Glossary of Acronyms
There are 10 kinds of people in the world -
Those who understand binary, and those who don't.
| Acronym | Term |
| (ISC)² | International Information Systems Security Certification Consortium |
| 1xRTT | One Times Radio Transmission Technology |
| 2FA/TFA | Two Factor Authentication |
| 3DES | Triple Data Encryption Algorithm |
| 3DES | Triple Data Encryption Standard |
| 3FA | Three Factor Authentication |
| 3G | 3rd Generation |
| 3GPP | 3rd Generation Partnership Project |
| 3GPP2 | 3rd Generation Partnership Project 2 |
| 3PAO | Third Party Assessor Organization |
| 4D QL | 4D Query Language |
| 4FA, | Four Factor Authentication |
| A | Address Resource Record Type |
| A&A | Assessment & Authorization |
| AA | Abac Attribute Authority |
| AAA | Access Approval Authority |
| AAA | Army Audit Agency |
| AAA | Authentication Authorization Accounting |
| AAAK | Authentication |
| AAC | Application Authentication Cryptogram |
| AAD | Additional Authenticated Data |
| AAL | Authentication Assurance Level |
| AAR | After Action Report |
| AAS | Adaptive Antenna System |
| ABAC | Attribute Based Access Control |
| ABB | Architecture Building Blocks |
| ABCS | Army Battle Command System |
| AC | Application Cryptogram |
| ACA | Access Control Authority |
| ACA | Affordable Care Act |
| ACCM | Asset Configuration Compliance Module |
| ACE | Access Control Entry |
| ACES | Automated Continuing Evaluation System |
| ACID | Atomicity Consistency Isolation Durability |
| ACK | Acknowledgement |
| ACL | Access Control List |
| ACM | Association For Computing Machinery |
| ACO | Accountable Care Organizations |
| ACO | Authenticated Cipher offset |
| ACSI | Assistant Chief of Staff For Intelligence (Army) |
| AD | Active Directory |
| AD | Authenticated Data |
| ADB | Android Debug Bridge |
| ADC | Analog To Digital Converter |
| ADF | Automatic Document Feeder |
| ADFS | Active Directory Federation Services |
| ADH | Anonymous Diffie Hellman |
| ADOT | Academic Directors of Technology |
| ADP | Automated Data Processing |
| ADPSO | Automated Data Processing Security Officer |
| ADPSSO | Automated Data Processing System Security Officer |
| ADR | Adjudicative Desk Reference |
| ADS | Alternate Data Stream |
| ADS | Automated Data System |
| ADT | Android Development Tools |
| ADT | Admissions Discharge & Transfer |
| AES | Advanced Encryption Standard |
| AES-256 | Advanced Encryption Standard 256 |
| AES-512 | Advanced Encryption Standard 512 |
| AES-CBC | Advanced Encryption Standard Cipher Block Chaining |
| AES-CTR | Advanced Encryption Standard Counter Mode |
| AF | Air Force |
| AFAIK | As Far As I Know |
| AFB | Air Force Base |
| AFC4A | Air Force C4 Agency |
| AFCAF | Air Force Central Adjudication Facility |
| AFH | Adaptive Frequency Hopping |
| AFI | Air Force Instruction |
| AFIWC | Air Force Information Warfare Center |
| AFMAN | Air Force Manual |
| AFOSF | Air Force Office of Security Forces |
| AFOSI | Air Force Office of Special Investigation |
| AFOSP | Air Force Office of Security Police |
| AFP | Apple Filing Protocol |
| AFPC | Air Force Personnel Center |
| AFPD | Air Force Policy Directive |
| AFR | Air Force Regulation |
| AFSCO | Air Force Security Clearance Office |
| AG | Attorney General |
| AG/SCM | Advisory Group/Security Countermeasures |
| A-GPS | Assisted Global Positioning System |
| AGS | Architectural Graphic Standards |
| AH | Authentication Header |
| AI | Artificial Intelligence |
| AIA | Air Intelligence Agency |
| AIA | Army Intelligence Agency |
| AICPA | American Institute of Certified Public Accountants |
| AID | Application Identifier |
| AIDC | Automatic Identification & Data Capture |
| AIM | Association For Automatic Identification & Mobility |
| AIMS | Automated Infrastructure Management System |
| AIP | Application Interchange Profile |
| AIS | Artificial Intelligence System |
| AIS | Automated Information Systems |
| AISS | Automated Information Systems Security |
| AISSP | Automated Information Systems Security Plan |
| AIT | Automatic Identification Technology |
| AIX | Advanced Interactive Executive |
| AJAX | Asynchronous JavaScript & XML |
| AK | Authorization Key |
| AKID | Authorization Key Identifier |
| AKM | Authentication & Key Management |
| ALE | Annualized Loss Expectancy |
| ALG | Application Layer Gateway |
| ALU | Arithmetic Logic Unit |
| AMA | Ask Me Anything |
| AMI | Amazon Machine Image |
| AMIDS | Audit Monitoring & Intrusion Detection System |
| AMPS | Advanced Mobile Phone System |
| ANACI | Access National Agency Check With Written Inquiries |
| ANF | Application Normative Framework |
| ANN | Artificial Neural Network |
| ANSI | American National Standards Institute |
| AO | Area of Operations |
| AO | Authorizing official |
| AOA | Analysis of Alternatives |
| AOA | Area of Application |
| AODR | Authorizing official Designated Representative |
| AP | Access Point |
| APC | Ambulatory Payment Classification |
| APEC | Asia Pacific Economic Cooperation |
| API | Application Programming Interface |
| APK | Android Package Kit |
| APM | Actions Per Minute |
| APN | Access Point Names |
| APT | Advanced Persistent Threat |
| APU | Accelerated Processing Unit |
| APWG | Anti Phishing Working Group |
| AQ-SAP | Acquisition Special Access Program |
| ARC | Authorization Response Code |
| ARIN | American Registry For Internet Numbers |
| ARN | Amazon Resource Name |
| ARO | Annualized Rate of Occurrence |
| ARP | Address Resolution Protocol |
| ARPA | Advanced Research Projects Agency |
| ARPC | Authorization Response Cryptogram |
| ARQC | Authorization Request Cryptogram |
| ARRA | American Recovery & Reinvestment Act |
| AS | Authentication Server |
| AS | Autonomous System |
| ASAP | As Soon As Possible |
| ASC | Anti Spyware Coalition |
| ASC | X9 Accredited Standards Committee X9 |
| ASCII | American Standard Code For Information Interchange |
| ASCLD-LAB | The American Society of Crime Laboratory Directors Laboratory Accreditation Board |
| ASD (C31) | Assistant Secretary of Defense For Command Control Communication & Intelligence |
| ASDR | Application Security Desk Reference |
| ASG | Abstract Semantic Graph |
| ASG | Auto Scaling Group |
| ASIMS | Automated Security Incident Measuring System |
| ASLR | Address Space Layout Randomization |
| ASN | Autonomous System Number |
| ASN.1 | Abstract Syntax Notation 1 |
| ASP | Active Server Pages |
| ASP | Application Service Provider |
| ASSIST | Automated System Security Incident Support Team |
| AST | Abstract Syntax Tree |
| ASV | Approved Scanning Vendor |
| ASVS | Application Security Verification Standards |
| ATA | Advanced Technology Attachment |
| ATC | Anatomical Therapeutic Chemical Classification System |
| ATC | Application Transaction Counter |
| ATC | Authorization To Connect |
| ATD | Authorization Termination Date |
| ATIM | Announcement Traffic Indication Message |
| ATM | Asynchronous Transfer Mode |
| ATM | Automatic Teller Machine |
| ATO | Authorization To Operate |
| ATX | Advanced Technology Extended |
| AU | Activation Unit |
| AUP | Acceptable Use Policy |
| AUP | Agreed Upon Procedures |
| AV | Antivirus |
| AVIEN | Anti Virus Information Exchange Network |
| AVP | Attribute Value Pair |
| AVX | Advanced Vector Extensions |
| AWS | Amazon Web Services |
| AZ | Availability Zone |
| b | Bit |
| B | Byte |
| B2B | Business To Business |
| B2C | Business To Consumer |
| BA | Business Associate |
| BAA | Business Associate Agreement |
| BAPI | Biometric Application Programming Interface |
| BASE | Basically Available Soft State Eventually Consistent |
| Bash | Bourne Again Shell |
| BBS | Bulletin Board System |
| BC | Business Continuity |
| BCM | Business Continuity Management |
| BCP | Best Current Practice |
| BCP | Business Continuity Plan |
| BCWP | Budgeted Cost of Work Performed |
| BCWS | Budgeted Cost of Work Scheduled |
| BDM | Banner Document Management |
| BGAN | Broadband Global Area Network |
| BGP | Border Gateway Protocol |
| BGP-4 | Border Gateway Protocol 4 |
| BI | Business Intelligence |
| BIA | Bump In The Api |
| BIA | Business Impact Analysis |
| BINAS | Biosafety Information Network Advisory System |
| BioAPI | Biometric Application Programming Interface |
| BIOS | Basic Input Output System |
| BIPN | Background Investigation Plus Current National Agency Check |
| BIS | Bureau of Industry & Security |
| BISS | Base & Installation Security System |
| BITS | Background Intelligent Transfer Service |
| BITS | Bump In The Stack |
| Blob | Binary Large Object |
| BMA | Business Mission Area |
| BMS | Balanced Magnetic Switch |
| BPEL | Business Process Execution Language |
| BPML | Business Process Modeling Language |
| BPO | Business Process Outsourcing |
| BPSS | Business Process Specification Schema |
| BREW | Binary Runtime Environment For Wireless |
| BRM | Business Reference Model |
| BRP | Business Recovery (Resumption) Plan |
| BS | Base Station |
| BS | British Standard |
| BSC | Base Station Controller |
| BSC | Binary Synchronous Communications |
| BSI | British Standards Institution |
| BSIA | British Security Industry Association |
| BSIMM | Building Security In Maturity Model |
| BSoD | Blue Screen of Death |
| BSP | Best Security Practice |
| BSS | Basic Service Set |
| BSSID | Basic Service Set Identifier |
| BT | Bluetooth |
| BTL | Block Transformation Layer |
| BTNS | Better Than Nothing Security |
| BTS | Base Transceiver Station |
| BU | Binding Update |
| BUA | Binding Update Acknowledgement |
| BYOA | Bring Your Own Apps |
| BYOC | Bring Your Own Cloud |
| BYOD | Bring Your Own Device |
| BYOE | Bring Your Own Encryption |
| BYOI | Bring Your Own Identity |
| BYON | Bring Your Own Network |
| C&A | Certification & Accreditation |
| C&A WG | Certification & Accreditation Working Group |
| C2 | Command & Control |
| C2W | Command & Control Warfare |
| C4 | Command Control Communications & Computers |
| C4ISR | Command Control Communications Computer Intelligence Surveillance & Reconnaissance |
| CA | Certificate Authority |
| CA | Certification Agent |
| CAAP | Critical Asset Assurance Program |
| CaaS | Compliance As A Service |
| CaaS | Content As A Service |
| CAB | Change Advisory Board |
| CAC | Common Access Card |
| CADE | Corporate Average Data Center Efficiency |
| CAIDA | Cooperative Association For Internet Data Analysis |
| CAK | Card Authentication Key |
| CAL | Category Assurance List |
| CAM | Card Authentication Method |
| CAN | Computer Network Attack |
| CAN-SPAM | Controlling The Assault of Non Solicited Pornography & Marketing Act |
| CAO | Contract Administration Office |
| CAP | Connection Approval Program |
| CAP | Controlled Access Program |
| CAP | Corrective Action Plan |
| CAPCO | Controlled Access Program Coordination Office |
| CAPEC | Common Attack Pattern Enumeration & Classification |
| CAPEX | Capital Expenditure |
| CAPK | Certificate Authority Public Key |
| CAPTCHA | Completely Automated Public Turing Test To Tell Computers & Humans Apart |
| CARO | Computer Antivirus Research Organization |
| CARVER | Criticality Accessibility Recuperability Vulnerability Effect & Recognizability |
| CAS | Casualty Actuarial Society |
| CAS | Central Authentication System |
| CASB | Cloud Access Security Broker |
| CAV | Card Authentication Value |
| CAVP | Cryptographic Algorithm Validation Program |
| CAVS | Connected & Automated Vehicles |
| CBA | Cost Benefit Analysis |
| CBAC | Context Based Access Control |
| CBC | Cipher Block Chaining |
| CBC-MAC | Cipher Block Chaining Message Authentication Code |
| CBEFF | Common Biometric Exchange File Format |
| CBI | Confidential Business Information |
| CBIPM | Confidential Business Information Protective Measure |
| CBSP | Cloud Based Security Providers |
| CC | Common Criteria |
| CCA | Clinger Cohen Act |
| CCA | Cloud Computing Agreements |
| CCB | Change Control Board |
| CCB | Configuration Control Board |
| CCE | Common Configuration Enumeration |
| CCEVS | Common Criteria Evaluation & Validation Scheme |
| CCI | Control Correlation Identifier |
| CCIPS | Computer Crime & Intellectual Property Section |
| CCK | Complementary Code Keying |
| CCM | Cloud Controls Matrix |
| CCM | Counter Mode With CBC MAC |
| CCMP | Counter Mode With Cipher Block Chaining Message Authentication Code Protocol |
| CCP | Common Control Provider |
| CCRA | Cloud Computing Reference Architecture |
| CCRA | Common Criteria Recognition Arrangement |
| CCSS | Common Configuration Scoring System |
| CCT | Correlated Color Temperature |
| CCTA | Central Computer & Telecommunications Agency |
| CCTL | Common Criteria Testing Laboratory |
| ccTLD | Country Code Top Level Domain |
| CCTV | Closed Circuit Television |
| CD | Checking Disabled |
| CD | Compact Disc |
| CD | Cross Domain |
| CDA | Combined Dynamic Data Authentication |
| CDC | Centers For Disease Control |
| CDE | Cardholder Data Environment |
| CDFS | Compact Disc File System |
| CDMA | Code Division Multiple Access |
| CDMI | Cloud Data Management Interface |
| CDN | Content Delivery Network |
| CDN | Content Distribution Network |
| CDO | Chief Data Officer |
| CDR | Call Detail Records |
| CDR | Critical Design Review |
| CD-R | Compact Disc Recordable |
| CD-ROM | Compact Disc Read Only Memory |
| CD-RW | Compact Disc Rewritable |
| CDS | Cross Domain Solution |
| CDSE | Center For Development of Security Excellence |
| CDSSO | Cross Domain Single Sign On |
| CE | Compromising Emanations |
| CE | Covered Entity |
| CEM | Common Evaluation Methodology |
| CEO | Chief Executive Officer |
| CER | Canonical Encoding Rules |
| CER | Crossover Error Rate |
| CERIAS | Center For Education & Research In Information Assurance & Security |
| CERT | Computer Emergency Response Team |
| CERT/CC | Cert/Coordination Center |
| CF | Compact Flash |
| CFAA | Computer Fraud & Abuse Act |
| CFB | Cipher Feedback |
| CFI | Computer & Financial Investigations |
| CFO | Chief Financial Officer |
| CFR | Code Federal Regulations |
| CFR | Code of Federal Regulations |
| CFTT | Computer Forensics Tool Testing |
| CGA | Cryptographically Generated Addresses |
| CGI | Common Gateway Interface |
| CHAP | Challenge Handshake Authentication Protocol |
| CHUID | Cardholder Unique Identifier |
| CI | Counterintelligence |
| CI | Critical Information |
| CI/CD | Continuous Integration/Continuous Deployment |
| CIA | Central Intelligence Agency |
| CIAC | Computer Incident Advisory Capability |
| CIAO | Critical Infrastructure Assurance Office |
| CIAR | Counterintelligence Awareness & Reporting |
| CID | Card Id |
| CID | Cryptogram Information Data |
| CIDR | Classless Inter Domain Routing |
| CIFA | Counterintelligence Field Activity |
| CIFS | Common Internet File System |
| CIHI | Canadian Institute For Health Information |
| CIIA | Critical Infrastructure Information Act |
| CIK | Crypto Ignition Key |
| CIO | Chief Information Officer |
| CIP | Critical Infrastructure Protection |
| CIPA | Classified Information Procedures Act |
| CIPC | Critical Infrastructure Protection Committee |
| CIPSEA | Confidential Information Protection & Statistical Efficiency Act |
| CIPWG | Critical Infrastructure Protection Working Group |
| CIR | Committed Information Rate |
| CIRC | Computer Incident Response Capability |
| CIRC | Computer Incident Response Center |
| CIRDB | Cerias Incident Response Database |
| CIRT | Computer Incident Response Team |
| CIS | Center For Internet Security |
| CIS | Cryptologic Information System |
| CISA | C4I Integration Support Activity |
| CISA | Certified Information Systems Auditor |
| CISARA | Counterintelligence Security Countermeasures & Related Activities |
| CISC | Complex Instruction Set Computing |
| CISM | Certified Information Systems Security Manager |
| CISO | Chief Information Security Officer |
| CISO | Counterintelligence Support Officer |
| CISP | Counterintelligence Support Plan |
| CISSM | Component Information System Security Manager |
| CISSP | Certified Information Systems Security Professional |
| CITAC | Computer Investigation & Infrastructure Threat Assessment Center |
| CITS | Cooperative Intelligent Transportation System |
| CJCS | Chairman of The Joint Chiefs of Staff |
| CJCSI | Chairman Joints Chiefs of Staff Instruction |
| CKTS | Computerized Key Telephone System |
| CLAS | Classified By |
| CLASP | Comprehensive Lightweight Application Security Process |
| CLF | Common Log Format |
| CLI | Command Line Interface |
| CLOB | Character Large Object |
| CLOUD | Clarifying Lawful Overseas Use of Data |
| CLR | Common Language Runtime |
| cm | Centimeter |
| CM | Classification Management |
| CM | Configuration Management |
| CM | Content Management |
| CM | Countermeasure |
| CMA | Certificate Management Authority |
| CMAC | Cipher Based Method Authentication Code |
| CMB | Change Management Board |
| CMB | Configuration Management Board |
| CMDB | Configuration Management Database |
| CMDS | Computer Misuse Detection System |
| CME | Common Malware Enumeration |
| CMI | Classified Military Information |
| CMIWG | Classification Markings & Implementation Working Group |
| CMM | Capability Maturity Model |
| CMMI | Capability Maturity Model Integration |
| CMOS | Complementary Metal Oxide Semiconductor |
| CMP | Configuration Management Plan |
| CMPL | Civil Monetary Penalties Law |
| CMS | Centers For Medicare & Medicaid Services |
| CMS | Comsec Management System |
| CMS | Configuration Management System |
| CMS | Content Management System |
| CMS | Cryptographic Message Syntax |
| CMSS | Common Misuse Scoring System |
| CMVP | Cryptographic Module Validation Program |
| CN | Common Name |
| CN | Correspondent Node |
| CNA | Computer Network Attack |
| CNAME | Canonical Name |
| CNAP | Cybersecurity National Action Plan |
| CNCI | Comprehensive National Cybersecurity Initiative |
| CND | Computer Network Defense |
| CNDSP | Computer Network Defense Service Provider |
| CNE | Computer Network Exploitation |
| CNN | Convolutional Neural Network |
| CNSI | Classified National Security Information |
| CNSS | Committee On National Security Systems |
| CNSSD | Committee On National Security Systems Directives |
| CNSSI | Committee On National Security Systems Instruction |
| CNSSP | Committee On National Security Systems Policy |
| CO | Cyberspace Operations |
| CoA | Care of Address |
| COBIT | Control Objectives For Information & Related Technologies |
| codec | Coder/Decoder |
| COE | Common Operating Environment |
| COI | Conflict of Interest |
| COM | Component Object Model |
| COMINT | Communications Intelligence |
| CompaaS | Compute As A Service |
| COMSEC | Communications Security |
| CONOPS | Concept of Operations |
| COO | Chief Operating Officer |
| COOP | Continuity of Operations |
| COOP | Continuity of Operations Plan |
| COPPA | Children’S Online Privacy Protection Act |
| CORBA | Common Object Request Broker Architecture |
| CORS | Cross Origin Resource Sharing |
| COSO | Commission of Sponsoring Organizations of The Treadway Commission |
| COTM | Communications On The Move |
| COTS | Commercial off The Shelf |
| CP | Certificate Policy |
| CP | Contingency Plan |
| CPA | Certified Public Accountant |
| CPA | Cost Per Action |
| CPC | Cost Per Click |
| CPE | Common Platform Enumeration |
| CPI | Compression Parameter Index |
| CPL | Cost Per Lead |
| CPM | Cost Per Thousand Impressions |
| CPM | Critical Path Method |
| CPNI | Center For The Protection of National Infrastructure |
| CPO | Chief Privacy Officer |
| CPS | Certificate Practice Statement |
| CPS | Cyber Physical System |
| CPSO | Command Program Security Officer |
| CPSO | Contractor Program Security Officer |
| CPT | Current Procedural Terminology |
| CPTED | Crime Prevention Through Environmental Design |
| CPU | Central Processing Unit |
| CPWG | Crime Prevention Working Group |
| CR | Conversion Rate |
| CRAM | Challenge Response Authentication Mechanism |
| CRAMM | Ccta Risk Analysis & Management Method |
| CRC | Cyclic Redundancy Check |
| CRC–32 | Cyclic Redundancy Check–32 |
| CRG | Compliance Review Group |
| CRL | Certificate Revocation List |
| CRM | Customer Relationship Management |
| CRO | Chief Risk Officer |
| CRO | Conversion Rate Optimization |
| CRT | Cathode Ray Tube |
| CRYPTO | Cryptography |
| CS | Client/Server |
| CS | Comment Spamming |
| CSA | Child Support Agency |
| CSA | Cloud Security Alliance |
| CSA | Cloud Services Agreement |
| CSA | Cognizant Security Agency |
| CSA | Cognizant Security Authority |
| CSA | Computer Security Act |
| CSC | Card Security Code |
| CSCS | Contract Security Classification Specification |
| CSE | Center For Security Evaluation |
| CSEA | Cyber Security Enhancement Act |
| CSEC | Cyber Security Education Consortium |
| CSF | Common Security Framework |
| CSIA | Cyber Security Industries Alliance |
| CSIL | Critical & Sensitive Information List |
| CSIR | Computer (& Network) Security Incident Response |
| CSIRC | Computer Security Incident Response Capability |
| CSIRT | Computer Security Incident Response Team |
| CSISM | Communications Security (COMSEC) Supplement To The Industrial Security Manual |
| CSMA / CD | Carrier Sense Multiple Access/Collision Detection |
| CSO | Chief Security Officer |
| CSO | Cognizant Security Office |
| CSO | Computer Security Object |
| CSP | Cloud Service Provider |
| CSP | Content Security Policy |
| CSP | Credentials Service Provider |
| CSR | Certificate Signing Request |
| CSRC | Computer Security Resource Center |
| CSRDA | Cyber Security Research & Development Act of 2002 |
| CSRF | Cross Site Request Forgery |
| CSS | Cascading Style Sheet |
| CSS | Central Security Service |
| CSS | Constant Surveillance Service |
| CSSIA | Center For Systems Security & Information Assurance |
| CSSM | Communications Computer System Security Manager |
| CSSO | Computer Systems Security Officers |
| CST | Construction Surveillance Technician |
| CSV | Comma Separated Values |
| CT | Computed Tomography |
| CT | Counter Terrorism |
| CTA | Call To Action |
| CTC | Connectionist Temporal Classification |
| CTC | Counterterrorist Center |
| CTCPEC | Canadian Trusted Computer Product Evaluation Criteria |
| CTO | Chief Technology Officer |
| CTP | Composite Theoretical Performance |
| CTR | Click Through Rate |
| CTR | Counter Mode Encryption |
| CTS | Click Through Rate |
| CTS | Computerized Telephone System |
| CTS | Cosmic Top Secret |
| CTSA | Cosmic Top Secret Atomal |
| CTTA | Certified Transient Electromagnetic Pulse Emanation Standard (Tempest) Technical Authority |
| CUDA | Compute Unified Device Architecture |
| CUI | Controlled Unclassified Information |
| CV | Computer Vision |
| C-V2X | Cellular Vehicle To Everything |
| CVC | Card Validation Code |
| CVD | Card Verification Data |
| CVE | Common Vulnerabilities & Exposures |
| CVE | Elo Verification Code |
| CVM | Card Verification Method |
| CVN | Card Validation Number |
| CVR | Card Verification Result |
| CVSS | Common Vulnerability Scoring System |
| CVV | Card Verification Value |
| CW | Code Word |
| CW | Cyber Warfare |
| CWE | Common Weakness Enumeration |
| CWSS | Common Weakness Scoring System |
| CX | Customer Experience |
| CYBEX | Cybersecurity Information Exchange |
| CYOD | Choose Your Own Device |
| D2D | Device To Device |
| DA | Destination Address |
| DA | Domain Authority |
| DAA | Designated Approving Authority |
| DaaS | Desktop As A Service |
| DAC | Discretionary Access Control |
| DAD | Duplicate Address Detection |
| DAM | Database Activity Monitoring |
| DAM | Digital Asset Management |
| DAML | DARPA Agent Markup Language |
| DAMP | Database Activity Monitoring & Prevention |
| D-AMPS | Digital Advanced Mobile Phone Service |
| DAO | Data Access Object |
| DAR | Degree Audit Report |
| DARPA | Defense Advanced Research Projects Agency |
| DAS | Direct Attached Storage |
| DASD | Deputy Assistant Secretary of Defense |
| DASD (DT&E) | Deputy Assistant Secretary of Defense For Developmental Test & Evaluation |
| DAST | Dynamic Application Security Testing |
| DATO | Denial of Authorization To Operate |
| DBA | Database Administrator |
| DBaaS | Database As A Service |
| dBm | Decibels Referenced To One Milliwatt |
| DBMS | Database Management System |
| DC | Data Center |
| DC | Domain Controller |
| DC3 | DOD Cyber Crime Center |
| DCaaS | Data Center As A Service |
| DCC | Defensive Counter Cyber |
| DCE | Distributed Computing Environment |
| DCFL | Defense Computer Forensics Lab |
| DCHC | Defense Counterintelligence & Human Intelligence Center |
| DCI | Director of Central Intelligence |
| DCI SSC | Director of Central Intelligence Special Security Center |
| DCID | Director of Central Intelligence Directive |
| DCL | Declassify |
| DCMA | Defense Contract Management Agency |
| DCMO | Deputy Chief Management Office |
| DCOM | Distributed Component Object Model |
| DCPDS | Defense Civilian Personnel Data System |
| DCS | Defense Clandestine Service |
| DCS | Distributed Control System |
| DCSINT | Deputy Chief of Staff For Intelligence Army |
| DD | Defense Department |
| DDA | Designated Disclosure Authority |
| DDA | Standard Dynamic Data Authentication |
| DDAL | Delegation of Disclosure Authority Letter |
| DDEP | Defense Data Exchange Program |
| DDL | Data Definition Language |
| DDMS | Department of Defense Metadata Specification |
| DDNS | Dynamic Domain Name Services |
| DDOL | Dynamic Data Authentication Data |
| DDoS | Distributed Denial of Service |
| DDR3 | Double Data Rate Type 3 |
| DEA | Data Encryption Algorithm |
| DECL | Declassify |
| DEK | Data Encryption Key |
| DEP | Data Execution Prevention |
| DES | Data Encryption Standard |
| DFARS | Defense Federal Acquisition Regulation Supplement |
| DFS | Distributed File System |
| DFS | Dynamic Frequency Selection |
| DH | Diffie Hellman |
| DHAAD | Dynamic Home Agent Address Discovery |
| DHCP | Dynamic Host Configuration Protocol |
| DHCPv6 | Dynamic Host Configuration Protocol For Internet Protocol V6 |
| DHS | U.S. Department of Homeland Security |
| DIA | Defense Intelligence Agency |
| DIAC | Defense Intelligence Analysis Center |
| DIACAP | Department of Defense Information Assurance Certification & Accreditation Process |
| DIACCS | Defense Ia Command & Control System |
| DIAM | Defense Intelligence Agency Manual |
| DIAMOND | Defense Intrusion Analysis & Monitoring Desk |
| DIAP | Defense Information Assurance Program |
| DIB | Defense Industrial Base |
| DIC | Defense Intelligence Community |
| DICOB | Defense Industrial Security Clearance Oversight Board |
| DICOM | Digital Imaging & Communications In Medicine |
| DIDO | Designated Intelligence Disclosure official |
| DIDS | Distributed Intrusions Detection System |
| DII | Defense Information Infrastructure |
| DIMA | DOD Portion of The Intelligence Mission Area |
| DIMS | Digital Identity Management Service |
| DIN | Drug Identification Number |
| DIRNSA | Director National Security Agency |
| DIS | Defense Investigative Service |
| DISA | Defense Information Systems Agency |
| DISA | Direct Inward System Access |
| DISA | U.S. Defense Information Systems Agency |
| DISN | Defense Information Systems Network |
| DISP | Department of Defense Industrial Security Program |
| DITPR | DOD Information Technology Portfolio Repository |
| DITSCAP | Department of Defense Information Technology Security Certification & Accreditation Process |
| DITSWG | Defense Information Technology Security Working Group |
| DKIM | Domain Keys Identified Mail |
| DLL | Dynamic Link Library |
| DLP | Data Loss Prevention |
| DLT | Distributed Ledger Technology |
| DM | Direct Message |
| DMA | Direct Memory Access |
| DMARC | Domain Based Message Authentication Reporting & Conformance |
| DMC | Defense Megacenter |
| DMCA | Digital Millennium Copyright Act |
| DMDC | Defense Manpower Data Center |
| DMF | Data Management Facility |
| DML | Data Manipulation Language |
| DMNS | Data Management Notification System |
| DMS | Data Management System |
| DMS | Database Migration Service |
| DMS | Defense Message System |
| DMVPN | Dynamic Multipoint VPN |
| DMZ | Demilitarized Zone |
| DN | Distinguished Name |
| DN | Domain Name |
| DNA | Deoxyribonucleic Acid |
| DNI | Director of National Intelligence |
| DNI | Director of Naval Intelligence |
| DNP | Distributed Network Protocol |
| DNS | Domain Name Server |
| DNS | Domain Name System |
| DNSBL | Domain Name System Blacklist |
| DNSSEC | Domain Name System Security Extensions |
| DOC | U.S. Department of Commerce |
| DoD | U.S. Department of Defense |
| DoD ISRMC | DOD Information Security Risk Management Committee |
| DoDAF | Department of Defense Architecture Framework |
| DoDD | Department of Defense Directive |
| DoDI | DOD Instruction |
| DoDIIS | Department of Defense Intelligence Information System |
| DODIN | Department of Defense Information Networks |
| DoDIS | Department of Defense Information System |
| DoDM | DOD Manual |
| DOE | U.S. Department of Energy |
| DOI | Domain of Interpretation |
| DOJ | U.S. Department of Justice |
| DOM | Document Object Model |
| DoN | Department of The Navy |
| DoS | Denial of Service |
| DOS | Disk Operating System |
| DOT&E | Director Operational Test & Evaluation |
| DPA | Data Protection Act |
| DPA | Differential Power Analysis |
| DPH | Department of Public Health |
| DPIA | Data Protection Impact Assessment |
| DPO | Data Protection Officer |
| DQL | Data Query Language |
| DR | Disaster Recovery |
| DRA | Data Recovery Agent |
| DRAM | Dynamic Random Access Memory |
| DRB | Defense Resources Board |
| DRDA | Distributed Relational Database Architecture |
| DREAD | Disaster Reproducibility Exploitability Affected Users & Discoverability |
| DREN | Defense Research & Engineering Network |
| DRM | Digital Rights Management |
| DRMO | Defense Reutilization Management Office |
| DRP | Disaster Recovery Plan |
| DRS | Distributed Resource Scheduler |
| DS | Delegation Signer |
| DS | Direct Support |
| DS | Distribution System |
| DS | Field Differentiated Services Field |
| DSA | Data Sharing Agreement |
| DSA | Designated Security Authority |
| DSA | Digital Signature Algorithm |
| DSAWG | Defense Ia Security Accreditation Working Group |
| DSB | Defensive Security Brief |
| DSBS | Dual Sensor Brake Support |
| DSCA | Defense Security Cooperation Agency |
| DSEC | Director of Security |
| DSL | Digital Subscriber Line |
| DSLAM | Digital Subscriber Line Access Multiplexer |
| DSMC | Defense Systems Management College |
| DSML | Directory Services Markup Language |
| DSN | Defense Switched Network |
| DSN | Delivery Status Notification |
| DSOD | Dynamic Separation of Duty |
| DSS | Defense Security Service |
| DSS | Digital Signature Standard |
| DSSCS | Defense Special Security Communication System |
| DSS-PIC | DSS Personnel Investigations Center |
| DSSS | Defense Special Security System |
| DSTM | Dual Stack Transition Mechanism |
| DT | Directory Traversal |
| DT/PT | Directory / Path Traversal |
| DT&E | Developmental Test & Evaluation |
| DTC | Distributed Transaction Coordinator |
| DTD | Document Type Definition |
| DTIC | Defense Technical Information Center |
| DTLS | Datagram Transport Layer Security |
| DTM | Data Transmission Media |
| DTM | Directive Type Memorandum |
| DTP | Dynamic Trunking Protocol |
| DTR | Derived Test Requirement |
| DTSA | Defense Technology Security Administration |
| DUA | Data Use Agreement |
| DUID | DHCP Unique Identifier |
| DVD | Digital Versatile Disc |
| DVD | Digital Video Disk |
| DVD-R | Digital Video Disc Recordable |
| DVD-RAM | Digital Versatile Disc Random Access Memory |
| DVD-ROM | Digital Video Disc Read Only Memory |
| DVD-RW | Digital Video Disc Rewritable |
| DVMRP | Distant Vector Multicast Routing Protocol |
| DVR | Digital Video Recorder |
| DVR | Digital Voice Recorder |
| DW | Data Warehouse |
| E/APL | Evaluated Approved Product |
| EA | Electronic Attack |
| EA | Enterprise Architecture |
| EA | Evolutionary Acquisition |
| EAC | Electronic Access Control |
| EAC | Estimate At Completion |
| EAI | Enterprise Application Integration |
| EAL | Evaluation Assurance Level |
| EAP | Extensible Authentication Protocol |
| EAP-FAST | Extensible Authentication Protocol Flexible Authentication Via Secure Tunneling |
| EAPOL | Extensible Authentication Protocol Over LAN |
| EAPOL-KCK | Extensible Authentication Protocol Over LAN Key Confirmation Key |
| EAPOL-KEK | Extensible Authentication Protocol Over LAN Key Encryption Key |
| EAP-TLS | Extensible Authentication Protocol Transport Layer Security |
| EAP-TTLS | Extensible Authentication Protocol Tunneled Transport Layer Security |
| EBGP | Exterior Border Gateway Protocol |
| EBS | Amazon Elastic Block Store |
| ebXML | Electronic Business Extensible Markup Language |
| ebXML | Electronic Business Using Extensible Markup Language |
| EC2 | Elastic Compute Cloud |
| EC2N | Elliptic Curve Over G[2N] |
| ECB | Electronic Code Book |
| ECC | Elliptic Curve Cryptography |
| ECC | Error Correction Code |
| ECDH | Elliptic Curve Diffie Hellman |
| ECDSA | Elliptic Curve Digital Signature Algorithm |
| ECM | Enterprise Configuration Manager |
| ECM | Enterprise Content Management |
| ECP | Encryption Control Protocol |
| ECP | Engineering Change Proposal |
| ECPA | Electronic Communications Privacy Act |
| ECS | Ec2 Container Service |
| EDGE | Enhanced Data For Global Evolution |
| EDI | Electronic Data Interchange |
| EDR | Endpoint Detection & Response |
| EDR | Enhanced Data Rate |
| EEPROM | Electrically Erasable Programmable Read Only Memory |
| EF | Exposure Factor |
| EFI | Extensible Firmware Interface |
| EFOIA | Electronic Freedom of Information Act |
| EFS | Elastic File System |
| EFS | Encrypting File System |
| EGP | Exterior Gateway Protocol |
| EH | Extension Header |
| EHR | Electronic Health Record |
| EI | Email Injection |
| EICAR | European Institute For Computer Antivirus Research |
| EIEMA | Enterprise Information Environment Mission Area |
| EIGRP | Enhanced Interior Gateway Routing Protocol |
| EIK | EAP Integrity Key |
| EIP | Elastic IP |
| EITDR | Enterprise Information Technology Database Repository |
| EK | Endorsement Key |
| ELB | Elastic Load Balancer |
| Electronic Mail | |
| eMASS | Enterprise Mission Assurance Support Service |
| eMBB | Enhanced Mobile Broadband |
| EMM | Enterprise Mobility Management |
| EMP | Electromagnetic Pulse |
| EMR | Elastic Map Reduce |
| EMR | Electronic Medical Record |
| EMS | Energy Management System |
| EMS | Enhanced Messaging Service |
| EMS | Enterprise Messaging System |
| EMSK | Extended Master Session Key |
| EMTALA | Emergency Medical Treatment & Labor Act |
| EMV | Europay Mastercard Visa Specification |
| EMVCo | EMV Specifications Company |
| EnCE | Encase Certified Examiner |
| EnCEP | Encase Certified Ediscovery Practitioner |
| ENI | Elastic Network Interface |
| ENISA | European Network & Information Security Agency |
| ENRP | Endpoint Handlespace Redundancy Protocol |
| EOF | End of File |
| EOL | End of Life |
| EOP | Executive Office of The President |
| EP | Eligible Provider |
| EPA | Environmental Protection Agency |
| EPAL | Enterprise Privacy Authorization Language |
| EPC | Electronic Product Code |
| EPCIS | Electronic Product Code Information Services |
| EPHI | Electronic Protected Health Information |
| EPITS | Essential Program Information Technologies & Systems |
| EPROM | Erasable Programmable Read Only Memory |
| EPS | Events Per Second |
| EPSQ | Electronic Personnel Security Questionnaire |
| ERM | Enterprise Risk Management |
| ERP | Enterprise Resource Planning |
| ES | Amazon Elasticsearch Service |
| ES | Electronic Surveillance |
| ESAPI | Enterprise Security Application Programming Interface |
| ESB | Enterprise Service Bus |
| ESMS | Enterprise Security Management System |
| ESMTP | Extended Simple Mail Transfer Protocol |
| ESN | Electronic Serial Number |
| ESP | Encapsulating Security Payload |
| ESS | Electronic Security System |
| ESS | Extended Service Set |
| ESX | Elastic Sky X |
| ET | Electronic Transmission |
| ETA | Education Training & Awareness |
| ETAPWG | Education Training Awareness & Professionalization Working Group |
| ETC | Estimate To Complete |
| ETSI | European Telecommunications Standards Institute |
| ETZ | Equipment Transient Electromagnetic Pulse Emanation Standard (Tempest) Zone |
| EU | European Union |
| EU DP | European Union Data Protection |
| EUI-64 | Extended Unique Identifier 64 Bit |
| EULA | End User License Agreement |
| EUP | Enterprise Unified Process |
| EV | Extended Validation |
| EV-DO | Evolution Data Optimized |
| EVM | Earned Value Management |
| EW | Electronic Warfare |
| EWS | Electronic Warfare Support |
| EXIF | Exchangeable Image File Format |
| EXT | Extended File System |
| EXT2 | Second Extended File System |
| ext2fs | Second Extended Filesystem |
| EXT3 | Third Extended File System |
| ext3fs | Third Extended Filesystem |
| EXT4 | Fourth Extended File System |
| FaaS | Function As A Service |
| FAFSA | Free Application For Federal Student Aid |
| FAIR | Factor Analysis of Information Risk |
| FAQ | Frequently Asked Questions |
| FAR | False Acceptance Rate |
| FAR | Federal Acquisition Regulation |
| FASC-N | Federal Agency Smart Credential Number |
| FASP | Federal Agency Security Practices |
| FAT | Factory Acceptance Testing |
| FAT | File Allocation Table |
| FAT16 | File Allocation Table (16 Bit) File System |
| FB | |
| FBCA | Federal Bridge Certification Authority |
| FBI | Federal Bureau of Investigation |
| FBIS | Foreign Broadcast Information Service |
| FCC | Federal Communications Commission |
| FCIP | Foreign Counterintelligence Program |
| FCL | Facility Security Clearance |
| FCL | Final Checklist List |
| FCPF | Federal PKI Common Policy Framework |
| FCRA | Fair Credit Reporting Act |
| FCS | Frame Check Sequence |
| FDA | Food & Drug Administration |
| FDCC | Federal Desktop Core Configuration |
| FDCE | Federated Development & Certification Environment |
| FDDI | Fiber Distributed Data Interface |
| FDE | Full Disk Encryption |
| FDIC | Federal Deposit Insurance Corporation |
| FDMA | Frequency Division Multiple Access |
| FEA | Federal Enterprise Architecture |
| FEAF | Federal Enterprise Architecture Framework |
| FEK | File Encryption Key |
| FEMA | Federal Emergency Management Agency Only Memory |
| FER | Failure To Enroll Rate |
| FFIEC | Federal Financial Institutions Examination Council |
| FFMIA | Federal Financial Management Improvement Act |
| FHIR | Fast Healthcare Interoperability Resources |
| FHSS | Frequency Hopping Spread Spectrum |
| FI | Foreign Intelligence |
| FIAM | Federated Identity & Access Management |
| FIB | Forwarding Information Base |
| FICC | Federal Identity Credentialing Committee |
| FIDS | Facility Intrusion Detection System |
| FIE | Foreign Intelligence Entity |
| FIFO | First In First Out |
| FILO | First In Last Out |
| FIM | Federated Identity Management |
| FIM | File Integrity Monitoring |
| Fios | Fiber Optic Service |
| FIPS | Federal Information Processing Standard |
| FIPSPUB | Federal Information Processing Standard Publication |
| FIRST | Forum of Incident Response & Security Teams |
| FIS | Foreign Intelligence Services |
| FISA | Foreign Intelligence Surveillance Act |
| FISCAM | Federal Information System Controls Audit Manual |
| FISD | Federal Investigative Services Division |
| FISINT | Foreign Instrumentation Signals Intelligence |
| FISMA | Federal Information Security Management Act |
| FISSEA | Federal Information Systems Security Educators’ Association |
| FIT | Foreign Inspection Team |
| FIU | Field Investigative Unit |
| FIWC | Fleet Information Warfare Center |
| FLETC | Federal Law Enforcement Training Center |
| FLOPS | Floating Point Operations Per Second |
| FM | Frequency Modulated |
| FMR | False Match Rate |
| FMS | Fluhrer Mantin Shamir |
| FN | Foreign National |
| FNMR | False Non Match Rate |
| FOIA | Freedom of Information Act |
| FOIA/PA | Freedom of Information Act/Privacy Act |
| FOMO | Fear of Missing Out |
| FOSS | Free & Open Source Software |
| FOV | Field of View |
| FPC | Federal Preparedness Circular |
| FPE | Format Preserving Encryption |
| FPGA | Field Programmable Gate Array |
| FPKI | Federal Public Key Infrastructure |
| FPKIA | Federal Public Key Infrastructure Architecture |
| FPKIPA | Federal Public Key Infrastructure Policy Authority |
| FPN | Fixed Pattern Noise |
| FPU | Floating Point Unit |
| FQDN | Fully Qualified Domain Name |
| FRAM | Ferroelectric Random Access Memory |
| FRAP | Facilitated Risk Analysis Process |
| FRCP | Federal Rules of Civil Procedure |
| FRD | Formerly Restricted Data |
| FRD | Functional Requirements Document |
| FRR | False Rejection Rate |
| FSB | Frontside Bus |
| FSO | Facility Security Officer |
| FSO | Field Security Office |
| FTC | Federal Trade Commission |
| FTCA | Federal Trade Commission Act |
| FTP | File Transfer Protocol |
| FTPS | File Transfer Protocol Secure |
| FTS | Federal Telecommunications Service |
| FTZ | Facilities Transient Electromagnetic Pulse Emanation Standard (Tempest) Zone |
| FUD | Fully Undetectable |
| FUS | Fast User Switching |
| FY | Fiscal Year |
| G2 | Assistant Chief of Staff G2 Intelligence |
| G-2 | Staff Intelligence Officer |
| GA | Google Analytics |
| GAAP | Generally Accepted Accounting Principles |
| GAO | U.S. Government Accountability Office |
| GAPP | Generally Accepted Privacy Principles |
| GB | Gigabyte |
| GCCS | Global Command & Control System |
| GCLB | Google Cloud Load Balancer |
| GCM | Galois / Counter Mode |
| GCP | Google Cloud Platform |
| GCS | Google Cloud Storage |
| GCSS | Global Combat Support System |
| GDIP | General Defense Intelligence Programs |
| GDPR | General Data Protection Regulation |
| GEOINT | Geospatial Intelligence |
| GFAC | Generalized Framework For Access Control |
| GFE | Government Furnished Equipment |
| GFIRST | Government Forum of Incident Response & Security Teams |
| GHz | Gigahertz |
| GIF | Graphics Interchange Format |
| GIG | Global Information Grid |
| GII | Global Information Infrastructure |
| GINA | Graphical Identification & Authentication |
| GIS | Geographic Information Systems |
| GISRA | Government Information Security Reform Act |
| GKEK | Group Key Encryption Key |
| GLB | Gramm Leach Bliley Act |
| GLBA | Gramm Leach Bliley Act |
| GMITS | Guidelines For The Management of It Security |
| GMK | Group Master Key |
| GNU | Gnu'S Not Unix! |
| GnuPG | Gnu Privacy Guard |
| GOSC | Global Operations & Security Center |
| GOTS | Government off The Shelf |
| GPGPU | General Purpose Computation On Graphics Processing Units |
| GPIO | General Purpose Input/Output |
| GPL | General Public License |
| GPMC | Group Policy Management Console |
| GPO | Group Policy Object |
| GPRS | General Packet Radio Service |
| GPS | Global Positioning System |
| GR | Graceful Restart |
| GRC | Governance Risk Management & Compliance |
| GRE | Generic Routing Encapsulation |
| GRS | General Records Schedule |
| GS1 | Global Standards One |
| GSA | U.S. General Services Administration |
| GSC | Government Security Committee |
| GSII | Government Services Information Infrastructure |
| GSM | Global System For Mobile Communications |
| GSOIA | General Security of Information Agreement |
| GSOMIA | General Security of Military Information Agreement |
| GSSAPI | Generic Security Services Application Program Interface |
| GTC | Generic Token Card |
| GTEK | Group Traffic Encryption Key |
| GTK | Group Temporal Key |
| gTLD | Generic Top Level Domain |
| GTSM | Generalized Ttl Security Mechanism |
| GUI | Graphical User Interface |
| GUID | Globally Unique Identifier |
| HA | High Availability |
| HA | Home Agent |
| HAC | High Availability Clusters |
| HAG | High Assurance Guard |
| HAL | Hardware Abstraction Layer |
| HAR | Http Archive |
| HBSS | Host Based Security System |
| HCERA | Health Care & Education Reconciliation Act |
| HCI | Host Controller Interface |
| HCISPP | Healthcare Information Security & Privacy Practitioner |
| HDD | Hard Disk Drive |
| HDFS | Hadoop Distributed File System |
| HDMI | High Definition Multimedia Interface |
| HERF | Hazards of Electromagnetic Radiation To Fuel |
| HERO | Hazards of Electromagnetic Radiation To Ordnance |
| HERP | Hazards of Electromagnetic Radiation To Personnel |
| HF | High Frequency |
| HFS | Hierarchical File System |
| HFS+ | Hierarchical File System Plus |
| HHS | U.S. Department of Health & Human Services |
| HI | Header Injection / HTTP response splitting |
| HICS | Hospital Incident Command System |
| HIDS | Host Based Intrusion Detection System |
| HIE | Health Information Exchange |
| HINFO | Host Information |
| HIP | Host Identity Protocol |
| HIPAA | Health Insurance Portability & Accountability Act |
| HIPERLAN | High Performance Radio Local Area Network |
| HIPS | Host Based Intrusion Prevention System |
| HIT | Healthcare Information Technology |
| HITECH | Health Information Technology For Economic & Clinical Health |
| HITRUST | Health Information Trust Alliance |
| HITS | Hyperlink Induced Topic Search |
| HIV | Human Immunodeficiency Virus |
| HKLM | HKEY Local_Machine |
| HL7 | Health Level 7 |
| HMAC | Hash Message Authentication Code |
| HMD | Head Mounted Displays |
| HMI | Human Machine Interface |
| HMO | Health Maintenance Organization |
| HOIS | Hostile Intelligence Services |
| HP CSA | Hp Cloud Service Automation |
| HPA | Host Protected Area |
| HPC | High Performance Compute |
| HPFS | High Performance File System |
| HPSCI | House Permanent Select Committee On Intelligence |
| HR | Human Resources |
| HRM | Human Resource Management |
| HSA | Homeland Security Act |
| HSARPA | Homeland Security Advanced Research Projects Agency |
| HSDPA | High Speed Downlink Packet Access |
| HSF | Heat Sink & Fan |
| HSM | Hardware Security Module |
| HSPA | High Speed Packet Access |
| HSPA+ | Evolved High Speed Packet Access Or High Speed Packet Access |
| HSPD | Homeland Security Presidential Directive |
| HTCIA | High Technology Crime Investigation Association |
| HTCP | Hyper Text Caching Protocol |
| HTML | Hypertext Markup Language |
| HTTP | Hypertext Transfer Protocol |
| HTTPS | Hypertext Transfer Protocol Secure |
| HUMINT | Human Intelligence |
| HVA | Hazard Vulnerability Analysis |
| HVAC | Heating Ventilation & Air Conditioning |
| HVM | Hardware Virtual Machine |
| Hz | Hertz |
| I&A | Identification & Authentication |
| I&W | Indications & Warning |
| I/O | Input/Output |
| I3A | International Imaging Industry Association |
| I3P | Institute For Information Infrastructure Protection |
| IA | Information Assurance |
| IA | Institutional Analytics |
| IA | Intelligence Activity |
| IAA | Interim Access Authorization |
| IaaS | Infrastructure As A Service |
| IAB | Internet Architecture Board |
| IaC | Infrastructure As Code |
| IAC | Internal Audit & Compliance |
| IAC | Issuer Action Codes |
| IACIS | International Association of Computer Investigative Specialists |
| IACSE | Interagency Advisory Committee On Security Equipment |
| IAD | Information Assurance Document |
| IAG | Information Assurance Group |
| IAIP | Information Analysis & Infrastructure Protection |
| IAM | Identity & Access Management |
| IAM | Information Assurance Manager |
| IANA | Internet Assigned Numbers Authority |
| IAO | Information Assurance Officer |
| IAPM | Information Assurance Program Manager |
| IAPWG | Information Assurance Policy Working Group |
| IASE | Information Assurance Support Environment |
| IASL | Information Assurance Senior Leadership |
| IAST | Interactive Application Security Test |
| IATAC | Information Assurance Technology Analysis Center |
| IATC | Interim Authority To Connect |
| IATF | Information Assurance Technical Framework |
| IATO | Interim Authority To Operate |
| IATT | Interim Authorization To Test |
| IAVA | Information Assurance Vulnerability Alert |
| IAX 2 | Inter Asterisk Exchange |
| IBC | Iterated Block Cipher |
| IBE | Identity Based Encryption |
| iBGP | Internal Border Gateway Protocol |
| IBIS | Issue Based Information System |
| IBMJSSE | IBM Java Secure Socket Extension |
| IBN | Intent Based Networking |
| IBR | Integrated Baseline Review |
| IBSS | Independent Basic Service Set |
| IC | Integrated Circuit |
| IC | Intelligence Community |
| IC3 | Internet Crime Complaint Center |
| ICAC | Internet Crimes Against Children |
| ICAMP | Incident Cost Analysis & Modeling Project |
| ICANN | Internet Corporation For Assigned Names & Numbers |
| ICC | Integrated Circuit Card |
| ICCID | Integrated Circuit Card Identifier |
| ICCP | Inter Control Center Communications Protocol |
| ICD | Intelligence Community Directive |
| ICD | Interface Control Document |
| ICD | International Classification of Diseases |
| ICD-10 | International Classification of Diseases Version 10 |
| ICF | Internet Connection Firewall |
| ICFR | Internal Control Over Financial Reporting |
| ICM | Integer Counter Mode |
| ICMP | Internet Control Message Protocol |
| ICO | Information Commisioner's Office |
| ICP | Initial Control Point |
| ICP | Internet Cache Protocol |
| ICS | Industrial Control System |
| ICS | Internet Connection Sharing |
| ICSA | International Computer Security Association |
| ICT | Information & Communication Technology |
| ICV | Integrity Check Value |
| ICV | Intelligent Connected Vehicles |
| ID | Identification |
| IDaaS | Identity As A Service |
| IDART | Information Design Assurance Red Team |
| IDC | International Data Center |
| IDE | Integrated Development Environment |
| IDE | Integrated Device Electronics |
| IDE | Integrated Drive Electronics |
| IDE | Intrusion Detection Equipment |
| IdEA | Identity Entitlement & Access Management |
| IDEA | International Data Encryption Algorithm |
| iDEN | Integrated Digital Enhanced Network |
| ID-FF | Identity Federation Framework |
| IDL | Interface Definition Language |
| IdM | Identity Management |
| IDMEF | Intrusion Detection Message Exchange Format |
| IDMS | Identity Management System |
| IdP | Identity Provider |
| IDPS | Intrusion Detection & Prevention System |
| IDS | Intrusion Detection System |
| IDS/IDP | Intrusion Detection/Intrusion Detection & Prevention |
| ID-SIS | Identity Service Interface Specifications |
| ID-WSF | Identity Web Services Framework |
| IE | Internet Explorer |
| IEC | International Electrotechnical Commission |
| IED | Intelligent Electronic Device |
| IEEE | Institute of Electrical & Electronics Engineers |
| IEEE-SA | IEEE Standards Association |
| IEID | International Exchange of Infrasound Data |
| IERD | International Exchange of Radionuclide Data |
| IESD | International Exchange of Seismological Data |
| IESG | Internet Security Steering Group |
| IETF | Internet Engineering Task Force |
| IFTTT | If This Then That |
| IG | Internet Gateway |
| IGMP | Internet Group Management Protocol |
| IGP | Interior Gateway Protocol |
| IGRP | Interior Gateway Routing Protocol |
| IID | Interface Identifier |
| IIF | Information In Identifiable Form |
| IIHI | Individually Identifiable Health Information |
| IIOC | Independent International Organization For Certification |
| IIOP | Internet Inter Orb Protocol |
| IIS | Internet Information Services |
| IKE | Internet Key Exchange |
| ILM | Information Lifecycle Management |
| IM | Instant Messaging |
| IMAP | Internet Message Access Protocol |
| IMEI | International Mobile Equipment Identity |
| IMM | Information Management Model |
| IMS | Intelligent Maintenance Systems |
| IMSI | International Mobile Subscriber Identity |
| IMT-2000 | International Mobile Telecommunications 2000 |
| INCITS | International Committee For Information Technology Standards |
| INCOSE | International Council of Systems Engineering |
| INFOCONs | Information Operations Conditions |
| INFOSEC | Information Systems Security |
| INFOSYS | Information Systems |
| INTERPOL | International Police Organization |
| IO | Information Operations |
| IO | Information Owner |
| IO | Insertion Order |
| IOC | Indicators of Compromise |
| IOPS | Input/Output Operations Per Second |
| IOSS | Interagency Operations Security (OPSEC) Support Staff |
| IoT | Internet of Things |
| IP | Intellectual Property |
| IP | Internet Protocol |
| IPA | Initial Privacy Assessment |
| IPA | Intrusion Prevention Appliance |
| IPB | Intelligence Preparation of The Battlefield |
| IPComp | Internet Protocol Payload Compression Protocol |
| IPComp | IP Payload Compression |
| IPMO | Infosec Program Management Office |
| IPng | Internet Protocol Next Generation |
| IPP | Information Protection Policy |
| IPPD | Integrated Product & Process Development |
| IPR | Internet Protocol Router |
| IPS | Intrusion Prevention System |
| IPSAC | Interagency Security Classification Appeals Panel |
| IPSec | Internet Protocol Security |
| IPSec VPN | Internet Protocol Security Virtual Private Network |
| IPT | Integrated Product Team |
| IPTF | Infrastructure Protection Task Force |
| IPv4 | Internet Protocol Version 4 |
| IPv6 | Internet Protocol Version 6 |
| IPX | Internet Packet Exchange |
| IPX | Internetwork Packet Exchange |
| IPX/SPX | Internetwork Packet Exchange / Sequenced Packet Exchange |
| IR | Incident Response |
| IR | Infrared |
| IR | Interagency Report |
| IRB | Institutional Review Board |
| IRC | Infosec Research Council |
| IRC | Internet Relay Chat |
| IrDA | Infrared Data Association |
| IRM | Information Resource Management |
| IRM | Information Rights Management |
| IRP | Incident Response Plan |
| IRQ | Interrupt Request Line |
| IRS | Incident Reporting Structure |
| IRS | Internal Revenue Service |
| IRT | Incident Response Team |
| IRTF | Internet Research Task Force |
| IS | Information System |
| ISA | Interconnection Security Agreement |
| ISA | International Security Agreement |
| ISA | International Society of Automation |
| ISAC | Information Sharing & Analysis Center |
| ISACA | Information Systems Audit & Control Association |
| ISAKMP | Internet Security Association & Key Management Protocol |
| ISAM | Indexed Sequential Access Method |
| ISAP | Information Security Automation Program |
| ISAPI | Internet Server Application Programming Interface |
| ISATAP | Intra Site Automatic Tunnel Addressing Protocol |
| ISCM | Information Security Continuous Monitoring |
| ISCOM | Naval Investigative Service Command |
| iSCSI | Internet Small Computer Systems Interface |
| ISD | Information Storage Device |
| ISD | Inspectable Space Determination |
| ISDN | Integrated Services Digital Network |
| ISF | Information Security Forum |
| ISFD | Industrial Security Facilities Database |
| ISG | Information Security Governance |
| ISID | Industrial Security Incident Database |
| IS-IS | Intermediate System To Intermediate System |
| ISM | Industrial |
| ISM | Information Security Manager |
| ISM | Information Security Marking |
| ISMS | Information Security Management System |
| ISO | Information System Owner |
| ISO | International Organization For Standardization |
| ISO/IEC | International Organization For Standardization/ International |
| ISOO | Information Security Oversight Office |
| ISP | Internet Service Provider |
| ISPG | Intelligence Programs Support Group |
| ISR | Interrupt Service Routine |
| ISRMC | Information Security Risk Management Committee |
| ISRP | Information Systems Requirements Package |
| ISS | Information Systems Security |
| ISS | Inspection Support Staff |
| ISS | Integrated Safeguards Subgroup |
| ISSA | Information Systems Security Association |
| ISSE | Information System Security Engineer |
| ISSEA | International Systems Security Engineering Association |
| ISSEP | Information System Security Engineering Professional |
| ISSM | Information System Security Manager |
| ISSO | Information System Security Officer |
| ISSP | Information Systems Security Professional |
| ISSPM | Information Systems Security Program Manager |
| ISSR | Information Systems Security Representative |
| ISWG | Industrial Security Working Group |
| IT | Information Technology |
| ITA | Information Technology Agreement |
| ITAA | Information Technology Association of America |
| ITAB | Information Technology Acquisition Board |
| ITAC | Intelligence & Threat Analysis Center |
| ITAM | Information Technology Asset Management |
| ITF | Interrogator Talks First |
| ITIL | Information Technology Infrastructure Library |
| ITL | Information Technology Laboratory |
| ITMRA | Information Technology Management Reform Act |
| ITSEC | Information Technology Security Evaluation Criteria |
| ITU | International Telecommunications Union |
| ITU-T | International Telecommunication Union Telecommunication Standardization Sector |
| IUT | Implementation Under Test |
| IV | Initialization Vector |
| IV&V | Independent Verification & Validation |
| IVR | Interactive Voice Response |
| IW | Information Warfare |
| IW-D | Information Warfare – Defensive |
| J2 | Intelligence Directorate Joint Command |
| JAB | Joint Authorization Board |
| JAD | Joint Analysis Development |
| Java | Java Platform |
| Java EE | Java Enterprise Edition |
| JAXR | Java API For XML Registries |
| JCAHO | Joint Commission On Accreditation of |
| JCCC | Joint Communications Control Center |
| JCE | Java Cryptography Extension |
| JCIDS | Joint Capabilities Integration & Development System |
| JCITA | Joint Counterintelligence Training Academy |
| JCS | Joint Chiefs of Staff |
| JDBC | Java Database Connectivity |
| JDIICS | Joint DII Control Systems |
| JDK | Java Development Kit |
| JeOS | Just Enough Operating System |
| JFFS2 | Journaling Flash File System |
| JFS | Journaling File System |
| JID | Joint Intrusion Detection |
| JIE | Joint Information Environment |
| JIEO | Joint Interoperability Engineering Organization |
| JIT | Just In Time |
| JIWG | Joint Ia Operations Working Group |
| JMIC | Joint Military Intelligence College |
| JMIP | Joint Military Intelligence Programs |
| JMITC | Joint Military Intelligence Training Center |
| JPAS | Joint Personnel Adjudication System |
| JPEG | Joint Photographic Experts Group |
| JPO | Joint Program Office |
| JPO STC | Joint Program Office For Special Technical Countermeasures |
| JRE | Java Runtime Environment |
| JROC | Joint Requirements Oversight Council |
| JS | JavaScript |
| JSAIWG | Joint Sensitive Compartmented Information (Sci) Accreditation/Inspection Working Group |
| JSF | Javaserver Faces |
| J-SIIDS | Joint Services Interior Intrusion Detection System |
| JSM | Java Security Manager |
| JSON | JavaScript Object Notation |
| JSP | Java Server Pages |
| JSSE | Java Secure Socket Extension |
| JTAG | Joint Test Action Group |
| JTC1 | Joint Technical Committee 1 (International Organization For Standardization [ISO]/International Electrotechnical Commission [IEC]) |
| JTF-CNO | Joint Task Force – Computer Network Operations |
| JVM | Java Virtual Machine |
| JWICS | Joint Worldwide Intelligence Communication System |
| JWID | Joint Warrior Interoperability Demonstration |
| JWT | JSON Web Token |
| KB | Kilobyte |
| KB | Knowledge Base |
| Kbps | Kilobit Per Second |
| KDC | Key Distribution Center |
| KEK | Key Encryption Key |
| KG | Key Generator |
| KGD | Key Generation & Distribution |
| kHz | Kilohertz |
| KINK | Kerberized Internet Negotiation of Keys |
| KLOC | Thousands of Lines of Code |
| KMC | Key Management Center |
| KMI | Key Management Infrastructure |
| KMIP | Key Management Interoperability Protocol |
| KMS | Key Management Service |
| KMS | Key Management System |
| KPI | Key Performance Indicator |
| KRI | Key Risk Indicator |
| KS | Knowledge Service |
| KSG | Key Stream Generator |
| KSK | Key Signing Key |
| KVM | Kernel Based Virtual Machine |
| KVM | Keyboard Video Mouse |
| L2CAP | Logical Link Control & Adaptation Protocol |
| L2F | Layer 2 Forwarding |
| L2TP | Layer 2 Tunneling Protocol |
| L2VPN | Layer 2 Virtual Private Network |
| L3VPN | Layer 3 Virtual Private Network |
| LAA | Limited Access Authorization |
| LAC | Local Agency Check |
| LACNIC | Latin American & Caribbean IP Addresses Registry |
| LAN | Local Area Network |
| LB | Load Balancer |
| LBA | Logical Block Addressing |
| LBAC | Lattice Based Access Control |
| LBAP | Layer Based Access Protocol |
| LBI | Limited Background Investigation |
| LBIP | Limited Background Investigation Plus Current National Agency Check |
| LBIX | Limited Background Investigation Expanded |
| LCD | Liquid Crystal Display |
| LCG | Linear Congruential Generators |
| LCP | Link Control Protocol |
| LDA | Local Delivery Agent |
| LDAP | Lightweight Directory Access Protocol |
| LDAPI | LDAP Injection |
| LDAPS | Lightweight Directory Access Protocol Over SSL |
| LDP | Label Distribution Protocol |
| LE | Law Enforcement |
| LE/CI | Law Enforcement & Counterintelligence |
| LEA | Law Enforcement Agency |
| LED | Light Emitting Diode |
| LF | Low Frequency |
| LFC | Local Files Check |
| LFI | Local File Inclusion |
| LFN | Long Filename |
| LFSR | Linear Feedback Shift Register |
| LIMDIS | Limited Distribution |
| LIR | Local Internet Registry |
| LLC | Logical Link Control |
| LLT | Low Latency Transport |
| LM | Lan Manager |
| LMP | Link Manager Protocol |
| LMS | Learning Management System |
| LN | Local Network |
| LNN | Learning Neural Networks |
| LOC | Location |
| LOINC | Logical Observation Identifiers Names & Codes |
| LOS | Line of Sight |
| LR | Logistic Regression |
| LRA | Local Registration Authority |
| LSI | Latent Semantic Indexing |
| LSTM | Long Short Term Memory |
| LT | Leadership Team |
| LTE | Long Term Evolution |
| LTE-A | LTE Advanced |
| LU6.2 | Logical Unit Version 6.2 |
| LUA | Limited User Account |
| LUN | Logical Unit Number |
| m | Meter |
| M&A | Merger & Acquisitions |
| M2M | Machine To Machine |
| MA | Mission Area |
| MAC | Mandatory Access Control |
| MAC | Media Access Control |
| MAC | Medium Access Control |
| MAC | Message Authentication Code |
| MAF | Multi Mode Authentication Framework |
| MAM | Mobile Application Management |
| MAMP | Mac OS X Apache MySQL and PHP |
| MAN | Metropolitan Area Network |
| MANET | Mobile Ad Hoc Network |
| MAPS | Mail Abuse Prevention System |
| MASINT | Measurement & Signature Intelligence |
| MB | Megabyte |
| MBP | Macbook Pro |
| Mbps | Megabits Per Second |
| MBR | Master Boot Record |
| MBSA | Microsoft Baseline Security Analyzer |
| MCA | Micro Channel Architecture |
| MCC | Mobile Country Codes |
| MCDES | Malicious Code Detection & Eradication System |
| MCIS | Miami Computing & Information Services |
| MCM | Mobile Content Management |
| MCS | Miami Computing Services |
| MD | Message Digest |
| MD5 | Message Digest 5 |
| MDC | Modular Data Center |
| MDI | Medical Device Integration |
| MDI | Medium Dependent Interface |
| MDM | Mobile Device Management |
| MDN | Mobile Directory Number |
| MDS2 | Manufacturer Disclosure Statement For Medical Device Security |
| ME | Mobile Equipment |
| MED | Multi Exit Discriminator |
| MEID | Mobile Equipment Identifier |
| MEP | Message Exchange Pattern |
| MES | Manufacturing Execution System |
| MFA | Multi Factor Authentication |
| MFT | Master File Table |
| MGCP | Media Gateway Control Protocol |
| MHz | Megahertz |
| MI | Machine Intelligence |
| MI | Military Intelligence |
| MIB | Management Information Base |
| MIC | Mandatory Integrity Control |
| MIC | Message Integrity Check |
| MIKEY | Multimedia Internet Keying |
| MIM | Microsoft Identity Manager |
| MIM | Mobile Information Management |
| MIME | Multipurpose Internet Mail Extensions |
| MIMO | Multiple Input |
| MIN | Mobile Identification Number |
| MInE | Miami Information Environment |
| Mini SD | Mini Secure Digital |
| MIP | Mobile Internet Protocol |
| MIPS | Million Instructions Per Second |
| MIS | Management Information System |
| MITM | Man In The Middle |
| ML | Machine Learning |
| MLD | Multicast Listener Discovery |
| MLS | Multilevel Security |
| MLS WG | Multilevel Security Working Group |
| MMC | Microsoft Management Console |
| MMC | Multimediacard |
| MMCmobile | Multimediacard Mobile |
| MMS | Multimedia Message Service |
| MMS | Multimedia Messaging Service |
| mMTC | Massive Machine Type Communications |
| MN | Mobile Node |
| MNB | Miami Notebook |
| MNC | Mobile Network Codes |
| MNS | Mission Needs Statement |
| MO | Magneto Optical |
| MOA | Memorandum of Agreement |
| MOBIKE | IKEv2 Mobility & Multihoming Protocol |
| MODP | Modular Exponential |
| MOSS | Mime Object Security Services |
| MOU | Memorandum of Understanding |
| MOVS | Modes of Operation Validation System |
| MP3 | Moving Picture Experts Group Layer 3 |
| MP4 | Moving Pictures Experts Group 4 |
| MPA | Mobile Prefix Advertisement |
| MPLS | Multi Protocol Label Switching |
| MPP | Massive Parallel Processing |
| MPS | Mobile Prefix Solicitation |
| MQV | Menezes Qu Vanstone |
| MRI | Magnetic Resonance Imaging |
| MS | Microsoft |
| MS | Mobile Subscriber |
| MSA | Master Service Agreement |
| MSC | Mobile Switching Center |
| MS-CHAP | Microsoft Challenge Handshake Authentication Protocol |
| MSD | Magnetic Stripe Data |
| MS-DOS | Microsoft Disk Operating System |
| MSDP | Multicast Source Discovery Protocol |
| MSEC | Multicast Security |
| MSEL | Master Scenario Events List |
| MSIL | Microsoft Intermediate Language |
| MS-ISAC | Multi State Information Sharing & Analysis Center |
| MSISDN | Mobile Subscriber Integrated Services Digital Network |
| MSK | Master Session Key |
| MSKB | Microsoft Knowledge Base |
| MSP | Managed Service Provider |
| MSSP | Managed Security Service Provider |
| MSTSC | Microsoft Terminal Service Client |
| MSWG | Metadata Standards Working Group |
| MTA | Mail Transfer Agent |
| MTBF | Mean Time Between Failures |
| MTD | Maximum Tolerable Downtime |
| MTD | Memory Technical Driver |
| MTM | Mobile Trusted Module |
| MTPOD | Maximum Tolerable Period of Disruption |
| MTSO | Mobile Telephone Switching Office |
| MTTF | Mean Time To Failure |
| MTTR | Mean Time To Repair |
| MTU | Master Telemetry Unit |
| MTU | Master Terminal Unit |
| MTU | Maximum Transmission Unit |
| MU | Meaningful Use |
| MUA | Mail User Agent |
| MUTV | Miami University Television |
| MVC | Model View Controller |
| mW | Milliwatt |
| MWB | Malwarebytes |
| MX | Mail Exchanger |
| NA | Neighbor Advertisement |
| NA | Not Applicable |
| NaaS | Network As A Service |
| NAC | Network Access Control |
| NACI | National Agency Check & Inquiries |
| NACIC | National Counterintelligence Center |
| NACK | Negative Acknowledgement |
| NACK | Negative Acknowledgement Protocol |
| NAP | Network Access Protection |
| NARA | National Archives & Records Administration |
| NAS | Network Access Server |
| NAS | Network Attached Storage |
| NAT | Network Address Translation |
| NATO | North Atlantic Treaty Organization |
| NAT-PT | Network Address Translation—Protocol Translation |
| NAT-T | Network Address Translation Traversal |
| NBA | Network Behavior Analysis |
| NBAD | Network Behavior Anomaly Detection |
| NBE | Network Based Evidence |
| NC | Non Compliant |
| NCC | National Cybersecurity Center |
| NCCIC | National Cybersecurity & Communications Integration Center |
| NCES | Netcentric Enterprise Services |
| NCIC | National Crime Information Center |
| NCIS | Naval Criminal Investigation Service |
| NCP | National Checklist Program |
| NCRAL | National Cyber Risk Alert Level |
| NCS | National Communications System |
| NCS | National Cryptologic School |
| NCSA | National Cyber Security Alliance |
| NCSAM | National Cyber Security Awareness Month |
| NCSC | National Computer Security Center |
| NCSD | National Cyber Security Division |
| NCSI | NIST National Center For Standards & Certification Information |
| ND | Neighbor Discovery |
| NDA | Non Disclosure Agreement |
| NDAC | Non Discretionary Access Control |
| NDP | Neighbor Discovery Protocol |
| NDU | National Defense University |
| Net | Network |
| NetBEUI | NetBIOS Extended User Interface |
| NetBIOS | Network Basic Input/Output System |
| NetBT | NetBIOS Over TCP/IP |
| NETMGR | Network Manager |
| NetOps | Network Operations |
| NFAT | Network Forensic Analysis Tool |
| NFC | Near Field Communication |
| NFIB | National Foreign Intelligence Board |
| NFIP | National Foreign Intelligence Program |
| NFS | Network File System |
| NFV | Network Function Virtualization |
| NGA | National Geospatial Intelligence Agency |
| NGFW | Next Generation Firewall |
| NGIC | National Ground Intelligence Center |
| NH | Next Header |
| NHS | National Health Service |
| NI | Natural Intelligence |
| NIAC | National Infrastructure Advisory Council |
| NIACAP | National Information Assurance Certification & Accreditation Process |
| NIAP | National Information Assurance Partnership |
| NIC | Network Interface Card |
| NICC | National Infrastructure Coordinating Center |
| NICCS | National Initiative For Cybersecurity Careers & Studies |
| NICE | National Initiative For Cybersecurity Education |
| NID | Network Intrusion Detector |
| NIDS | Network Intrusion Detection System |
| NII | National Information Infrastructure |
| NIJ | National Institute of Justice |
| NINO | Nothing In Nothing Out |
| NIPC | National Infrastructure Protection Center |
| NIPRNET | Non Secure/Unclassified Internet Protocol Router Network |
| NIPS | Network Based Intrusion Prevention System |
| NIS | Network Information System |
| NISAC | National Infrastructure Simulation & Analysis Center |
| NISCC | National Infrastructure Security Coordination Center |
| NISP | National Industrial Security Program |
| NISPOM | National Industrial Security Program Operating Manual |
| NIST | National Institute of Standards & Technology |
| NISTIR | National Institute of Standards & Technology Interagency Report |
| NITB | National Infosec Technical Baseline |
| NLNN | Non Learning Neural Networks |
| NLOS | Non Line of Sight |
| NLP | Natural Language Processing |
| NLSP | Network Layer Security Protocol |
| NLU | Natural Language Understanding |
| NMAP | Network Mapper |
| NMS | Network Management System |
| NNTP | Network News Transfer Protocol |
| NOC | Network Operations Center |
| NOS | Network Operating System |
| NOSC | Network Operation Security Center |
| NoSQL | Non Structured Query Language |
| NPI | New Product Introduction |
| NPIVP | NIST Personal Identity Verification Program |
| NPP | Notice of Privacy Practices |
| NPPI | Nonpublic Personal Information |
| NPS | Net Promoter Score |
| NPV | Net Present Value |
| NS | Name Server |
| NS | Neighbor Solicitation |
| NS/EP | National Security & Emergency Preparedness |
| NSA | National Security Agency |
| NSA/CSS | National Security Agency/Central Security Service |
| NSAPI | Netscape Server Application Programming Interface |
| NSAPI | Network Service Access Point Identifier |
| NSC | National Security Council |
| NSD | National Security Directive |
| NSEC | Next Secure |
| NSI | National Security Information |
| NSIRC | National Security Incident Response Center |
| NSOC | National Security Operations Center |
| NSP | Network Service Provider |
| NSRL | National Software Reference Library |
| NSS | National Security System |
| NSS | Network Security Services |
| NSTAC | National Security Telecommunication Advisory Committee |
| NSTB | National SCADA Test Bed |
| NSTISSAM | National Security Telecommunications & Information Systems Security Advisory Memorandum |
| NSTISSC | National Security Telecommunications & Information Systems Security Committee |
| NSTISSD | National Security Telecommunications & Information Systems Security Directive |
| NSTISSI | National Security Telecommunications & Information Systems Security Instruction |
| NSTISSP | National Security Telecommunications & Information Systems Security Policy |
| NSU | Non Standard Usage |
| NTFS | New Technology File System |
| NTISSC | National Telecommunications & Information Systems Security Committee |
| NTLM | NT LAN Manager |
| NTP | Network Time Protocol |
| NTTAA | National Technology Transfer & Advancement Act of 1995 |
| NUD | Neighbor Unreachability Detection |
| NVD | National Vulnerability Database |
| NVLAP | National Voluntary Laboratory Accreditation Program |
| NVRAM | Non Volatile Random Access Memory |
| NW3C | National White Collar Crime Center |
| NX | No Execute |
| OASD | Office of The Assistant Secretary of Defense |
| OASIS | Organization For The Advancement of Structured Information Standards |
| OAuth | Open Authorization |
| OAuth2 | Open Authorization Version 2 |
| OBIEE | Oracle Business Intelligence Enterprise Edition |
| OCC | Office of The Comptroller of The Currency |
| OCIL | Open Checklist Interactive Language |
| OCIO | Office of The Chief Information Officer |
| OCO | offensive Cyberspace Operations |
| OCR | Office For Civil Rights |
| OCSP | Online Certificate Status Protocol |
| OCTAVE | Operationally Critical Threat Asset & Vulnerability Evaluation |
| ODBC | Open Database Connectivity |
| ODCI | Office of The Director of Central Intelligence |
| ODF | Open Document Format |
| ODNI | Office of The Director of National Intelligence |
| OECD | Organisation For Economic Co Operation & Development |
| OEM | Original Equipment Manufacturer |
| OEP | Occupant Emergency Plan |
| OFB | Output Feedback |
| OFDM | Orthogonal Frequency Division Multiplexing |
| OGSA | Open Grid Services Architecture |
| OHA | Open Handset Alliance |
| OIDC | OpenID Connect |
| OIG | Office of Inspector General |
| OIG DoD | Office of The Inspector General of The Department of Defense |
| OIS | Office Information System |
| OLA | Operational Level Agreement |
| OLAP | Online Analytical Processing |
| OLE | Object Linking & Embedding |
| OLTP | Online Transaction Processing |
| OMB | Office of Management & Budget |
| ONC | Office of The National Coordinator |
| ONF | Organization Normative Framework |
| ONS | Object Naming Service |
| OOB | Out of Band |
| OOP | Object Oriented Programming |
| OPC | Ole For Process Control |
| OpenPGP | An Open Specification For Pretty Good Privacy |
| OPEX | Operational Expenditure |
| OPM | U.S. Office of Personnel Management |
| OPSEC | Operational Security |
| ORA | Organization Registration Authority |
| ORB | Open Relay Blacklist |
| ORD | Operational Requirements Document |
| ORNL | Oak Ridge National Laboratory |
| OS | Operating System |
| OSA | Open Security Architecture |
| OSCI | OS Command Injection |
| OSD | Object Based Storage Device |
| OSD | Office of The Secretary of Defense |
| OSD/JS | Office of The Secretary of Defense/Joint Staff |
| OSHA | Occupational Safety & Health Administration |
| OSI | Open System Interconnection |
| OSINT | Open Source Intelligence |
| OSP | Organizational Security Policies |
| OSPF | Open Shortest Path First |
| OSS | Open Source Software |
| OSSTMM | Open Source Security Testing Methodology Manual |
| OSVDB | Open Source Vulnerability Database |
| OT&E | Operational Test & Evaluation |
| OTA | Over The Air |
| OTP | One Time Password |
| OTT | Over The Top |
| OU | Organizational Unit |
| OUSD (P) | Office of The Under Secretary of Defense (Policy) |
| OVAL | Open Vulnerability & Assessment Language |
| OWASP | Open Web Application Security Project |
| OWL-S | Web Ontology Language For Services |
| P2P | Peer To Peer |
| P2PE | Point To Point Encryption |
| P2V | Physical To Virtual |
| PaaS | Platform As A Service |
| PAC | Privilege Attribute Certificate |
| PAC | Protected Access Credential |
| PACS | Physical Access Control Systems |
| PACS | Picture Archiving & Communication System |
| PAD | Packet Assembler Disassembler |
| PAD | Peer Authorization Database |
| PA-DSS | Payment Application Data Security Standard |
| PAM | Pluggable Authentication Module |
| PAM | Privileged Access Management |
| PAN | Personal Area Network |
| PAN | Primary Account Number |
| PAO | Principal Authorizing official |
| PAOS | Reverse HTTP Binding For Soap |
| PAP | Password Authentication Protocol |
| PAP | Policy Access Point |
| PAS | Publicly Available Specification |
| PASTA | Process For Attack Simulation & Threat Analysis |
| PAT | Port Address Translation |
| P-ATO | Provisional Authorization To Operate |
| PBA | Pre Boot Authentication |
| PBAC | Policy Based Access Control |
| PBC | Prepared By Client |
| PBCC | Packet Binary Convolution Code |
| PBE | Pre Boot Environment |
| PBKDF1 | Password Based Key Derivation Function 1 |
| PBKDF2 | Password Based Key Derivation Function 2 |
| PBN | Private Blog Network |
| PBX | Private Branch Exchange |
| PC | Personal Computer |
| PCB | Printed Circuit Board |
| PCC | Proof Carrying Code |
| PCCIP | President’s Commission On Critical Infrastructure Protection |
| PCI | Payment Card Industry |
| PCI | Personal Identity Verification Card Issuer |
| PCI DSS | Payment Card Industry Data Security Standard |
| PCI PA DSS | Payment Card Industry Payment Application Data Security Standard |
| PCI-SCC | Payment Card Industry Security Standards Council |
| PCI-X | Peripheral Component Interconnect Extended |
| PCMCIA | Personal Computer Memory Card International Association |
| PCN | Process Control Network |
| PCP | Payload Compression Protocol |
| PCS | Process Control System |
| PCSF | Process Control System Forum |
| PCSRF | Process Control Security Requirements Forum |
| PDA | Personal Digital Assistant |
| PDD | Presidential Decision Directive |
| Portable Document Format | |
| PDI | Physical Device Identifiers |
| PDM | Precedence Diagramming Method |
| PDP | Packet Data Protocol |
| PDP | Policy Decision Point |
| PDS | Practice Dangerous To Security |
| PDS | Protected Distribution System |
| PDS | Public Domain Software |
| PDU | Power Distribution Units |
| PDU | Protocol Data Unit |
| PEAP | Protected Extensible Authentication Protocol |
| PED | Pin Entry Devices |
| PED | Portable Electronic Device |
| PEM | Privacy Enhanced Mail |
| PEM | Program Element Monitor |
| PEP | Policy Enforcement Point |
| PERT | Program Evaluation & Review Technique |
| PFS | Perfect Forward Secrecy |
| PGP | Pretty Good Privacy |
| PHI | Protected Health Information |
| PHOTINT | Photographic Intelligence |
| PHP | Hypertext Preprocessor |
| PHPCI | PHP Command Injection |
| PHR | Personal Health Record |
| PHY | Physical |
| PI | Police Intelligence |
| PI | Preliminary Inquiry |
| PIA | Privacy Impact Assessment |
| PICS | Platform For Internet Content Selection |
| PID | Personnel Identification Data |
| PII | Personally Identifiable Information |
| PIM | Personal Information Management |
| PIM-SM | Protocol Independent Multicast—Sparse Mode |
| PIN | Personal Identification Number |
| PIP | Policy Information Point |
| PIPEDA | Personal Information Protection & Electronic Documents Act |
| PIR | Passive Infrared Sensor |
| PIR | Public Interest Registry |
| PIT | Platform Information Technology |
| PIV | Personal Identity Verification |
| PIX | Proprietary Application Identifier Extension |
| PKC | Public Key Cryptography |
| PKCS | Public Key Cryptography Standard |
| PKI | Public Key Infrastructure |
| PKM | Privacy Key Management |
| PKMv1 | Privacy Key Management Protocol Version 1 |
| PKMv2 | Privacy Key Management Protocol Version 2 |
| PL | Public Law |
| PLC | Programmable Logic Controller |
| PM | Private Message |
| PM | Program Manager |
| PM | Project Manager |
| PM/SM | Program Manager/System Manager |
| PMA | Policy Management Authority |
| PMBOK | Project Management Body of Knowledge |
| PMK | Pairwise Master Key |
| PMKSA | Pairwise Master Key Security Association |
| PMO | Program Management Office |
| PMP | Point To Multipoint |
| PMP | Program Management Plan |
| PMTU | Path Maximum Transmission Unit |
| PMU | Power Management Unit |
| PN | Packet Number |
| PNG | Portable Network Graphics |
| POA&M | Plan of Action & Milestones |
| POC | Point of Contact |
| POC | Proof of Concept |
| PoE | Power Over Ethernet |
| POM | Program Objective Memorandum |
| PON | Passive Optical Network |
| POODLE | Padding Oracle On Downgraded Legacy Encryption |
| POP | Post Office Protocol |
| POP | Point of Presence |
| POP3 | Post Office Protocol Version 3 |
| POS | Point of Sale |
| POS | Point of Service |
| POSIX | Portable Operating System Interface |
| POST | Power On Self Test |
| PoT | Proof of Technology |
| POTS | Plain Old Telephone Service |
| PP | Protection Profile |
| PPACA | Patient Protection & Affordable Care Act |
| PPC | Pay Per Click |
| PPGA | Plastic Pin Grid Array |
| PPP | Point To Point Protocol |
| PPP | Program Protection Plan |
| PPS | Internet Protocol Suite & Associated Ports |
| PPSM | Ports Protocols & Services Management |
| PPTP | Point To Point Tunneling Protocol |
| PPVPN | Provisioner Provided Virtual Private Network |
| PQQ | Pre Qualification Questionnaire |
| PR | Pagerank |
| PRA | Paperwork Reduction Act |
| PRAM | Parameter Random Access Memory |
| Pre-PAK | Pre Primary Authorization Key |
| PRF | Pseudorandom Function |
| PRISMA | Program Review For Information |
| PRNG | Pseudo Random Number Generator |
| PRNU | Photo Response Non Uniformity |
| PROM | Programmable Read Only Memory |
| PROPIN | Proprietary Information |
| PS | Physical Security |
| PSE | Packet Switching Exchange |
| PSK | Pre Shared Key |
| PSTN | Public Switched Telephone Network |
| PSU | Power Supply Unit |
| PT | Path Traversal |
| PTA | Privacy Threshold Analysis |
| PTK | Pairwise Transient Key |
| PTP | Packet Transfer Protocol |
| PTT | Push To Talk |
| PTV | Perceived Target Value |
| PUB | Publication |
| PUE | Power Usage Effectiveness |
| PUK | Personal Unlocking Key |
| PUM | Potentially Unwanted Modification |
| PV | Paravirtualization |
| PVC | Permanent Virtual Circuit |
| PVG | Patch & Vulnerability Group |
| PXE | Preboot Execution Environment |
| QA | Quality Assurance |
| QBE | Query By Example |
| QDD | Query Deserves Diversity |
| QDF | Query Deserves Freshness |
| QEMU | Quick Emulator |
| QoP | Quality of Protection |
| QoS | Quality of Service |
| QR code | Quick Response Code |
| QRA | Quantitative Risk Analysis |
| QSA | Qualified Security Assessor |
| QUIC | Quick UDP Internet Connections |
| R&D | Research & Development |
| R/W | Read/Write |
| RA | Receiver Address |
| RA | Registration Authority |
| RA | Remote Assistance |
| RA | Router Advertisement |
| RACF | Resource Access Control Facility |
| RACI | Responsible Accountable Consulted & Informed |
| RAD | Rapid Application Development |
| RAdAC | Risk Adaptive Access Control |
| RADIUS | Remote Authentication Dial In User Service |
| RAID | Redundant Array of Independent Disks |
| RAM | Random Access Memory |
| RAN | Radio Access Network |
| RAR | Risk Assessment Report |
| RARP | Reverse Address Resolution Protocol |
| RAS | Remote Access Services |
| RASP | Runtime Application Self Protection |
| RAT | Remote Access Tools |
| RAT | Remote Administration Tool |
| RBAC | Role Based Access Control |
| RBD | Reliability Block Diagrams |
| RBIA | Risk Based Internal Audit |
| RC2 | Rivest Cipher 2 |
| RC4 | Rivest Cipher 4 |
| RC5 | Rivest Cipher 5 |
| RCA | Root Cause Analysis |
| RCE | Remote Code Execution |
| RCE | Route Cache Entry |
| RCERTs | Regional Computer Emergency Response Teams |
| RCFL | Regional Computer Forensics Laboratory |
| RCM | Responsibility Center Management |
| RCP | Remote Copy Protocol |
| RD | Restricted Data |
| RDBMS | Relational Database Management System |
| RDF | Resource Description Framework |
| RDP | Remote Desktop Protocol |
| RDRAM | RAMBUS Dynamic Random Access Memory |
| RDSMS | Relational Data Stream Management System |
| RDT&E | Research Development Test & Evaluation |
| REL | Rights Expression Language |
| REP | Robots Exclusion Protocol |
| REST | Representational State Transfer |
| RF | Radio Frequency |
| RF | Random Forest |
| RFC | Request For Comments |
| RFD | Route Flap Damping |
| RFI | Radio Frequency Interference |
| RFI | Remote File Inclusion |
| RFI | Representative of A Foreign Interest |
| RFI | Request For Information |
| RFID | Radio Frequency Identification |
| RFP | Request For Proposal |
| RFU | Reserved For Future Use |
| RIA | Rich Internet Application |
| RIB | Routing Information Base |
| RID | Real Time Inter Network Defense |
| RID | Registered Application Provider Identifier |
| RII | Relevant Information & Intelligence |
| RIP | Routing Information Protocol |
| RIPE | Ncc Réseaux Ip Européens Network Coordination Centre |
| RIPEMD-160 | Race Integrity Primitives Evaluation Message Digest 160 |
| RIPng | Routing Information Protocol Next Generation |
| RIR | Regional Internet Registries |
| RIS | Remote Installation Services |
| RISC | Reduced Instruction Set Computer |
| RL | Reinforcement Learning |
| RMA | Reliability |
| RMA | Return Material Authorization |
| RMF | Risk Management Framework |
| RMON | Remote Monitoring |
| RNG | Random Number Generator |
| RNN | Recurrent Neural Network |
| ROE | Rules of Engagement |
| ROI | Return On Investment |
| ROM | Read Only Memory |
| ROSC | Regional Operations & Security Center |
| ROSI | Return On Security Investment |
| RP | Relying Party |
| RP | Responsible Person |
| RPA | Robotic Process Automation |
| RPC | Remote Procedure Call |
| RPF | Reverse Path Forwarding |
| RPO | Recovery Point Objective |
| RR | Resource Record |
| RRS | Reduced Redundancy Storage |
| RRSIG | Resource Record Signature |
| RS | Relay Station |
| RS | Router Solicitation |
| RSA | Rivest Shamir Adelman |
| RSBAC | Rule Set Based Access Control |
| RSN | Robust Security Network |
| RSNA | Robust Security Network Association |
| RSNIE | Robust Security Network Information Element |
| RSO | Reduced Sign On |
| RSS | Really Simple Syndication |
| RSSI | Received Signal Strength Indication |
| RSVP | Resource Reservation Protocol |
| RT&E | Research Test & Evaluation |
| RTCP | Real Time Transport Control Protocol |
| RTE | Runtime Environment |
| RTF | Rich Text Format |
| RTLS | Real Time Location System |
| RTM | Requirements Traceability Matrix |
| RTO | Recovery Time Objective |
| RTP | Real Time Transport Protocol |
| RTSP | Real Time Streaming Protocol |
| RTT | Radio Transmission Technology |
| RTU | Remote Terminal Unit |
| RTU | Remote Telemetry Unit |
| RuBAC | Rule Based Access Control |
| R-UIM | Removable User Identity Module |
| RUM | Real User Measurement |
| RUM | Real User Monitoring |
| RUP | Rational Unified Process |
| SASE | Secure Access Service Edge |
| S | Secret |
| S&T | Science & Technology |
| S/MIME | Secure / Multipurpose Internet Mail Extensions |
| S2 | Intelligence Officer U.S. Army |
| S3 | Simple Storage System |
| S3 IA | S3 Infrequent Access |
| SA | Security Association |
| SA | Source Address |
| SA | System Administrator |
| SaaS | Software As A Service |
| SABI | Secret & Below Interoperability |
| SABI WG | Secret & Below Interoperability Working Group |
| SABSA | Sherwood Applied Business Security Architecture |
| SACL | System Access Control List |
| SACS | Security Access Control Systems |
| SAD | Security Association Database |
| SAES | Security Awareness & Education |
| SAFECode | Software Assurance Forum For Excellence In Code |
| SAFER | Secure & Fast Encryption Routine |
| SAID | Security Association Identifier |
| SAISO | Senior Agency Information Security Officer |
| SAL | Security Assurance Level |
| SAM | Secure Application Module |
| SAM | Security Account Manager |
| SAM | Software Asset Management |
| SAMATE | Software Assurance Metrics & Tool Evaluation |
| SAML | Security Assertion Markup Language |
| SAMM | Software Assurance Maturity Model |
| SAN | Storage Area Network |
| SANS | System Administration Networking & Security Institute |
| SAP | Security Assessment Plan |
| SAP | Special Access Program |
| SAPCO | Sap Central Office |
| SAQ | Self Assessment Questionnaire |
| SAR | Security Assessment Report |
| SAR | Special Access Required |
| SAS | Statement On Auditing Standards |
| SASL | Simple Authentication & Security Layer |
| SAST | Static Analysis Security Testing |
| SAST | Static Application Security Testing |
| SATA | Serial Advanced Technology Attachment |
| SATAN | Systems Administrators’ Tool For Assessing Networks |
| SBB | Solution Building Blocks |
| SBC | Session Border Controller |
| S-BGP | Secure Border Gateway Protocol |
| SBU | Sensitive But Unclassified |
| SC | Subcommittee |
| SC | Supplementary Content |
| SCA | Security Control Assessment / Or Security Control Assessor |
| SCA | Security Control Assessor |
| SCA | Software Composition Analysis |
| SCA | Stored Communications Act |
| SCADA | Supervisory Control & Data Acquisition |
| SCAO | SIPRNET Connection Approval Office |
| SCAP | Security Content Automation Protocol |
| SCCM | System Center Configuration Manager |
| SCCP | Skinny Client Control Protocol |
| SCCVI | Secure Configuration Compliance Validation Initiative |
| SCD | Source Code Disclosure |
| SCE | Service Cryptologic Element |
| SCG | Security Classification Guide |
| SCG | Security Configuration Guide |
| SCI | Sensitive Compartmented Information |
| SCIF | Sensitive Compartmented Information Facility |
| SCIM | System For Cross Domain Identity Management |
| SCM | Search Content Marketing |
| SCM | Software Configuration Management |
| SCM | Supply Chain Management |
| SCP | Secure Copy Protocol |
| SCRI | Secure Compliance Remediation Initiative |
| SCRM | Supply Chain Risk Management |
| SCSI | Small Computer System Interface |
| SCTP | Stream Control Transmission Protocol |
| SD | Secure Digital |
| SDA | Static Data Authentication |
| SDD | System Design Description |
| SDDC | Software Defined Data Center |
| SDIO | Secure Digital Input Output |
| SDK | Software Development Kit |
| SDL | Security Development Lifecycle |
| SDLC | Software Development Life Cycle |
| SDLC | Synchronous Data Link Control |
| SDLC | System Development Life Cycle |
| SDN | Software Defined Network |
| SDO | Standards Development Organization |
| SDP | Service Discovery Protocol |
| SDP | Session Description Protocol |
| SDP | Software Defined Perimeter |
| SDS | Software Defined Storage |
| SDSL | Symmetric Digital Subscriber Line |
| SD-WAN | Software Defined WAN |
| SE | Social Engineering |
| SE | Systems Engineer |
| SEA | Search Engine Advertising |
| SECaaS | Security As A Service |
| SECDEF | Secretary of Defense |
| SED | Self Encrypting Drive |
| SEI | Software Engineering Institute |
| SELC | Systems Engineering Life Cycle |
| SEM | Search Engine Marketing |
| SEM | Security Event Management |
| SEMP | System Engineering Management Plan |
| SEMS | Security Event Management System |
| SEND | Secure Neighbor Discovery |
| SEO | Search Engine Optimization |
| SEP | Secure Entry Point |
| SEP | Systems Engineering Plan |
| SERM | Search Engine Reputation Management |
| SERP | Search Engine Results Page |
| SES | Amazon Simple Email System |
| SET | Secure Electronic Transaction |
| SET | Secure Encrypted Transaction |
| SEV | Secure Encrypted Virtualization |
| SF | Session Fixation |
| SFA | Single Factor Authentication |
| SFTP | Secure File Transfer Protocol |
| SFTP | SSH File Transfer Protocol |
| SGML | Standard Generalized Markup Language |
| SGSN | Serving GPRS Support Node |
| SGX | Software Guard Extensions |
| SHA | Secure Hash Algorithm |
| SHA-1 | Secure Hash Algorithm 1 |
| SHA-2 | Secure Hash Algorithm 2 |
| SHA-256 | Secure Hash Algorithm 256 |
| shim6 | Site Multihoming By Ipv6 Intermediation |
| SHS | Secure Hash Standard |
| S-HTTP | Secure Hypertext Transfer Protocol |
| SIA | Security Industry Association |
| SIA | System Interconnection Agreement |
| SIAO | Senior Information Assurance Officer |
| SIC | System Identification Code |
| SID | Security Identifier |
| SIEM | Security Information & Event Management |
| SIG | Special Interest Group |
| SII | Suitability/Security Investigation Index |
| SIIT | Stateless IP/ICMP Translation Algorithm |
| SIL | Safety Integrity Level |
| SIM | Security Information Management |
| SIM | Subscriber Identity Module |
| SIO | Senior Intelligence Officer |
| SIO | Special Information Operations |
| SIP | Session Initiation Protocol |
| SIPRNet | Secret Internet Protocol Router Network |
| SIS | Safety Instrumented System |
| SISO | Senior Information Security Officer |
| SISR | Signals Intelligence Security Regulation |
| SIT | System Integration Testing |
| SITR | Secret Internet Protocol Router Network Information Technology Registry |
| SKE | Security Key Exchange |
| SKEME | Secure Key Exchange Mechanism |
| SKid | Script Kiddie |
| SKIP | Simple Key– Management For Internet Protocol |
| SKPP | Separation Kernel Protection Profiles |
| SLA | Service Level Agreement |
| SLE | Single Loss Expectancy |
| SLI | Scalable Link Interface |
| SLIP | Serial Line Internet Protocol |
| SLO | Service Level Objective |
| SLR | Service Level Requirement |
| SM | Social Media |
| SM | System Manager |
| SMART | Self Monitoring Analysis & Reporting Technology |
| SMB | Server Message Block |
| SME | Subject Matter Expert |
| SMI | Security Management Interface |
| SMM | Social Media Marketing |
| SMO | Social Media Optimization |
| SMP | Social Media Platform |
| SMS | Short Message Service |
| SMS | Systems Management Server |
| SMTP | Simple Mail Transfer Protocol |
| SNA | Systems Network Architecture |
| SNAP | Systems/Networks Approval Process |
| SNL | Sandia National Laboratories |
| SNMP | Simple Network Management Protocol |
| SNOMED CT | Systematized Nomenclature of Medicine Clinical Terms |
| SNS | Simple Notification Service |
| SNTP | Simple Network Time Protocol |
| SOA | Service Oriented Architecture |
| SOA | Start of Authority |
| SOAP | Simple Object Access Protocol |
| soBGP | Secure Origin Border Gateway Protocol |
| SOC | Security Operations Center |
| SOC | Service Organization Control |
| SoC | System On A Chip |
| SOCKS | Socket Secure |
| SoD | Segregation of Duties |
| SoD | Separation of Duties |
| SOHO | Small Office / Home Office |
| SOMAP | Security Officers Management & Analysis Project |
| SOMF | Service Oriented Modeling Framework |
| SONET | Synchronous Optical Networking |
| SOO | Statement of Objectives |
| SOP | Standard Operating Procedure |
| SOR | System of Records |
| SORN | System of Records Notice |
| SOS | System of Systems |
| SOW | Statement of Work |
| SOX | Sarbanes Oxley |
| SP | Security Plan |
| SP | Service Pack |
| SP | Special Publication |
| SPA | Simple Power Analysis |
| SPAN | Switched Port Analyzer |
| SPAP | Shiva Password Authentication Protocol |
| SPB | Security Policy Board |
| SPD | Security Policy Database |
| SPF | Sender Policy Framework |
| SPI | Schedule Performance Index |
| SPI | Security Parameter Index |
| SPI | Sensitive Personal Information |
| SPI | Stateful Packet Inspection |
| SPL | Structured Product Labeling |
| SPML | Service Provisioning Markup Language |
| SPNEGO | Simple & Protected GSSAPI Negotiation Mechanism |
| SPOF | Single Point of Failure |
| SPP-ICS | System Protection Profile For Industrial Control Systems |
| SPX | Sequenced Packet Exchange |
| SQL | Structured Query Language |
| SQLi | SQL Injection |
| SQS | Simple Queue Service |
| SQUARE | Security Quality Requirements Engineering |
| SR | Service Release |
| SR | Speech Recognition |
| SRAM | Static Random Access Memory |
| SRE | Site Reliability Engineering |
| SRES | Signed Response |
| SRG | Security Requirements Guide |
| sRGB | Standard Red Green Blue |
| SRS | Software Requirements Specification |
| SRTM | Security Requirements Traceability Matrix |
| SRTP | Secure Real Time Transport Protocol |
| SS | Subscriber Station |
| SS7 | Signaling System #7 |
| SSAA | Systems Security Authorization Agreement |
| SSAE 16 | Statement On Standards For Attestation Engagements 16 |
| SSD | Solid State Drive |
| SSDC | Space & Strategic Defense Command |
| SSDP | Simple Service Discovery Protocol |
| SSE | Server Side Encryption |
| SSE | System Security Engineering |
| SSE-CMM | Systems Security Engineering Capability Maturity Model |
| SSEM | System Security Engineering |
| SSH | Secure Shell |
| SSI | Server Side Includes |
| SSID | Service Set Identifier |
| SSII | Suitability/Security Investigations Index |
| SSL | Secure Socket Layer |
| SSL | Secure Sockets Layer |
| SSL VPN | Secure Sockets Layer Virtual Private Network |
| SSLF | Specialized Security Limited Functionality |
| SSM | Site Security Manager |
| SSM | System Security Manager |
| SSMP | System Security Management Plan |
| SSN | Social Security Number |
| SSO | Single Sign On |
| SSoD | Static Separation of Duty |
| SSP | Secure Simple Pairing |
| SSP | System Security Plan |
| SSPI | Security Support Provider Interface |
| SSRF | Server Side Request Forgery |
| SSTP | Secure Socket Tunneling Protocol |
| ST | Security Target |
| ST&E | Security Test & Evaluation |
| STA | Station |
| STaaS | Storage As A Service |
| STAC | Student Technology Advisory Committee |
| STAR | Security Trust & Assurance Registry |
| STIG | Security Technical Implementation Guide |
| STIGs | Security Technical Implementation Guides |
| STIX | Structured Threat Information Expression |
| STP | Security Test Plan |
| STP | Spanning Tree Protocol |
| STRIDE | Spoofing Tampering Repudiation Information Disclosure Denial of Service Elevation of Privilege |
| STS | Security Token Service |
| SUID | Set User Id |
| SVG | Scalable Vector Graphics |
| SVM | Support Vector Machine |
| SWEBOK | Software Engineering Body of Knowledge |
| SWGDE | Scientific Working Group On Digital Evidence |
| SWS | Simple Workflow Service |
| SWSA | Semantic Web Services Initiative Architecture |
| SYN | Synchronization |
| SZ | Security Zone |
| T&E | Test & Evaluation |
| TA | Test Assertion |
| TA | Transmitter Address |
| TaaS | Testing As A Service |
| TAC | Terminal Action Code |
| TACACS | Terminal Access Controller Access Control System |
| TACACS+ | Terminal Access Controller Access Control System Plus |
| TADR | Threat Agent Detection & Response |
| TAG | Technical Advisory Group |
| TAP | Terminal Access Point |
| TARA | Threat Assessment & Remediation Analysis |
| TB | Terabyte |
| TC | Technical Committee |
| TC | Transaction Certificate |
| TC68 | ISO/IEC Technical Committee 68 |
| TCB | Trusted Computing Base |
| TCO | Total Cost of Ownership |
| TCP | Transmission Control Protocol |
| TCP/IP | Transmission Control Protocol/Internet Protocol |
| TCSEC | Trusted Computer System Evaluation Criteria |
| TCSEC / ITSEC | Trusted Computer System Evaluation Criteria / Information Technology Security Evaluation Criteria |
| TDE | Transparent Data Encryption |
| TDEA | Triple Data Encryption Algorithm |
| TDM | Time Division Multiplexing |
| TDMA | Time Division Multiple Access |
| TDS | Tabular Data Stream |
| TEID | Tunnel Endpoint Identifier (GTPv1) |
| TEK | Traffic Encryption Key |
| TEMP | Test & Evaluation Master Plan |
| TERENA | Trans European Research & Education Networking Association |
| TFN | Tribe Flood Network |
| TFT | Thin Film Transistor |
| TFTP | Trivial File Transfer Protocol |
| TGS | Ticket Granting Service |
| TGT | Ticket Granting Ticket |
| THREATCON | Threat Condition |
| TIA | Telecommunications Industry Association |
| TIARA | Tactical Intelligence & Related Activities |
| TID | Tag Identifier |
| TID | Tamper Indicating Device |
| TID | Tunnel Identifier (GTPv0) |
| TIFF | Tagged Image File Format |
| TIMS | Treaty Information Management System |
| TIP | Technology Innovation Program |
| TISS | Telecommunications & Automated Information Systems Security |
| TK | Temporal Key |
| TKIP | Temporal Key Integrity Protocol |
| TLD | Top Level Domain |
| TLS | Transport Layer Security |
| TMO | Technology Management Office |
| TMOVS | Modes of Operation Validation System For The Triple DES Algorithm |
| TOC / TOU | Time of Check / Time of Use |
| ToD | Time of Day |
| TOE | Target of Evaluation |
| TOGAF | The Open Group Architecture Framework |
| Tor | The Onion Router |
| ToS | Terms of Service |
| TOS | Trusted Operating System |
| ToS | Type of Service |
| TPA | Third Party Administrator |
| TPC | Transmission Power Control |
| TPM | Technical Performance Measurement |
| TPM | Trusted Platform Module |
| TPS | Transaction Per Second |
| TPS | Transaction Processing System |
| TPU | Tensor Processing Unit |
| TR | Technical Report |
| TRANSEC | Transmission Security |
| TRMC | Test Resource Management Center |
| TRT | Transport Relay Translator |
| TS | Technical Specification |
| TSA | Time Stamping Authority |
| TSC | TKIP Sequence Counter |
| TSIG | Secret Key Transaction Authentication For DNS |
| TSIG | Transaction Signature |
| TSN | Transitional Security Network |
| TSN | Trusted Systems & Networks |
| TSP | Time Stamp Protocol |
| TT&E | Test |
| TTF | Tag Talks First |
| TTF | TrueType Font |
| TTL | Time To Live |
| TTLS | Tunneled Transport Layer Security |
| TTP | Tactics Techniques & Procedures |
| TTP | Trusted Third Party |
| TTY | Teletype |
| TVR | Terminal Verification Results |
| TWAIN | Toolkit Without An Informative Name |
| TXT | Text |
| U | Unclassified |
| U.S. | United States |
| U.S.C. | United States Code |
| UA | Universal Analytics |
| UAA | Uncontrolled Access Area |
| UAC | User Account Control |
| UART | Universal Asynchronous Receiver/Transmitter |
| UAT | User Acceptance Testing |
| UBA / UEBA | User Behavior Analytics |
| UBR | Universal Description |
| UC | Unified Capabilities |
| UC | Unified Communications |
| UCAO | Unclassified Connection Approval Office |
| UCC | Uniform Code Council |
| UCDMO | Unified Cross Domain Management Office |
| UCE | Unsolicited Commercial Email |
| UCMJ | Uniform Code of Military Justice |
| UCNI | Unclassified Controlled Nuclear Information |
| UD | Unauthorized Disclosure |
| UDDI | Universal Description Discovery & Integration |
| UDF | Universal Disk Format |
| UDID | Unique Device Identifier |
| UDP | User Datagram Protocol |
| UEFI | Unified Extensible Firmware Interface |
| UFS | Unix File System |
| UHF | Ultra High Frequency |
| UI | User Interface |
| UI/UX | User Interface/User Experience |
| UICC | Universal Integrated Circuit Card |
| UK | United Kingdom |
| UL | Underwriters’ Laboratories |
| ULA | Unique Local Address |
| ULP | Upper Layer Protocol |
| UML | Unified Modeling Language |
| UMLS | Unified Medical Language System |
| UMPC | Ultra Mobile Personal Computer |
| UMTS | Universal Mobile Telecommunications System |
| UNC | Universal Naming Convention |
| UNII | Unlicensed National Information Infrastructure |
| UPC | Universal Product Code |
| UPN | User Principal Name |
| UPnP | Universal Plug & Play |
| UPS | Uninterruptible Power Supply |
| UR | User Representative |
| URI | Uniform Resource Identifier |
| URL | Uniform Resource Locator |
| URLLC | Ultra Reliable & Low Latency Communications |
| US | United States |
| USACIDU | United States Army Criminal Investigation Command |
| USAF | United States Air Force |
| USB | Universal Serial Bus |
| US-CERT | United States Computer Emergency Readiness Team |
| USD (AT&L) | Under Secretary of Defense For Acquisition Technology & Logistics |
| USD (I) | Under Secretary of Defense For Intelligence |
| USD (P&R) | Under Secretary of Defense For Personnel & Readiness |
| USD (P) | Under Secretary of Defense For Policy |
| USIM | Universal Subscriber Identity Module |
| USPS | United States Postal Service |
| USSAN | United States Security Authority/North Atlantic Treaty Organization (Nato) |
| USSID | United States Signals Intelligence Directive |
| USSTRATCOM | United States Strategic Command |
| UTC | Coordinated Universal Time |
| UTF | Unicode Transformation Format |
| UTM | Unified Threat Management |
| UUCP | Unix To Unix Copy Protocol |
| UUID | Universally Unique Identifier |
| UWB | Ultrawideband |
| V2I | Vehicle To Infrastructure |
| V2N | Vehicle To Network |
| V2P | Vehicle To Passenger |
| V2R | Vehicle To Roadway |
| V2V | Vehicle To Vehicle |
| V2X | Vehicle To Everything |
| VAAP | Vulnerability & Assessment Program |
| VAN | Value Added Network |
| VAS | Vulnerability Assessment System |
| VB | Visual Basic |
| VB.NET | Visual Basic .Net |
| VBA | Visual Basic For Applications |
| VBS | Visual Basic Script |
| VCI | Virtual Channel Identifier |
| vCPE | Virtualized Customer Premises Equipment |
| VCS | Veritas Cluster Server |
| VCS | Version Control Systems |
| VDC | Virtual Data Center |
| VDI | Virtual Desktop Infrastructure |
| VDU | Visual Display Unit |
| VFAT | Virtual File Allocation Table |
| VFD | Variable Frequency Drive |
| VG | Volume Group |
| VGA | Video Graphics Array |
| VHD | Virtual Hard Drive |
| VHF | Very High Frequency |
| VIN | Vehicle Identification Number |
| VIP | Virtual IP Address |
| VLAN | Virtual Local Area Network |
| VLB | VESA Local Bus |
| VM | Virtual Machine |
| VMS | Voice Mail Service |
| VMS | Vulnerability Management System |
| VNC | Virtual Network Computing |
| VNIC | Virtual Network Interface Card |
| VoIP | Voice Over Internet Protocol |
| VOIPSA | Voice Over IP Security Alliance |
| VPC | Virtual Private Cloud |
| VPDN | Virtual Private Dial Up Network |
| VPG | Virtual Private Gateway |
| VPI | Virtual Path Identifier |
| VPN | Virtual Private Network |
| VPNC | Virtual Private Network Consortium |
| VPS | Virtual Private Server |
| VRRP | Virtual Router Redundancy Protocol |
| VSM | Virtual Supervisor Module |
| VTL | Virtual Tape Library |
| VXLAN | Virtual Extensible Local Area Network |
| W3C | World Wide Web Consortium |
| WAF | Web Application Firewall |
| WAIS | Wide Area Information Server |
| WAMP | Windows Apache MySQL and PHP |
| WAN | Wide Area Network |
| WAP | Web Application Protection |
| WAP | Wireless Access Point |
| WAP | Wireless Access Protocol |
| WAP | Wireless Application Protocol |
| WaSP | Web Standards Project |
| WAVE | Wireless Access For Vehicular Environment |
| WAYF | Where Are You From |
| WBS | Work Breakdown Structure |
| WCCP | Web Cache Coordination Protocol |
| W-CDMA | Wideband Code Division Multiple Access |
| WDDM | Windows Display Driver Model |
| WDS | Wireless Distribution System |
| WebDAV | Web Distributed Authoring & Versioning |
| WEP | Wired Equivalent Privacy |
| WfMC | Workflow Management Coalition |
| WfMS | Workflow Management System |
| WG | Working Group |
| WHO | World Health Organization |
| WiDEN | Wideband Integrated Digital Enhanced Network |
| WIDPS | Wireless Intrusion Detection & Prevention System |
| WiMAX | Worldwide Interoperability For Microwave Access |
| WIMP | Windows Icons Menus Pointer |
| WINS | Windows Internet Name Service |
| WIPO | World Intellectual Property Organization |
| WLAN | Wireless Local Area Network |
| WMA | Warfighting Mission Area |
| WMAN | Wireless Metropolitan Area Network |
| WMI | Windows Management Instrumentation |
| WML | Wired Markup Language |
| WMM | WiFi Multimedia |
| WORM | Write Once Read Many |
| WP | Wordpress |
| WPA | WiFi Protected Access |
| WPA2 | WiFi Protected Access 2 |
| WPAN | Wireless Personal Area Network |
| WRT | Work Recovery Time |
| WS | Web Services |
| WS- | Web Services Authorization |
| WSDL | Web Services Definition Language |
| WSH | Windows Script Host |
| WS-I | Web Services Interoperability |
| WS-Policy | Web Services Policy |
| WS-Privacy | Web Services Privacy |
| WSS4J | Web Services Security For Java |
| WS-Secure Conversation | Web Services Secure Conversation |
| WS-Security | Web Services Security |
| WS-Trust | Web Services Trust |
| WSUS | Windows Server Update Services |
| WTLS | Wireless Transport Layer Security |
| WTO | World Trade Organization |
| WVE | Wireless Vulnerabilities & Exploits |
| WWAN | Wireless Wide Area Network |
| WWN | World Wide Name |
| WWW | World Wide Web |
| WYSIWYG | What You See Is What You Get |
| XaaS | Anything As A Service |
| XACL | XML Access Control Language |
| XACML | Extensible Access Control Markup Language |
| XAML | Extensible Application Markup Language |
| XCBC | Xor Cipher Block Chaining |
| XCCDF | Extensible Configuration Checklist Description Format |
| XDR | External Data Representation |
| XHTML | Extensible Hypertext Markup Language |
| XKMS | XML Key Management Specification |
| XLC | Expedited Life Cycle |
| XML | Extensible Markup Language |
| XMP | Extensible Metadata Platform |
| XMPP | Extensible Messaging & Presence Protocol |
| XOR | Exclusive Or |
| XPathI | XPath Injection |
| XrML | Extensible Rights Markup Language |
| XSD | XML Schema Definition |
| XSL | Extensible Stylesheet Language |
| XSLT | Extensible Stylesheet Language Transformation |
| XSS | Cross Site Scripting |
| YAML | YAML Ain’t Markup Language |
| ZIF | Zero Insertion Force |
| ZMOT | Zero Moment of Truth |
| ZSK | Zone Signing Key |