACA Patient Protection & Affordable Care Act
PPC Pay Per Click
PPGA Plastic Pin Grid Array
PPP Point To Point Protocol
PPP Program Protection Plan
PPS Internet Protocol Suite & Associated Ports
PPSM Ports Protocols & Services Management
PPTP Point To Point Tunneling Protocol
PPVPN Provisioner Provided Virtual Private Network
PQQ Pre Qualification Questionnaire
PR Pagerank
PRA Paperwork Reduction Act
PRAM Parameter Random Access Memory
Pre-PAK Pre Primary Authorization Key
PRF Pseudorandom Function
PRISMA Program Review For Information
PRNG Pseudo Random Number Generator
PRNU Photo Response Non Uniformity
PROM Programmable Read Only Memory
PROPIN Proprietary Information
PS Physical Security
PSE Packet Switching Exchange
PSK Pre Shared Key
PSTN Public Switched Telephone Network
PSU Power Supply Unit
PT Path Traversal
PTA Privacy Threshold Analysis
PTK Pairwise Transient Key
PTP Packet Transfer Protocol
PTT Push To Talk
PTV Perceived Target Value
PUB Publication
PUE Power Usage Effectiveness
PUK Personal Unlocking Key
PUM Potentially Unwanted Modification
PV Paravirtualization
PVC Permanent Virtual Circuit
PVG Patch & Vulnerability Group
PXE Preboot Execution Environment
QA Quality Assurance
QBE Query By Example
QDD Query Deserves Diversity
QDF Query Deserves Freshness
QEMU Quick Emulator
QoP Quality of Protection
QoS Quality of Service
QR code Quick Response Code
QRA Quantitative Risk Analysis
QSA Qualified Security Assessor
QUIC Quick UDP Internet Connections
R&D Research & Development
R/W Read/Write
RA Receiver Address
RA Registration Authority
RA Remote Assistance
RA Router Advertisement
RACF Resource Access Control Facility
RACI Responsible Accountable Consulted & Informed
RAD Rapid Application Development
RAdAC Risk Adaptive Access Control
RADIUS Remote Authentication Dial In User Service
RAID Redundant Array of Independent Disks
RAM Random Access Memory
RAN Radio Access Network
RAR Risk Assessment Report
RARP Reverse Address Resolution Protocol
RAS Remote Access Services
RASP Runtime Application Self Protection
RAT Remote Access Tools
RAT Remote Administration Tool
RBAC Role Based Access Control
RBD Reliability Block Diagrams
RBIA Risk Based Internal Audit
RC2 Rivest Cipher 2
RC4 Rivest Cipher 4
RC5 Rivest Cipher 5
RCA Root Cause Analysis
RCE Remote Code Execution
RCE Route Cache Entry
RCERTs Regional Computer Emergency Response Teams
RCFL Regional Computer Forensics Laboratory
RCM Responsibility Center Management
RCP Remote Copy Protocol
RD Restricted Data
RDBMS Relational Database Management System
RDF Resource Description Framework
RDP Remote Desktop Protocol
RDRAM RAMBUS Dynamic Random Access Memory
RDSMS Relational Data Stream Management System
RDT&E Research Development Test & Evaluation
REL Rights Expression Language
REP Robots Exclusion Protocol
REST Representational State Transfer
RF Radio Frequency
RF Random Forest
RFC Request For Comments
RFD Route Flap Damping
RFI Radio Frequency Interference
RFI Remote File Inclusion
RFI Representative of A Foreign Interest
RFI Request For Information
RFID Radio Frequency Identification
RFP Request For Proposal
RFU Reserved For Future Use
RIA Rich Internet Application
RIB Routing Information Base
RID Real Time Inter Network Defense
RID Registered Application Provider Identifier
RII Relevant Information & Intelligence
RIP Routing Information Protocol
RIPE Ncc Réseaux Ip Européens Network Coordination Centre
RIPEMD-160 Race Integrity Primitives Evaluation Message Digest 160
RIPng Routing Information Protocol Next Generation
RIR Regional Internet Registries
RIS Remote Installation Services
RISC Reduced Instruction Set Computer
RL Reinforcement Learning
RMA Reliability
RMA Return Material Authorization
RMF Risk Management Framework
RMON Remote Monitoring
RNG Random Number Generator
RNN Recurrent Neural Network
ROE Rules of Engagement
ROI Return On Investment
ROM Read Only Memory
ROSC Regional Operations & Security Center
ROSI Return On Security Investment
RP Relying Party
RP Responsible Person
RPA Robotic Process Automation
RPC Remote Procedure Call
RPF Reverse Path Forwarding
RPO Recovery Point Objective
RR Resource Record
RRS Reduced Redundancy Storage
RRSIG Resource Record Signature
RS Relay Station
RS Router Solicitation
RSA Rivest Shamir Adelman
RSBAC Rule Set Based Access Control
RSN Robust Security Network
RSNA Robust Security Network Association
RSNIE Robust Security Network Information Element
RSO Reduced Sign On
RSS Really Simple Syndication
RSSI Received Signal Strength Indication
RSVP Resource Reservation Protocol
RT&E Research Test & Evaluation
RTCP Real Time Transport Control Protocol
RTE Runtime Environment
RTF Rich Text Format
RTLS Real Time Location System
RTM Requirements Traceability Matrix
RTO Recovery Time Objective
RTP Real Time Transport Protocol
RTSP Real Time Streaming Protocol
RTT Radio Transmission Technology
RTU Remote Terminal Unit
RTU Remote Telemetry Unit
RuBAC Rule Based Access Control
R-UIM Removable User Identity Module
RUM Real User Measurement
RUM Real User Monitoring
RUP Rational Unified Process
SASE Secure Access Service Edge
S Secret
S&T Science & Technology
S/MIME Secure / Multipurpose Internet Mail Extensions
S2 Intelligence Officer U.S. Army
S3 Simple Storage System
S3 IA S3 Infrequent Access
SA Security Association
SA Source Address
SA System Administrator
SaaS Software As A Service
SABI Secret & Below Interoperability
SABI WG Secret & Below Interoperability Working Group
SABSA Sherwood Applied Business Security Architecture
SACL System Access Control List
SACS Security Access Control Systems
SAD Security Association Database
SAES Security Awareness & Education
SAFECode Software Assurance Forum For Excellence In Code
SAFER Secure & Fast Encryption Routine
SAID Security Association Identifier
SAISO Senior Agency Information Security Officer
SAL Security Assurance Level
SAM Secure Application Module
SAM Security Account Manager
SAM Software Asset Management
SAMATE Software Assurance Metrics & Tool Evaluation
SAML Security Assertion Markup Language
SAMM Software Assurance Maturity Model
SAN Storage Area Network
SANS System Administration Networking & Security Institute
SAP Security Assessment Plan
SAP Special Access Program
SAPCO Sap Central Office
SAQ Self Assessment Questionnaire
SAR Security Assessment Report
SAR Special Access Required
SAS Statement On Auditing Standards
SASL Simple Authentication & Security Layer
SAST Static Analysis Security Testing
SAST Static Application Security Testing
SATA Serial Advanced Technology Attachment
SATAN Systems Administrators’ Tool For Assessing Networks
SBB Solution Building Blocks
SBC Session Border Controller
S-BGP Secure Border Gateway Protocol
SBU Sensitive But Unclassified
SC Subcommittee
SC Supplementary Content
SCA Security Control Assessment / Or Security Control Assessor
SCA Security Control Assessor
SCA Software Composition Analysis
SCA Stored Communications Act
SCADA Supervisory Control & Data Acquisition
SCAO SIPRNET Connection Approval Office
SCAP Security Content Automation Protocol
SCCM System Center Configuration Manager
SCCP Skinny Client Control Protocol
SCCVI Secure Configuration Compliance Validation Initiative
SCD Source Code Disclosure
SCE Service Cryptologic Element
SCG Security Classification Guide
SCG Security Configuration Guide
SCI Sensitive Compartmented Information
SCIF Sensitive Compartmented Information Facility
SCIM System For Cross Domain Identity Management
SCM Search Content Marketing
SCM Software Configuration Management
SCM Supply Chain Management
SCP Secure Copy Protocol
SCRI Secure Compliance Remediation Initiative
SCRM Supply Chain Risk Management
SCSI Small Computer System Interface
SCTP Stream Control Transmission Protocol
SD Secure Digital
SDA Static Data Authentication
SDD System Design Description
SDDC Software Defined Data Center
SDIO Secure Digital Input Output
SDK Software Development Kit
SDL Security Development Lifecycle
SDLC Software Development Life Cycle
SDLC Synchronous Data Link Control
SDLC System Development Life Cycle
SDN Software Defined Network
SDO Standards Development Organization
SDP Service Discovery Protocol
SDP Session Description Protocol
SDP Software Defined Perimeter
SDS Software Defined Storage
SDSL Symmetric Digital Subscriber Line
SD-WAN Software Defined WAN
SE Social Engineering
SE Systems Engineer
SEA Search Engine Advertising
SECaaS Security As A Service
SECDEF Secretary of Defense
SED Self Encrypting Drive
SEI Software Engineering Institute
SELC Systems Engineering Life Cycle
SEM Search Engine Marketing
SEM Security Event Management
SEMP System Engineering Management Plan
SEMS Security Event Management System
SEND Secure Neighbor Discovery
SEO Search Engine Optimization
SEP Secure Entry Point
SEP Systems Engineering Plan
SERM Search Engine Reputation Management
SERP Search Engine Results Page
SES Amazon Simple Email System
SET Secure Electronic Transaction
SET Secure Encrypted Transaction
SEV Secure Encrypted Virtualization
SF Session Fixation
SFA Single Factor Authentication
SFTP Secure File Transfer Protocol
SFTP SSH File Transfer Protocol
SGML Standard Generalized Markup Language
SGSN Serving GPRS Support Node
SGX Software Guard Extensions
SHA Secure Hash Algorithm
SHA-1 Secure Hash Algorithm 1
SHA-2 Secure Hash Algorithm 2
SHA-256 Secure Hash Algorithm 256
shim6 Site Multihoming By Ipv6 Intermediation
SHS Secure Hash Standard
S-HTTP Secure Hypertext Transfer Protocol
SIA Security Industry Association
SIA System Interconnection Agreement
SIAO Senior Information Assurance Officer
SIC System Identification Code
SID Security Identifier
SIEM Security Information & Event Management
SIG Special Interest Group
SII Suitability/Security Investigation Index
SIIT Stateless IP/ICMP Translation Algorithm
SIL Safety Integrity Level
SIM Security Information Management
SIM Subscriber Identity Module
SIO Senior Intelligence Officer
SIO Special Information Operations
SIP Session Initiation Protocol
SIPRNet Secret Internet Protocol Router Network
SIS Safety Instrumented System
SISO Senior Information Security Officer
SISR Signals Intelligence Security Regulation
SIT System Integration Testing
SITR Secret Internet Protocol Router Network Information Technology Registry
SKE Security Key Exchange
SKEME Secure Key Exchange Mechanism
SKid Script Kiddie
SKIP Simple Key– Management For Internet Protocol
SKPP Separation Kernel Protection Profiles
SLA Service Level Agreement
SLE Single Loss Expectancy
SLI Scalable Link Interface
SLIP Serial Line Internet Protocol
SLO Service Level Objective
SLR Service Level Requirement
SM Social Media
SM System Manager
SMART Self Monitoring Analysis & Reporting Technology
SMB Server Message Block
SME Subject Matter Expert
SMI Security Management Interface
SMM Social Media Marketing
SMO Social Media Optimization
SMP Social Media Platform
SMS Short Message Service
SMS Systems Management Server
SMTP Simple Mail Transfer Protocol
SNA Systems Network Architecture
SNAP Systems/Networks Approval Process
SNL Sandia National Laboratories
SNMP Simple Network Management Protocol
SNOMED CT Systematized Nomenclature of Medicine Clinical Terms
SNS Simple Notification Service
SNTP Simple Network Time Protocol
SOA Service Oriented Architecture
SOA Start of Authority
SOAP Simple Object Access Protocol
soBGP Secure Origin Border Gateway Protocol
SOC Security Operations Center
SOC Service Organization Control
SoC System On A Chip
SOCKS Socket Secure
SoD Segregation of Duties
SoD Separation of Duties
SOHO Small Office / Home Office
SOMAP Security Officers Management & Analysis Project
SOMF Service Oriented Modeling Framework
SONET Synchronous Optical Networking
SOO Statement of Objectives
SOP Standard Operating Procedure
SOR System of Records
SORN System of Records Notice
SOS System of Systems
SOW Statement of Work
SOX Sarbanes Oxley
SP Security Plan
SP Service Pack
SP Special Publication
SPA Simple Power Analysis
SPAN Switched Port Analyzer
SPAP Shiva Password Authentication Protocol
SPB Security Policy Board
SPD Security Policy Database
SPF Sender Policy Framework
SPI Schedule Performance Index
SPI Security Parameter Index
SPI Sensitive Personal Information
SPI Stateful Packet Inspection
SPL Structured Product Labeling
SPML Service Provisioning Markup Language
SPNEGO Simple & Protected GSSAPI Negotiation Mechanism
SPOF Single Point of Failure
SPP-ICS System Protection Profile For Industrial Control Systems
SPX Sequenced Packet Exchange
SQL Structured Query Language
SQLi SQL Injection
SQS Simple Queue Service
SQUARE Security Quality Requirements Engineering
SR Service Release
SR Speech Recognition
SRAM Static Random Access Memory
SRE Site Reliability Engineering
SRES Signed Response
SRG Security Requirements Guide
sRGB Standard Red Green Blue
SRS Software Requirements Specification
SRTM Security Requirements Traceability Matrix
SRTP Secure Real Time Transport Protocol
SS Subscriber Station
SS7 Signaling System #7
SSAA Systems Security Authorization Agreement
SSAE 16 Statement On Standards For Attestation Engagements 16
SSD Solid State Drive
SSDC Space & Strategic Defense Command
SSDP Simple Service Discovery Protocol
SSE Server Side Encryption
SSE System Security Engineering
SSE-CMM Systems Security Engineering Capability Maturity Model
SSEM System Security Engineering
SSH Secure Shell
SSI Server Side Includes
SSID Service Set Identifier
SSII Suitability/Security Investigations Index
SSL Secure Socket Layer
SSL Secure Sockets Layer
SSL VPN Secure Sockets Layer Virtual Private Network
SSLF Specialized Security Limited Functionality
SSM Site Security Manager
SSM System Security Manager
SSMP System Security Management Plan
SSN Social Security Number
SSO Single Sign On
SSoD Static Separation of Duty
SSP Secure Simple Pairing
SSP System Security Plan
SSPI Security Support Provider Interface
SSRF Server Side Request Forgery
SSTP Secure Socket Tunneling Protocol
ST Security Target
ST&E Security Test & Evaluation
STA Station
STaaS Storage As A Service
STAC Student Technology Advisory Committee
STAR Security Trust & Assurance Registry
STIG Security Technical Implementation Guide
STIGs Security Technical Implementation Guides
STIX Structured Threat Information Expression
STP Security Test Plan
STP Spanning Tree Protocol
STRIDE Spoofing Tampering Repudiation Information Disclosure Denial of Service Elevation of Privilege
STS Security Token Service
SUID Set User Id
SVG Scalable Vector Graphics
SVM Support Vector Machine
SWEBOK Software Engineering Body of Knowledge
SWGDE Scientific Working Group On Digital Evidence
SWS Simple Workflow Service
SWSA Semantic Web Services Initiative Architecture
SYN Synchronization
SZ Security Zone
T&E Test & Evaluation
TA Test Assertion
TA Transmitter Address
TaaS Testing As A Service
TAC Terminal Action Code
TACACS Terminal Access Controller Access Control System
TACACS+ Terminal Access Controller Access Control System Plus
TADR Threat Agent Detection & Response
TAG Technical Advisory Group
TAP Terminal Access Point
TARA Threat Assessment & Remediation Analysis
TB Terabyte
TC Technical Committee
TC Transaction Certificate
TC68 ISO/IEC Technical Committee 68
TCB Trusted Computing Base
TCO Total Cost of Ownership
TCP Transmission Control Protocol
TCP/IP Transmission Control Protocol/Internet Protocol
TCSEC Trusted Computer System Evaluation Criteria
TCSEC / ITSEC Trusted Computer System Evaluation Criteria / Information Technology Security Evaluation Criteria
TDE Transparent Data Encryption
TDEA Triple Data Encryption Algorithm
TDM Time Division Multiplexing
TDMA Time Division Multiple Access
TDS Tabular Data Stream
TEID Tunnel Endpoint Identifier (GTPv1)
TEK Traffic Encryption Key
TEMP Test & Evaluation Master Plan
TERENA Trans European Research & Education Networking Association
TFN Tribe Flood Network
TFT Thin Film Transistor
TFTP Trivial File Transfer Protocol
TGS Ticket Granting Service
TGT Ticket Granting Ticket
THREATCON Threat Condition
TIA Telecommunications Industry Association
TIARA Tactical Intelligence & Related Activities
TID Tag Identifier
TID Tamper Indicating Device
TID Tunnel Identifier (GTPv0)
TIFF Tagged Image File Format
TIMS Treaty Information Management System
TIP Technology Innovation Program
TISS Telecommunications & Automated Information Systems Security
TK Temporal Key
TKIP Temporal Key Integrity Protocol
TLD Top Level Domain
TLS Transport Layer Security
TMO Technology Management Office
TMOVS Modes of Operation Validation System For The Triple DES Algorithm
TOC / TOU Time of Check / Time of Use
ToD Time of Day
TOE Target of Evaluation
TOGAF The Open Group Architecture Framework
Tor The Onion Router
ToS Terms of Service
TOS Trusted Operating System
ToS Type of Service
TPA Third Party Administrator
TPC Transmission Power Control
TPM Technical Performance Measurement
TPM Trusted Platform Module
TPS Transaction Per Second
TPS Transaction Processing System
TPU Tensor Processing Unit
TR Technical Report
TRANSEC Transmission Security
TRMC Test Resource Management Center
TRT Transport Relay Translator
TS Technical Specification
TSA Time Stamping Authority
TSC TKIP Sequence Counter
TSIG Secret Key Transaction Authentication For DNS
TSIG Transaction Signature
TSN Transitional Security Network
TSN Trusted Systems & Networks
TSP Time Stamp Protocol
TT&E Test
TTF Tag Talks First
TTF TrueType Font
TTL Time To Live
TTLS Tunneled Transport Layer Security
TTP Tactics Techniques & Procedures
TTP Trusted Third Party
TTY Teletype
TVR Terminal Verification Results
TWAIN Toolkit Without An Informative Name
TXT Text
U Unclassified
U.S. United States
U.S.C. United States Code
UA Universal Analytics
UAA Uncontrolled Access Area
UAC User Account Control
UART Universal Asynchronous Receiver/Transmitter
UAT User Acceptance Testing
UBA / UEBA User Behavior Analytics
UBR Universal Description
UC Unified Capabilities
UC Unified Communications
UCAO Unclassified Connection Approval Office
UCC Uniform Code Council
UCDMO Unified Cross Domain Management Office
UCE Unsolicited Commercial Email
UCMJ Uniform Code of Military Justice
UCNI Unclassified Controlled Nuclear Information
UD Unauthorized Disclosure
UDDI Universal Description Discovery & Integration
UDF Universal Disk Format
UDID Unique Device Identifier
UDP User Datagram Protocol
UEFI Unified Extensible Firmware Interface
UFS Unix File System
UHF Ultra High Frequency
UI User Interface
UI/UX User Interface/User Experience
UICC Universal Integrated Circuit Card
UK United Kingdom
UL Underwriters’ Laboratories
ULA Unique Local Address
ULP Upper Layer Protocol
UML Unified Modeling Language
UMLS Unified Medical Language System
UMPC Ultra Mobile Personal Computer
UMTS Universal Mobile Telecommunications System
UNC Universal Naming Convention
UNII Unlicensed National Information Infrastructure
UPC Universal Product Code
UPN User Principal Name
UPnP Universal Plug & Play
UPS Uninterruptible Power Supply
UR User Representative
URI Uniform Resource Identifier
URL Uniform Resource Locator
URLLC Ultra Reliable & Low Latency Communications
US United States
USACIDU United States Army Criminal Investigation Command
USAF United States Air Force
USB Universal Serial Bus
US-CERT United States Computer Emergency Readiness Team
USD (AT&L) Under Secretary of Defense For Acquisition Technology & Logistics
USD (I) Under Secretary of Defense For Intelligence
USD (P&R) Under Secretary of Defense For Personnel & Readiness
USD (P) Under Secretary of Defense For Policy
USIM Universal Subscriber Identity Module
USPS United States Postal Service
USSAN United States Security Authority/North Atlantic Treaty Organization (Nato)
USSID United States Signals Intelligence Directive
USSTRATCOM United States Strategic Command
UTC Coordinated Universal Time
UTF Unicode Transformation Format
UTM Unified Threat Management
UUCP Unix To Unix Copy Protocol
UUID Universally Unique Identifier
UWB Ultrawideband
V2I Vehicle To Infrastructure
V2N Vehicle To Network
V2P Vehicle To Passenger
V2R Vehicle To Roadway
V2V Vehicle To Vehicle
V2X Vehicle To Everything
VAAP Vulnerability & Assessment Program
VAN Value Added Network
VAS Vulnerability Assessment System
VB Visual Basic
VB.NET Visual Basic .Net
VBA Visual Basic For Applications
VBS Visual Basic Script
VCI Virtual Channel Identifier
vCPE Virtualized Customer Premises Equipment
VCS Veritas Cluster Server
VCS Version Control Systems
VDC Virtual Data Center
VDI Virtual Desktop Infrastructure
VDU Visual Display Unit
VFAT Virtual File Allocation Table
VFD Variable Frequency Drive
VG Volume Group
VGA Video Graphics Array
VHD Virtual Hard Drive
VHF Very High Frequency
VIN Vehicle Identification Number
VIP Virtual IP Address
VLAN Virtual Local Area Network
VLB VESA Local Bus
VM Virtual Machine
VMS Voice Mail Service
VMS Vulnerability Management System
VNC Virtual Network Computing
VNIC Virtual Network Interface Card
VoIP Voice Over Internet Protocol
VOIPSA Voice Over IP Security Alliance
VPC Virtual Private Cloud
VPDN Virtual Private Dial Up Network
VPG Virtual Private Gateway
VPI Virtual Path Identifier
VPN Virtual Private Network
VPNC Virtual Private Network Consortium
VPS Virtual Private Server
VRRP Virtual Router Redundancy Protocol
VSM Virtual Supervisor Module
VTL Virtual Tape Library
VXLAN Virtual Extensible Local Area Network
W3C World Wide Web Consortium
WAF Web Application Firewall
WAIS Wide Area Information Server
WAMP Windows Apache MySQL and PHP
WAN Wide Area Network
WAP Web Application Protection
WAP Wireless Access Point
WAP Wireless Access Protocol
WAP Wireless Application Protocol
WaSP Web Standards Project
WAVE Wireless Access For Vehicular Environment
WAYF Where Are You From
WBS Work Breakdown Structure
WCCP Web Cache Coordination Protocol
W-CDMA Wideband Code Division Multiple Access
WDDM Windows Display Driver Model
WDS Wireless Distribution System
WebDAV Web Distributed Authoring & Versioning
WEP Wired Equivalent Privacy
WfMC Workflow Management Coalition
WfMS Workflow Management System
WG Working Group
WHO World Health Organization
WiDEN Wideband Integrated Digital Enhanced Network
WIDPS Wireless Intrusion Detection & Prevention System
WiMAX Worldwide Interoperability For Microwave Access
WIMP Windows Icons Menus Pointer
WINS Windows Internet Name Service
WIPO World Intellectual Property Organization
WLAN Wireless Local Area Network
WMA Warfighting Mission Area
WMAN Wireless Metropolitan Area Network
WMI Windows Management Instrumentation
WML Wired Markup Language
WMM WiFi Multimedia
WORM Write Once Read Many
WP Wordpress
WPA WiFi Protected Access
WPA2 WiFi Protected Access 2
WPAN Wireless Personal Area Network
WRT Work Recovery Time
WS Web Services
WS- Web Services Authorization
WSDL Web Services Definition Language
WSH Windows Script Host
WS-I Web Services Interoperability
WS-Policy Web Services Policy
WS-Privacy Web Services Privacy
WSS4J Web Services Security For Java
WS-Secure Conversation Web Services Secure Conversation
WS-Security Web Services Security
WS-Trust Web Services Trust
WSUS Windows Server Update Services
WTLS Wireless Transport Layer Security
WTO World Trade Organization
WVE Wireless Vulnerabilities & Exploits
WWAN Wireless Wide Area Network
WWN World Wide Name
WWW World Wide Web
WYSIWYG What You See Is What You Get
XaaS Anything As A Service
XACL XML Access Control Language
XACML Extensible Access Control Markup Language
XAML Extensible Application Markup Language
XCBC Xor Cipher Block Chaining
XCCDF Extensible Configuration Checklist Description Format
XDR External Data Representation
XHTML Extensible Hypertext Markup Language
XKMS XML Key Management Specification
XLC Expedited Life Cycle
XML Extensible Markup Language
XMP Extensible Metadata Platform
XMPP Extensible Messaging & Presence Protocol
XOR Exclusive Or
XPathI XPath Injection
XrML Extensible Rights Markup Language
XSD XML Schema Definition
XSL Extensible Stylesheet Language
XSLT Extensible Stylesheet Language Transformation
XSS Cross Site Scripting
YAML YAML Ain’t Markup Language
ZIF Zero Insertion Force
ZMOT Zero Moment of Truth
ZSK Zone Signing Key
  • CISO-as-a-Service
  • Experience
  • Acronym Glossary
Tweets by intecur
About | Privacy Policy | Cookie Policy | Sitemap
Intecur, Inc. Copyright © 2020 All Rights Reserved.
Log in Log out | Edit
  • Digital Transformation
    • Digital Transformation - Definition
    • The Reality
    • The New Global "M's"
    • Global Trends
    • COVID-19
    • Issues & Challenges
    • Strategy
    • What Stage is Your Organization?
  • Corporate Cybersecurity
    • Cybersecurity Today
    • Corporations
    • Executives
    • Compliance
    • Benefits
    • Strategy
    • Security by Design
  • Security / IT Primer
    • General Security Concepts
    • Aspects of Cybersecurity
    • People and Cybersecurity
    • Defender vs. Attacker
    • Complexity vs. Security
    • Resilience vs. Reliability
    • Cyber Hygiene
    • Testing
    • Threats Modeling
    • Traditional vs. IT Domains
    • Traditional vs. IT / Security Engineering
    • What is PCI DSS?
      • PCI Levels
      • PCI Compliance
    • Cyber Insurance
      • Coverage
      • Qualities
    • 5G
    • Aviation
      • Aviation Systems
      • Aviation Networks
  • Advisory Services
    • CISO-as-a-Service
    • Experience
    • Acronym Glossary
  • Contact
    • About Us
    • Partner Login
  • Scroll to top
Close