Acronym
|
Term
|
(ISC)²
|
International Information Systems Security Certification Consortium
|
1xRTT
|
One Times Radio Transmission Technology
|
2FA/TFA
|
Two Factor Authentication
|
3DES
|
Triple Data Encryption Algorithm
|
3DES
|
Triple Data Encryption Standard
|
3FA
|
Three Factor Authentication
|
3G
|
3rd Generation
|
3GPP
|
3rd Generation Partnership Project
|
3GPP2
|
3rd Generation Partnership Project 2
|
3PAO
|
Third Party Assessor Organization
|
4D QL
|
4D Query Language
|
4FA,
|
Four Factor Authentication
|
A
|
Address Resource Record Type
|
A&A
|
Assessment & Authorization
|
AA
|
Abac Attribute Authority
|
AAA
|
Access Approval Authority
|
AAA
|
Army Audit Agency
|
AAA
|
Authentication Authorization Accounting
|
AAAK
|
Authentication
|
AAC
|
Application Authentication Cryptogram
|
AAD
|
Additional Authenticated Data
|
AAL
|
Authentication Assurance Level
|
AAR
|
After Action Report
|
AAS
|
Adaptive Antenna System
|
ABAC
|
Attribute Based Access Control
|
ABB
|
Architecture Building Blocks
|
ABCS
|
Army Battle Command System
|
AC
|
Application Cryptogram
|
ACA
|
Access Control Authority
|
ACA
|
Affordable Care Act
|
ACCM
|
Asset Configuration Compliance Module
|
ACE
|
Access Control Entry
|
ACES
|
Automated Continuing Evaluation System
|
ACID
|
Atomicity Consistency Isolation Durability
|
ACK
|
Acknowledgement
|
ACL
|
Access Control List
|
ACM
|
Association For Computing Machinery
|
ACO
|
Accountable Care Organizations
|
ACO
|
Authenticated Cipher offset
|
ACSI
|
Assistant Chief of Staff For Intelligence (Army)
|
AD
|
Active Directory
|
AD
|
Authenticated Data
|
ADB
|
Android Debug Bridge
|
ADC
|
Analog To Digital Converter
|
ADF
|
Automatic Document Feeder
|
ADFS
|
Active Directory Federation Services
|
ADH
|
Anonymous Diffie Hellman
|
ADOT
|
Academic Directors of Technology
|
ADP
|
Automated Data Processing
|
ADPSO
|
Automated Data Processing Security Officer
|
ADPSSO
|
Automated Data Processing System Security Officer
|
ADR
|
Adjudicative Desk Reference
|
ADS
|
Alternate Data Stream
|
ADS
|
Automated Data System
|
ADT
|
Android Development Tools
|
ADT
|
Admissions Discharge & Transfer
|
AES
|
Advanced Encryption Standard
|
AES-256
|
Advanced Encryption Standard 256
|
AES-512
|
Advanced Encryption Standard 512
|
AES-CBC
|
Advanced Encryption Standard Cipher Block Chaining
|
AES-CTR
|
Advanced Encryption Standard Counter Mode
|
AF
|
Air Force
|
AFAIK
|
As Far As I Know
|
AFB
|
Air Force Base
|
AFC4A
|
Air Force C4 Agency
|
AFCAF
|
Air Force Central Adjudication Facility
|
AFH
|
Adaptive Frequency Hopping
|
AFI
|
Air Force Instruction
|
AFIWC
|
Air Force Information Warfare Center
|
AFMAN
|
Air Force Manual
|
AFOSF
|
Air Force Office of Security Forces
|
AFOSI
|
Air Force Office of Special Investigation
|
AFOSP
|
Air Force Office of Security Police
|
AFP
|
Apple Filing Protocol
|
AFPC
|
Air Force Personnel Center
|
AFPD
|
Air Force Policy Directive
|
AFR
|
Air Force Regulation
|
AFSCO
|
Air Force Security Clearance Office
|
AG
|
Attorney General
|
AG/SCM
|
Advisory Group/Security Countermeasures
|
A-GPS
|
Assisted Global Positioning System
|
AGS
|
Architectural Graphic Standards
|
AH
|
Authentication Header
|
AI
|
Artificial Intelligence
|
AIA
|
Air Intelligence Agency
|
AIA
|
Army Intelligence Agency
|
AICPA
|
American Institute of Certified Public Accountants
|
AID
|
Application Identifier
|
AIDC
|
Automatic Identification & Data Capture
|
AIM
|
Association For Automatic Identification & Mobility
|
AIMS
|
Automated Infrastructure Management System
|
AIP
|
Application Interchange Profile
|
AIS
|
Artificial Intelligence System
|
AIS
|
Automated Information Systems
|
AISS
|
Automated Information Systems Security
|
AISSP
|
Automated Information Systems Security Plan
|
AIT
|
Automatic Identification Technology
|
AIX
|
Advanced Interactive Executive
|
AJAX
|
Asynchronous JavaScript & XML
|
AK
|
Authorization Key
|
AKID
|
Authorization Key Identifier
|
AKM
|
Authentication & Key Management
|
ALE
|
Annualized Loss Expectancy
|
ALG
|
Application Layer Gateway
|
ALU
|
Arithmetic Logic Unit
|
AMA
|
Ask Me Anything
|
AMI
|
Amazon Machine Image
|
AMIDS
|
Audit Monitoring & Intrusion Detection System
|
AMPS
|
Advanced Mobile Phone System
|
ANACI
|
Access National Agency Check With Written Inquiries
|
ANF
|
Application Normative Framework
|
ANN
|
Artificial Neural Network
|
ANSI
|
American National Standards Institute
|
AO
|
Area of Operations
|
AO
|
Authorizing official
|
AOA
|
Analysis of Alternatives
|
AOA
|
Area of Application
|
AODR
|
Authorizing official Designated Representative
|
AP
|
Access Point
|
APC
|
Ambulatory Payment Classification
|
APEC
|
Asia Pacific Economic Cooperation
|
API
|
Application Programming Interface
|
APK
|
Android Package Kit
|
APM
|
Actions Per Minute
|
APN
|
Access Point Names
|
APT
|
Advanced Persistent Threat
|
APU
|
Accelerated Processing Unit
|
APWG
|
Anti Phishing Working Group
|
AQ-SAP
|
Acquisition Special Access Program
|
ARC
|
Authorization Response Code
|
ARIN
|
American Registry For Internet Numbers
|
ARN
|
Amazon Resource Name
|
ARO
|
Annualized Rate of Occurrence
|
ARP
|
Address Resolution Protocol
|
ARPA
|
Advanced Research Projects Agency
|
ARPC
|
Authorization Response Cryptogram
|
ARQC
|
Authorization Request Cryptogram
|
ARRA
|
American Recovery & Reinvestment Act
|
AS
|
Authentication Server
|
AS
|
Autonomous System
|
ASAP
|
As Soon As Possible
|
ASC
|
Anti Spyware Coalition
|
ASC
|
X9 Accredited Standards Committee X9
|
ASCII
|
American Standard Code For Information Interchange
|
ASCLD-LAB
|
The American Society of Crime Laboratory Directors Laboratory Accreditation Board
|
ASD (C31)
|
Assistant Secretary of Defense For Command Control Communication & Intelligence
|
ASDR
|
Application Security Desk Reference
|
ASG
|
Abstract Semantic Graph
|
ASG
|
Auto Scaling Group
|
ASIMS
|
Automated Security Incident Measuring System
|
ASLR
|
Address Space Layout Randomization
|
ASN
|
Autonomous System Number
|
ASN.1
|
Abstract Syntax Notation 1
|
ASP
|
Active Server Pages
|
ASP
|
Application Service Provider
|
ASSIST
|
Automated System Security Incident Support Team
|
AST
|
Abstract Syntax Tree
|
ASV
|
Approved Scanning Vendor
|
ASVS
|
Application Security Verification Standards
|
ATA
|
Advanced Technology Attachment
|
ATC
|
Anatomical Therapeutic Chemical Classification System
|
ATC
|
Application Transaction Counter
|
ATC
|
Authorization To Connect
|
ATD
|
Authorization Termination Date
|
ATIM
|
Announcement Traffic Indication Message
|
ATM
|
Asynchronous Transfer Mode
|
ATM
|
Automatic Teller Machine
|
ATO
|
Authorization To Operate
|
ATX
|
Advanced Technology Extended
|
AU
|
Activation Unit
|
AUP
|
Acceptable Use Policy
|
AUP
|
Agreed Upon Procedures
|
AV
|
Antivirus
|
AVIEN
|
Anti Virus Information Exchange Network
|
AVP
|
Attribute Value Pair
|
AVX
|
Advanced Vector Extensions
|
AWS
|
Amazon Web Services
|
AZ
|
Availability Zone
|
b
|
Bit
|
B
|
Byte
|
B2B
|
Business To Business
|
B2C
|
Business To Consumer
|
BA
|
Business Associate
|
BAA
|
Business Associate Agreement
|
BAPI
|
Biometric Application Programming Interface
|
BASE
|
Basically Available Soft State Eventually Consistent
|
Bash
|
Bourne Again Shell
|
BBS
|
Bulletin Board System
|
BC
|
Business Continuity
|
BCM
|
Business Continuity Management
|
BCP
|
Best Current Practice
|
BCP
|
Business Continuity Plan
|
BCWP
|
Budgeted Cost of Work Performed
|
BCWS
|
Budgeted Cost of Work Scheduled
|
BDM
|
Banner Document Management
|
BGAN
|
Broadband Global Area Network
|
BGP
|
Border Gateway Protocol
|
BGP-4
|
Border Gateway Protocol 4
|
BI
|
Business Intelligence
|
BIA
|
Bump In The Api
|
BIA
|
Business Impact Analysis
|
BINAS
|
Biosafety Information Network Advisory System
|
BioAPI
|
Biometric Application Programming Interface
|
BIOS
|
Basic Input Output System
|
BIPN
|
Background Investigation Plus Current National Agency Check
|
BIS
|
Bureau of Industry & Security
|
BISS
|
Base & Installation Security System
|
BITS
|
Background Intelligent Transfer Service
|
BITS
|
Bump In The Stack
|
Blob
|
Binary Large Object
|
BMA
|
Business Mission Area
|
BMS
|
Balanced Magnetic Switch
|
BPEL
|
Business Process Execution Language
|
BPML
|
Business Process Modeling Language
|
BPO
|
Business Process Outsourcing
|
BPSS
|
Business Process Specification Schema
|
BREW
|
Binary Runtime Environment For Wireless
|
BRM
|
Business Reference Model
|
BRP
|
Business Recovery (Resumption) Plan
|
BS
|
Base Station
|
BS
|
British Standard
|
BSC
|
Base Station Controller
|
BSC
|
Binary Synchronous Communications
|
BSI
|
British Standards Institution
|
BSIA
|
British Security Industry Association
|
BSIMM
|
Building Security In Maturity Model
|
BSoD
|
Blue Screen of Death
|
BSP
|
Best Security Practice
|
BSS
|
Basic Service Set
|
BSSID
|
Basic Service Set Identifier
|
BT
|
Bluetooth
|
BTL
|
Block Transformation Layer
|
BTNS
|
Better Than Nothing Security
|
BTS
|
Base Transceiver Station
|
BU
|
Binding Update
|
BUA
|
Binding Update Acknowledgement
|
BYOA
|
Bring Your Own Apps
|
BYOC
|
Bring Your Own Cloud
|
BYOD
|
Bring Your Own Device
|
BYOE
|
Bring Your Own Encryption
|
BYOI
|
Bring Your Own Identity
|
BYON
|
Bring Your Own Network
|
C&A
|
Certification & Accreditation
|
C&A WG
|
Certification & Accreditation Working Group
|
C2
|
Command & Control
|
C2W
|
Command & Control Warfare
|
C4
|
Command Control Communications & Computers
|
C4ISR
|
Command Control Communications Computer Intelligence Surveillance & Reconnaissance
|
CA
|
Certificate Authority
|
CA
|
Certification Agent
|
CAAP
|
Critical Asset Assurance Program
|
CaaS
|
Compliance As A Service
|
CaaS
|
Content As A Service
|
CAB
|
Change Advisory Board
|
CAC
|
Common Access Card
|
CADE
|
Corporate Average Data Center Efficiency
|
CAIDA
|
Cooperative Association For Internet Data Analysis
|
CAK
|
Card Authentication Key
|
CAL
|
Category Assurance List
|
CAM
|
Card Authentication Method
|
CAN
|
Computer Network Attack
|
CAN-SPAM
|
Controlling The Assault of Non Solicited Pornography & Marketing Act
|
CAO
|
Contract Administration Office
|
CAP
|
Connection Approval Program
|
CAP
|
Controlled Access Program
|
CAP
|
Corrective Action Plan
|
CAPCO
|
Controlled Access Program Coordination Office
|
CAPEC
|
Common Attack Pattern Enumeration & Classification
|
CAPEX
|
Capital Expenditure
|
CAPK
|
Certificate Authority Public Key
|
CAPTCHA
|
Completely Automated Public Turing Test To Tell Computers & Humans Apart
|
CARO
|
Computer Antivirus Research Organization
|
CARVER
|
Criticality Accessibility Recuperability Vulnerability Effect & Recognizability
|
CAS
|
Casualty Actuarial Society
|
CAS
|
Central Authentication System
|
CASB
|
Cloud Access Security Broker
|
CAV
|
Card Authentication Value
|
CAVP
|
Cryptographic Algorithm Validation Program
|
CAVS
|
Connected & Automated Vehicles
|
CBA
|
Cost Benefit Analysis
|
CBAC
|
Context Based Access Control
|
CBC
|
Cipher Block Chaining
|
CBC-MAC
|
Cipher Block Chaining Message Authentication Code
|
CBEFF
|
Common Biometric Exchange File Format
|
CBI
|
Confidential Business Information
|
CBIPM
|
Confidential Business Information Protective Measure
|
CBSP
|
Cloud Based Security Providers
|
CC
|
Common Criteria
|
CCA
|
Clinger Cohen Act
|
CCA
|
Cloud Computing Agreements
|
CCB
|
Change Control Board
|
CCB
|
Configuration Control Board
|
CCE
|
Common Configuration Enumeration
|
CCEVS
|
Common Criteria Evaluation & Validation Scheme
|
CCI
|
Control Correlation Identifier
|
CCIPS
|
Computer Crime & Intellectual Property Section
|
CCK
|
Complementary Code Keying
|
CCM
|
Cloud Controls Matrix
|
CCM
|
Counter Mode With CBC MAC
|
CCMP
|
Counter Mode With Cipher Block Chaining Message Authentication Code Protocol
|
CCP
|
Common Control Provider
|
CCRA
|
Cloud Computing Reference Architecture
|
CCRA
|
Common Criteria Recognition Arrangement
|
CCSS
|
Common Configuration Scoring System
|
CCT
|
Correlated Color Temperature
|
CCTA
|
Central Computer & Telecommunications Agency
|
CCTL
|
Common Criteria Testing Laboratory
|
ccTLD
|
Country Code Top Level Domain
|
CCTV
|
Closed Circuit Television
|
CD
|
Checking Disabled
|
CD
|
Compact Disc
|
CD
|
Cross Domain
|
CDA
|
Combined Dynamic Data Authentication
|
CDC
|
Centers For Disease Control
|
CDE
|
Cardholder Data Environment
|
CDFS
|
Compact Disc File System
|
CDMA
|
Code Division Multiple Access
|
CDMI
|
Cloud Data Management Interface
|
CDN
|
Content Delivery Network
|
CDN
|
Content Distribution Network
|
CDO
|
Chief Data Officer
|
CDR
|
Call Detail Records
|
CDR
|
Critical Design Review
|
CD-R
|
Compact Disc Recordable
|
CD-ROM
|
Compact Disc Read Only Memory
|
CD-RW
|
Compact Disc Rewritable
|
CDS
|
Cross Domain Solution
|
CDSE
|
Center For Development of Security Excellence
|
CDSSO
|
Cross Domain Single Sign On
|
CE
|
Compromising Emanations
|
CE
|
Covered Entity
|
CEM
|
Common Evaluation Methodology
|
CEO
|
Chief Executive Officer
|
CER
|
Canonical Encoding Rules
|
CER
|
Crossover Error Rate
|
CERIAS
|
Center For Education & Research In Information Assurance & Security
|
CERT
|
Computer Emergency Response Team
|
CERT/CC
|
Cert/Coordination Center
|
CF
|
Compact Flash
|
CFAA
|
Computer Fraud & Abuse Act
|
CFB
|
Cipher Feedback
|
CFI
|
Computer & Financial Investigations
|
CFO
|
Chief Financial Officer
|
CFR
|
Code Federal Regulations
|
CFR
|
Code of Federal Regulations
|
CFTT
|
Computer Forensics Tool Testing
|
CGA
|
Cryptographically Generated Addresses
|
CGI
|
Common Gateway Interface
|
CHAP
|
Challenge Handshake Authentication Protocol
|
CHUID
|
Cardholder Unique Identifier
|
CI
|
Counterintelligence
|
CI
|
Critical Information
|
CI/CD
|
Continuous Integration/Continuous Deployment
|
CIA
|
Central Intelligence Agency
|
CIAC
|
Computer Incident Advisory Capability
|
CIAO
|
Critical Infrastructure Assurance Office
|
CIAR
|
Counterintelligence Awareness & Reporting
|
CID
|
Card Id
|
CID
|
Cryptogram Information Data
|
CIDR
|
Classless Inter Domain Routing
|
CIFA
|
Counterintelligence Field Activity
|
CIFS
|
Common Internet File System
|
CIHI
|
Canadian Institute For Health Information
|
CIIA
|
Critical Infrastructure Information Act
|
CIK
|
Crypto Ignition Key
|
CIO
|
Chief Information Officer
|
CIP
|
Critical Infrastructure Protection
|
CIPA
|
Classified Information Procedures Act
|
CIPC
|
Critical Infrastructure Protection Committee
|
CIPSEA
|
Confidential Information Protection & Statistical Efficiency Act
|
CIPWG
|
Critical Infrastructure Protection Working Group
|
CIR
|
Committed Information Rate
|
CIRC
|
Computer Incident Response Capability
|
CIRC
|
Computer Incident Response Center
|
CIRDB
|
Cerias Incident Response Database
|
CIRT
|
Computer Incident Response Team
|
CIS
|
Center For Internet Security
|
CIS
|
Cryptologic Information System
|
CISA
|
C4I Integration Support Activity
|
CISA
|
Certified Information Systems Auditor
|
CISARA
|
Counterintelligence Security Countermeasures & Related Activities
|
CISC
|
Complex Instruction Set Computing
|
CISM
|
Certified Information Systems Security Manager
|
CISO
|
Chief Information Security Officer
|
CISO
|
Counterintelligence Support Officer
|
CISP
|
Counterintelligence Support Plan
|
CISSM
|
Component Information System Security Manager
|
CISSP
|
Certified Information Systems Security Professional
|
CITAC
|
Computer Investigation & Infrastructure Threat Assessment Center
|
CITS
|
Cooperative Intelligent Transportation System
|
CJCS
|
Chairman of The Joint Chiefs of Staff
|
CJCSI
|
Chairman Joints Chiefs of Staff Instruction
|
CKTS
|
Computerized Key Telephone System
|
CLAS
|
Classified By
|
CLASP
|
Comprehensive Lightweight Application Security Process
|
CLF
|
Common Log Format
|
CLI
|
Command Line Interface
|
CLOB
|
Character Large Object
|
CLOUD
|
Clarifying Lawful Overseas Use of Data
|
CLR
|
Common Language Runtime
|
cm
|
Centimeter
|
CM
|
Classification Management
|
CM
|
Configuration Management
|
CM
|
Content Management
|
CM
|
Countermeasure
|
CMA
|
Certificate Management Authority
|
CMAC
|
Cipher Based Method Authentication Code
|
CMB
|
Change Management Board
|
CMB
|
Configuration Management Board
|
CMDB
|
Configuration Management Database
|
CMDS
|
Computer Misuse Detection System
|
CME
|
Common Malware Enumeration
|
CMI
|
Classified Military Information
|
CMIWG
|
Classification Markings & Implementation Working Group
|
CMM
|
Capability Maturity Model
|
CMMI
|
Capability Maturity Model Integration
|
CMOS
|
Complementary Metal Oxide Semiconductor
|
CMP
|
Configuration Management Plan
|
CMPL
|
Civil Monetary Penalties Law
|
CMS
|
Centers For Medicare & Medicaid Services
|
CMS
|
Comsec Management System
|
CMS
|
Configuration Management System
|
CMS
|
Content Management System
|
CMS
|
Cryptographic Message Syntax
|
CMSS
|
Common Misuse Scoring System
|
CMVP
|
Cryptographic Module Validation Program
|
CN
|
Common Name
|
CN
|
Correspondent Node
|
CNA
|
Computer Network Attack
|
CNAME
|
Canonical Name
|
CNAP
|
Cybersecurity National Action Plan
|
CNCI
|
Comprehensive National Cybersecurity Initiative
|
CND
|
Computer Network Defense
|
CNDSP
|
Computer Network Defense Service Provider
|
CNE
|
Computer Network Exploitation
|
CNN
|
Convolutional Neural Network
|
CNSI
|
Classified National Security Information
|
CNSS
|
Committee On National Security Systems
|
CNSSD
|
Committee On National Security Systems Directives
|
CNSSI
|
Committee On National Security Systems Instruction
|
CNSSP
|
Committee On National Security Systems Policy
|
CO
|
Cyberspace Operations
|
CoA
|
Care of Address
|
COBIT
|
Control Objectives For Information & Related Technologies
|
codec
|
Coder/Decoder
|
COE
|
Common Operating Environment
|
COI
|
Conflict of Interest
|
COM
|
Component Object Model
|
COMINT
|
Communications Intelligence
|
CompaaS
|
Compute As A Service
|
COMSEC
|
Communications Security
|
CONOPS
|
Concept of Operations
|
COO
|
Chief Operating Officer
|
COOP
|
Continuity of Operations
|
COOP
|
Continuity of Operations Plan
|
COPPA
|
Children’S Online Privacy Protection Act
|
CORBA
|
Common Object Request Broker Architecture
|
CORS
|
Cross Origin Resource Sharing
|
COSO
|
Commission of Sponsoring Organizations of The Treadway Commission
|
COTM
|
Communications On The Move
|
COTS
|
Commercial off The Shelf
|
CP
|
Certificate Policy
|
CP
|
Contingency Plan
|
CPA
|
Certified Public Accountant
|
CPA
|
Cost Per Action
|
CPC
|
Cost Per Click
|
CPE
|
Common Platform Enumeration
|
CPI
|
Compression Parameter Index
|
CPL
|
Cost Per Lead
|
CPM
|
Cost Per Thousand Impressions
|
CPM
|
Critical Path Method
|
CPNI
|
Center For The Protection of National Infrastructure
|
CPO
|
Chief Privacy Officer
|
CPS
|
Certificate Practice Statement
|
CPS
|
Cyber Physical System
|
CPSO
|
Command Program Security Officer
|
CPSO
|
Contractor Program Security Officer
|
CPT
|
Current Procedural Terminology
|
CPTED
|
Crime Prevention Through Environmental Design
|
CPU
|
Central Processing Unit
|
CPWG
|
Crime Prevention Working Group
|
CR
|
Conversion Rate
|
CRAM
|
Challenge Response Authentication Mechanism
|
CRAMM
|
Ccta Risk Analysis & Management Method
|
CRC
|
Cyclic Redundancy Check
|
CRC–32
|
Cyclic Redundancy Check–32
|
CRG
|
Compliance Review Group
|
CRL
|
Certificate Revocation List
|
CRM
|
Customer Relationship Management
|
CRO
|
Chief Risk Officer
|
CRO
|
Conversion Rate Optimization
|
CRT
|
Cathode Ray Tube
|
CRYPTO
|
Cryptography
|
CS
|
Client/Server
|
CS
|
Comment Spamming
|
CSA
|
Child Support Agency
|
CSA
|
Cloud Security Alliance
|
CSA
|
Cloud Services Agreement
|
CSA
|
Cognizant Security Agency
|
CSA
|
Cognizant Security Authority
|
CSA
|
Computer Security Act
|
CSC
|
Card Security Code
|
CSCS
|
Contract Security Classification Specification
|
CSE
|
Center For Security Evaluation
|
CSEA
|
Cyber Security Enhancement Act
|
CSEC
|
Cyber Security Education Consortium
|
CSF
|
Common Security Framework
|
CSIA
|
Cyber Security Industries Alliance
|
CSIL
|
Critical & Sensitive Information List
|
CSIR
|
Computer (& Network) Security Incident Response
|
CSIRC
|
Computer Security Incident Response Capability
|
CSIRT
|
Computer Security Incident Response Team
|
CSISM
|
Communications Security (COMSEC) Supplement To The Industrial Security Manual
|
CSMA / CD
|
Carrier Sense Multiple Access/Collision Detection
|
CSO
|
Chief Security Officer
|
CSO
|
Cognizant Security Office
|
CSO
|
Computer Security Object
|
CSP
|
Cloud Service Provider
|
CSP
|
Content Security Policy
|
CSP
|
Credentials Service Provider
|
CSR
|
Certificate Signing Request
|
CSRC
|
Computer Security Resource Center
|
CSRDA
|
Cyber Security Research & Development Act of 2002
|
CSRF
|
Cross Site Request Forgery
|
CSS
|
Cascading Style Sheet
|
CSS
|
Central Security Service
|
CSS
|
Constant Surveillance Service
|
CSSIA
|
Center For Systems Security & Information Assurance
|
CSSM
|
Communications Computer System Security Manager
|
CSSO
|
Computer Systems Security Officers
|
CST
|
Construction Surveillance Technician
|
CSV
|
Comma Separated Values
|
CT
|
Computed Tomography
|
CT
|
Counter Terrorism
|
CTA
|
Call To Action
|
CTC
|
Connectionist Temporal Classification
|
CTC
|
Counterterrorist Center
|
CTCPEC
|
Canadian Trusted Computer Product Evaluation Criteria
|
CTO
|
Chief Technology Officer
|
CTP
|
Composite Theoretical Performance
|
CTR
|
Click Through Rate
|
CTR
|
Counter Mode Encryption
|
CTS
|
Click Through Rate
|
CTS
|
Computerized Telephone System
|
CTS
|
Cosmic Top Secret
|
CTSA
|
Cosmic Top Secret Atomal
|
CTTA
|
Certified Transient Electromagnetic Pulse Emanation Standard (Tempest) Technical Authority
|
CUDA
|
Compute Unified Device Architecture
|
CUI
|
Controlled Unclassified Information
|
CV
|
Computer Vision
|
C-V2X
|
Cellular Vehicle To Everything
|
CVC
|
Card Validation Code
|
CVD
|
Card Verification Data
|
CVE
|
Common Vulnerabilities & Exposures
|
CVE
|
Elo Verification Code
|
CVM
|
Card Verification Method
|
CVN
|
Card Validation Number
|
CVR
|
Card Verification Result
|
CVSS
|
Common Vulnerability Scoring System
|
CVV
|
Card Verification Value
|
CW
|
Code Word
|
CW
|
Cyber Warfare
|
CWE
|
Common Weakness Enumeration
|
CWSS
|
Common Weakness Scoring System
|
CX
|
Customer Experience
|
CYBEX
|
Cybersecurity Information Exchange
|
CYOD
|
Choose Your Own Device
|
D2D
|
Device To Device
|
DA
|
Destination Address
|
DA
|
Domain Authority
|
DAA
|
Designated Approving Authority
|
DaaS
|
Desktop As A Service
|
DAC
|
Discretionary Access Control
|
DAD
|
Duplicate Address Detection
|
DAM
|
Database Activity Monitoring
|
DAM
|
Digital Asset Management
|
DAML
|
DARPA Agent Markup Language
|
DAMP
|
Database Activity Monitoring & Prevention
|
D-AMPS
|
Digital Advanced Mobile Phone Service
|
DAO
|
Data Access Object
|
DAR
|
Degree Audit Report
|
DARPA
|
Defense Advanced Research Projects Agency
|
DAS
|
Direct Attached Storage
|
DASD
|
Deputy Assistant Secretary of Defense
|
DASD (DT&E)
|
Deputy Assistant Secretary of Defense For Developmental Test & Evaluation
|
DAST
|
Dynamic Application Security Testing
|
DATO
|
Denial of Authorization To Operate
|
DBA
|
Database Administrator
|
DBaaS
|
Database As A Service
|
dBm
|
Decibels Referenced To One Milliwatt
|
DBMS
|
Database Management System
|
DC
|
Data Center
|
DC
|
Domain Controller
|
DC3
|
DOD Cyber Crime Center
|
DCaaS
|
Data Center As A Service
|
DCC
|
Defensive Counter Cyber
|
DCE
|
Distributed Computing Environment
|
DCFL
|
Defense Computer Forensics Lab
|
DCHC
|
Defense Counterintelligence & Human Intelligence Center
|
DCI
|
Director of Central Intelligence
|
DCI SSC
|
Director of Central Intelligence Special Security Center
|
DCID
|
Director of Central Intelligence Directive
|
DCL
|
Declassify
|
DCMA
|
Defense Contract Management Agency
|
DCMO
|
Deputy Chief Management Office
|
DCOM
|
Distributed Component Object Model
|
DCPDS
|
Defense Civilian Personnel Data System
|
DCS
|
Defense Clandestine Service
|
DCS
|
Distributed Control System
|
DCSINT
|
Deputy Chief of Staff For Intelligence Army
|
DD
|
Defense Department
|
DDA
|
Designated Disclosure Authority
|
DDA
|
Standard Dynamic Data Authentication
|
DDAL
|
Delegation of Disclosure Authority Letter
|
DDEP
|
Defense Data Exchange Program
|
DDL
|
Data Definition Language
|
DDMS
|
Department of Defense Metadata Specification
|
DDNS
|
Dynamic Domain Name Services
|
DDOL
|
Dynamic Data Authentication Data
|
DDoS
|
Distributed Denial of Service
|
DDR3
|
Double Data Rate Type 3
|
DEA
|
Data Encryption Algorithm
|
DECL
|
Declassify
|
DEK
|
Data Encryption Key
|
DEP
|
Data Execution Prevention
|
DES
|
Data Encryption Standard
|
DFARS
|
Defense Federal Acquisition Regulation Supplement
|
DFS
|
Distributed File System
|
DFS
|
Dynamic Frequency Selection
|
DH
|
Diffie Hellman
|
DHAAD
|
Dynamic Home Agent Address Discovery
|
DHCP
|
Dynamic Host Configuration Protocol
|
DHCPv6
|
Dynamic Host Configuration Protocol For Internet Protocol V6
|
DHS
|
U.S. Department of Homeland Security
|
DIA
|
Defense Intelligence Agency
|
DIAC
|
Defense Intelligence Analysis Center
|
DIACAP
|
Department of Defense Information Assurance Certification & Accreditation Process
|
DIACCS
|
Defense Ia Command & Control System
|
DIAM
|
Defense Intelligence Agency Manual
|
DIAMOND
|
Defense Intrusion Analysis & Monitoring Desk
|
DIAP
|
Defense Information Assurance Program
|
DIB
|
Defense Industrial Base
|
DIC
|
Defense Intelligence Community
|
DICOB
|
Defense Industrial Security Clearance Oversight Board
|
DICOM
|
Digital Imaging & Communications In Medicine
|
DIDO
|
Designated Intelligence Disclosure official
|
DIDS
|
Distributed Intrusions Detection System
|
DII
|
Defense Information Infrastructure
|
DIMA
|
DOD Portion of The Intelligence Mission Area
|
DIMS
|
Digital Identity Management Service
|
DIN
|
Drug Identification Number
|
DIRNSA
|
Director National Security Agency
|
DIS
|
Defense Investigative Service
|
DISA
|
Defense Information Systems Agency
|
DISA
|
Direct Inward System Access
|
DISA
|
U.S. Defense Information Systems Agency
|
DISN
|
Defense Information Systems Network
|
DISP
|
Department of Defense Industrial Security Program
|
DITPR
|
DOD Information Technology Portfolio Repository
|
DITSCAP
|
Department of Defense Information Technology Security Certification & Accreditation Process
|
DITSWG
|
Defense Information Technology Security Working Group
|
DKIM
|
Domain Keys Identified Mail
|
DLL
|
Dynamic Link Library
|
DLP
|
Data Loss Prevention
|
DLT
|
Distributed Ledger Technology
|
DM
|
Direct Message
|
DMA
|
Direct Memory Access
|
DMARC
|
Domain Based Message Authentication Reporting & Conformance
|
DMC
|
Defense Megacenter
|
DMCA
|
Digital Millennium Copyright Act
|
DMDC
|
Defense Manpower Data Center
|
DMF
|
Data Management Facility
|
DML
|
Data Manipulation Language
|
DMNS
|
Data Management Notification System
|
DMS
|
Data Management System
|
DMS
|
Database Migration Service
|
DMS
|
Defense Message System
|
DMVPN
|
Dynamic Multipoint VPN
|
DMZ
|
Demilitarized Zone
|
DN
|
Distinguished Name
|
DN
|
Domain Name
|
DNA
|
Deoxyribonucleic Acid
|
DNI
|
Director of National Intelligence
|
DNI
|
Director of Naval Intelligence
|
DNP
|
Distributed Network Protocol
|
DNS
|
Domain Name Server
|
DNS
|
Domain Name System
|
DNSBL
|
Domain Name System Blacklist
|
DNSSEC
|
Domain Name System Security Extensions
|
DOC
|
U.S. Department of Commerce
|
DoD
|
U.S. Department of Defense
|
DoD ISRMC
|
DOD Information Security Risk Management Committee
|
DoDAF
|
Department of Defense Architecture Framework
|
DoDD
|
Department of Defense Directive
|
DoDI
|
DOD Instruction
|
DoDIIS
|
Department of Defense Intelligence Information System
|
DODIN
|
Department of Defense Information Networks
|
DoDIS
|
Department of Defense Information System
|
DoDM
|
DOD Manual
|
DOE
|
U.S. Department of Energy
|
DOI
|
Domain of Interpretation
|
DOJ
|
U.S. Department of Justice
|
DOM
|
Document Object Model
|
DoN
|
Department of The Navy
|
DoS
|
Denial of Service
|
DOS
|
Disk Operating System
|
DOT&E
|
Director Operational Test & Evaluation
|
DPA
|
Data Protection Act
|
DPA
|
Differential Power Analysis
|
DPH
|
Department of Public Health
|
DPIA
|
Data Protection Impact Assessment
|
DPO
|
Data Protection Officer
|
DQL
|
Data Query Language
|
DR
|
Disaster Recovery
|
DRA
|
Data Recovery Agent
|
DRAM
|
Dynamic Random Access Memory
|
DRB
|
Defense Resources Board
|
DRDA
|
Distributed Relational Database Architecture
|
DREAD
|
Disaster Reproducibility Exploitability Affected Users & Discoverability
|
DREN
|
Defense Research & Engineering Network
|
DRM
|
Digital Rights Management
|
DRMO
|
Defense Reutilization Management Office
|
DRP
|
Disaster Recovery Plan
|
DRS
|
Distributed Resource Scheduler
|
DS
|
Delegation Signer
|
DS
|
Direct Support
|
DS
|
Distribution System
|
DS
|
Field Differentiated Services Field
|
DSA
|
Data Sharing Agreement
|
DSA
|
Designated Security Authority
|
DSA
|
Digital Signature Algorithm
|
DSAWG
|
Defense Ia Security Accreditation Working Group
|
DSB
|
Defensive Security Brief
|
DSBS
|
Dual Sensor Brake Support
|
DSCA
|
Defense Security Cooperation Agency
|
DSEC
|
Director of Security
|
DSL
|
Digital Subscriber Line
|
DSLAM
|
Digital Subscriber Line Access Multiplexer
|
DSMC
|
Defense Systems Management College
|
DSML
|
Directory Services Markup Language
|
DSN
|
Defense Switched Network
|
DSN
|
Delivery Status Notification
|
DSOD
|
Dynamic Separation of Duty
|
DSS
|
Defense Security Service
|
DSS
|
Digital Signature Standard
|
DSSCS
|
Defense Special Security Communication System
|
DSS-PIC
|
DSS Personnel Investigations Center
|
DSSS
|
Defense Special Security System
|
DSTM
|
Dual Stack Transition Mechanism
|
DT
|
Directory Traversal
|
DT/PT
|
Directory / Path Traversal
|
DT&E
|
Developmental Test & Evaluation
|
DTC
|
Distributed Transaction Coordinator
|
DTD
|
Document Type Definition
|
DTIC
|
Defense Technical Information Center
|
DTLS
|
Datagram Transport Layer Security
|
DTM
|
Data Transmission Media
|
DTM
|
Directive Type Memorandum
|
DTP
|
Dynamic Trunking Protocol
|
DTR
|
Derived Test Requirement
|
DTSA
|
Defense Technology Security Administration
|
DUA
|
Data Use Agreement
|
DUID
|
DHCP Unique Identifier
|
DVD
|
Digital Versatile Disc
|
DVD
|
Digital Video Disk
|
DVD-R
|
Digital Video Disc Recordable
|
DVD-RAM
|
Digital Versatile Disc Random Access Memory
|
DVD-ROM
|
Digital Video Disc Read Only Memory
|
DVD-RW
|
Digital Video Disc Rewritable
|
DVMRP
|
Distant Vector Multicast Routing Protocol
|
DVR
|
Digital Video Recorder
|
DVR
|
Digital Voice Recorder
|
DW
|
Data Warehouse
|
E/APL
|
Evaluated Approved Product
|
EA
|
Electronic Attack
|
EA
|
Enterprise Architecture
|
EA
|
Evolutionary Acquisition
|
EAC
|
Electronic Access Control
|
EAC
|
Estimate At Completion
|
EAI
|
Enterprise Application Integration
|
EAL
|
Evaluation Assurance Level
|
EAP
|
Extensible Authentication Protocol
|
EAP-FAST
|
Extensible Authentication Protocol Flexible Authentication Via Secure Tunneling
|
EAPOL
|
Extensible Authentication Protocol Over LAN
|
EAPOL-KCK
|
Extensible Authentication Protocol Over LAN Key Confirmation Key
|
EAPOL-KEK
|
Extensible Authentication Protocol Over LAN Key Encryption Key
|
EAP-TLS
|
Extensible Authentication Protocol Transport Layer Security
|
EAP-TTLS
|
Extensible Authentication Protocol Tunneled Transport Layer Security
|
EBGP
|
Exterior Border Gateway Protocol
|
EBS
|
Amazon Elastic Block Store
|
ebXML
|
Electronic Business Extensible Markup Language
|
ebXML
|
Electronic Business Using Extensible Markup Language
|
EC2
|
Elastic Compute Cloud
|
EC2N
|
Elliptic Curve Over G[2N]
|
ECB
|
Electronic Code Book
|
ECC
|
Elliptic Curve Cryptography
|
ECC
|
Error Correction Code
|
ECDH
|
Elliptic Curve Diffie Hellman
|
ECDSA
|
Elliptic Curve Digital Signature Algorithm
|
ECM
|
Enterprise Configuration Manager
|
ECM
|
Enterprise Content Management
|
ECP
|
Encryption Control Protocol
|
ECP
|
Engineering Change Proposal
|
ECPA
|
Electronic Communications Privacy Act
|
ECS
|
Ec2 Container Service
|
EDGE
|
Enhanced Data For Global Evolution
|
EDI
|
Electronic Data Interchange
|
EDR
|
Endpoint Detection & Response
|
EDR
|
Enhanced Data Rate
|
EEPROM
|
Electrically Erasable Programmable Read Only Memory
|
EF
|
Exposure Factor
|
EFI
|
Extensible Firmware Interface
|
EFOIA
|
Electronic Freedom of Information Act
|
EFS
|
Elastic File System
|
EFS
|
Encrypting File System
|
EGP
|
Exterior Gateway Protocol
|
EH
|
Extension Header
|
EHR
|
Electronic Health Record
|
EI
|
Email Injection
|
EICAR
|
European Institute For Computer Antivirus Research
|
EIEMA
|
Enterprise Information Environment Mission Area
|
EIGRP
|
Enhanced Interior Gateway Routing Protocol
|
EIK
|
EAP Integrity Key
|
EIP
|
Elastic IP
|
EITDR
|
Enterprise Information Technology Database Repository
|
EK
|
Endorsement Key
|
ELB
|
Elastic Load Balancer
|
email
|
Electronic Mail
|
eMASS
|
Enterprise Mission Assurance Support Service
|
eMBB
|
Enhanced Mobile Broadband
|
EMM
|
Enterprise Mobility Management
|
EMP
|
Electromagnetic Pulse
|
EMR
|
Elastic Map Reduce
|
EMR
|
Electronic Medical Record
|
EMS
|
Energy Management System
|
EMS
|
Enhanced Messaging Service
|
EMS
|
Enterprise Messaging System
|
EMSK
|
Extended Master Session Key
|
EMTALA
|
Emergency Medical Treatment & Labor Act
|
EMV
|
Europay Mastercard Visa Specification
|
EMVCo
|
EMV Specifications Company
|
EnCE
|
Encase Certified Examiner
|
EnCEP
|
Encase Certified Ediscovery Practitioner
|
ENI
|
Elastic Network Interface
|
ENISA
|
European Network & Information Security Agency
|
ENRP
|
Endpoint Handlespace Redundancy Protocol
|
EOF
|
End of File
|
EOL
|
End of Life
|
EOP
|
Executive Office of The President
|
EP
|
Eligible Provider
|
EPA
|
Environmental Protection Agency
|
EPAL
|
Enterprise Privacy Authorization Language
|
EPC
|
Electronic Product Code
|
EPCIS
|
Electronic Product Code Information Services
|
EPHI
|
Electronic Protected Health Information
|
EPITS
|
Essential Program Information Technologies & Systems
|
EPROM
|
Erasable Programmable Read Only Memory
|
EPS
|
Events Per Second
|
EPSQ
|
Electronic Personnel Security Questionnaire
|
ERM
|
Enterprise Risk Management
|
ERP
|
Enterprise Resource Planning
|
ES
|
Amazon Elasticsearch Service
|
ES
|
Electronic Surveillance
|
ESAPI
|
Enterprise Security Application Programming Interface
|
ESB
|
Enterprise Service Bus
|
ESMS
|
Enterprise Security Management System
|
ESMTP
|
Extended Simple Mail Transfer Protocol
|
ESN
|
Electronic Serial Number
|
ESP
|
Encapsulating Security Payload
|
ESS
|
Electronic Security System
|
ESS
|
Extended Service Set
|
ESX
|
Elastic Sky X
|
ET
|
Electronic Transmission
|
ETA
|
Education Training & Awareness
|
ETAPWG
|
Education Training Awareness & Professionalization Working Group
|
ETC
|
Estimate To Complete
|
ETSI
|
European Telecommunications Standards Institute
|
ETZ
|
Equipment Transient Electromagnetic Pulse Emanation Standard (Tempest) Zone
|
EU
|
European Union
|
EU DP
|
European Union Data Protection
|
EUI-64
|
Extended Unique Identifier 64 Bit
|
EULA
|
End User License Agreement
|
EUP
|
Enterprise Unified Process
|
EV
|
Extended Validation
|
EV-DO
|
Evolution Data Optimized
|
EVM
|
Earned Value Management
|
EW
|
Electronic Warfare
|
EWS
|
Electronic Warfare Support
|
EXIF
|
Exchangeable Image File Format
|
EXT
|
Extended File System
|
EXT2
|
Second Extended File System
|
ext2fs
|
Second Extended Filesystem
|
EXT3
|
Third Extended File System
|
ext3fs
|
Third Extended Filesystem
|
EXT4
|
Fourth Extended File System
|
FaaS
|
Function As A Service
|
FAFSA
|
Free Application For Federal Student Aid
|
FAIR
|
Factor Analysis of Information Risk
|
FAQ
|
Frequently Asked Questions
|
FAR
|
False Acceptance Rate
|
FAR
|
Federal Acquisition Regulation
|
FASC-N
|
Federal Agency Smart Credential Number
|
FASP
|
Federal Agency Security Practices
|
FAT
|
Factory Acceptance Testing
|
FAT
|
File Allocation Table
|
FAT16
|
File Allocation Table (16 Bit) File System
|
FB
|
Facebook
|
FBCA
|
Federal Bridge Certification Authority
|
FBI
|
Federal Bureau of Investigation
|
FBIS
|
Foreign Broadcast Information Service
|
FCC
|
Federal Communications Commission
|
FCIP
|
Foreign Counterintelligence Program
|
FCL
|
Facility Security Clearance
|
FCL
|
Final Checklist List
|
FCPF
|
Federal PKI Common Policy Framework
|
FCRA
|
Fair Credit Reporting Act
|
FCS
|
Frame Check Sequence
|
FDA
|
Food & Drug Administration
|
FDCC
|
Federal Desktop Core Configuration
|
FDCE
|
Federated Development & Certification Environment
|
FDDI
|
Fiber Distributed Data Interface
|
FDE
|
Full Disk Encryption
|
FDIC
|
Federal Deposit Insurance Corporation
|
FDMA
|
Frequency Division Multiple Access
|
FEA
|
Federal Enterprise Architecture
|
FEAF
|
Federal Enterprise Architecture Framework
|
FEK
|
File Encryption Key
|
FEMA
|
Federal Emergency Management Agency Only Memory
|
FER
|
Failure To Enroll Rate
|
FFIEC
|
Federal Financial Institutions Examination Council
|
FFMIA
|
Federal Financial Management Improvement Act
|
FHIR
|
Fast Healthcare Interoperability Resources
|
FHSS
|
Frequency Hopping Spread Spectrum
|
FI
|
Foreign Intelligence
|
FIAM
|
Federated Identity & Access Management
|
FIB
|
Forwarding Information Base
|
FICC
|
Federal Identity Credentialing Committee
|
FIDS
|
Facility Intrusion Detection System
|
FIE
|
Foreign Intelligence Entity
|
FIFO
|
First In First Out
|
FILO
|
First In Last Out
|
FIM
|
Federated Identity Management
|
FIM
|
File Integrity Monitoring
|
Fios
|
Fiber Optic Service
|
FIPS
|
Federal Information Processing Standard
|
FIPSPUB
|
Federal Information Processing Standard Publication
|
FIRST
|
Forum of Incident Response & Security Teams
|
FIS
|
Foreign Intelligence Services
|
FISA
|
Foreign Intelligence Surveillance Act
|
FISCAM
|
Federal Information System Controls Audit Manual
|
FISD
|
Federal Investigative Services Division
|
FISINT
|
Foreign Instrumentation Signals Intelligence
|
FISMA
|
Federal Information Security Management Act
|
FISSEA
|
Federal Information Systems Security Educators’ Association
|
FIT
|
Foreign Inspection Team
|
FIU
|
Field Investigative Unit
|
FIWC
|
Fleet Information Warfare Center
|
FLETC
|
Federal Law Enforcement Training Center
|
FLOPS
|
Floating Point Operations Per Second
|
FM
|
Frequency Modulated
|
FMR
|
False Match Rate
|
FMS
|
Fluhrer Mantin Shamir
|
FN
|
Foreign National
|
FNMR
|
False Non Match Rate
|
FOIA
|
Freedom of Information Act
|
FOIA/PA
|
Freedom of Information Act/Privacy Act
|
FOMO
|
Fear of Missing Out
|
FOSS
|
Free & Open Source Software
|
FOV
|
Field of View
|
FPC
|
Federal Preparedness Circular
|
FPE
|
Format Preserving Encryption
|
FPGA
|
Field Programmable Gate Array
|
FPKI
|
Federal Public Key Infrastructure
|
FPKIA
|
Federal Public Key Infrastructure Architecture
|
FPKIPA
|
Federal Public Key Infrastructure Policy Authority
|
FPN
|
Fixed Pattern Noise
|
FPU
|
Floating Point Unit
|
FQDN
|
Fully Qualified Domain Name
|
FRAM
|
Ferroelectric Random Access Memory
|
FRAP
|
Facilitated Risk Analysis Process
|
FRCP
|
Federal Rules of Civil Procedure
|
FRD
|
Formerly Restricted Data
|
FRD
|
Functional Requirements Document
|
FRR
|
False Rejection Rate
|
FSB
|
Frontside Bus
|
FSO
|
Facility Security Officer
|
FSO
|
Field Security Office
|
FTC
|
Federal Trade Commission
|
FTCA
|
Federal Trade Commission Act
|
FTP
|
File Transfer Protocol
|
FTPS
|
File Transfer Protocol Secure
|
FTS
|
Federal Telecommunications Service
|
FTZ
|
Facilities Transient Electromagnetic Pulse Emanation Standard (Tempest) Zone
|
FUD
|
Fully Undetectable
|
FUS
|
Fast User Switching
|
FY
|
Fiscal Year
|
G2
|
Assistant Chief of Staff G2 Intelligence
|
G-2
|
Staff Intelligence Officer
|
GA
|
Google Analytics
|
GAAP
|
Generally Accepted Accounting Principles
|
GAO
|
U.S. Government Accountability Office
|
GAPP
|
Generally Accepted Privacy Principles
|
GB
|
Gigabyte
|
GCCS
|
Global Command & Control System
|
GCLB
|
Google Cloud Load Balancer
|
GCM
|
Galois / Counter Mode
|
GCP
|
Google Cloud Platform
|
GCS
|
Google Cloud Storage
|
GCSS
|
Global Combat Support System
|
GDIP
|
General Defense Intelligence Programs
|
GDPR
|
General Data Protection Regulation
|
GEOINT
|
Geospatial Intelligence
|
GFAC
|
Generalized Framework For Access Control
|
GFE
|
Government Furnished Equipment
|
GFIRST
|
Government Forum of Incident Response & Security Teams
|
GHz
|
Gigahertz
|
GIF
|
Graphics Interchange Format
|
GIG
|
Global Information Grid
|
GII
|
Global Information Infrastructure
|
GINA
|
Graphical Identification & Authentication
|
GIS
|
Geographic Information Systems
|
GISRA
|
Government Information Security Reform Act
|
GKEK
|
Group Key Encryption Key
|
GLB
|
Gramm Leach Bliley Act
|
GLBA
|
Gramm Leach Bliley Act
|
GMITS
|
Guidelines For The Management of It Security
|
GMK
|
Group Master Key
|
GNU
|
Gnu'S Not Unix!
|
GnuPG
|
Gnu Privacy Guard
|
GOSC
|
Global Operations & Security Center
|
GOTS
|
Government off The Shelf
|
GPGPU
|
General Purpose Computation On Graphics Processing Units
|
GPIO
|
General Purpose Input/Output
|
GPL
|
General Public License
|
GPMC
|
Group Policy Management Console
|
GPO
|
Group Policy Object
|
GPRS
|
General Packet Radio Service
|
GPS
|
Global Positioning System
|
GR
|
Graceful Restart
|
GRC
|
Governance Risk Management & Compliance
|
GRE
|
Generic Routing Encapsulation
|
GRS
|
General Records Schedule
|
GS1
|
Global Standards One
|
GSA
|
U.S. General Services Administration
|
GSC
|
Government Security Committee
|
GSII
|
Government Services Information Infrastructure
|
GSM
|
Global System For Mobile Communications
|
GSOIA
|
General Security of Information Agreement
|
GSOMIA
|
General Security of Military Information Agreement
|
GSSAPI
|
Generic Security Services Application Program Interface
|
GTC
|
Generic Token Card
|
GTEK
|
Group Traffic Encryption Key
|
GTK
|
Group Temporal Key
|
gTLD
|
Generic Top Level Domain
|
GTSM
|
Generalized Ttl Security Mechanism
|
GUI
|
Graphical User Interface
|
GUID
|
Globally Unique Identifier
|
HA
|
High Availability
|
HA
|
Home Agent
|
HAC
|
High Availability Clusters
|
HAG
|
High Assurance Guard
|
HAL
|
Hardware Abstraction Layer
|
HAR
|
Http Archive
|
HBSS
|
Host Based Security System
|
HCERA
|
Health Care & Education Reconciliation Act
|
HCI
|
Host Controller Interface
|
HCISPP
|
Healthcare Information Security & Privacy Practitioner
|
HDD
|
Hard Disk Drive
|
HDFS
|
Hadoop Distributed File System
|
HDMI
|
High Definition Multimedia Interface
|
HERF
|
Hazards of Electromagnetic Radiation To Fuel
|
HERO
|
Hazards of Electromagnetic Radiation To Ordnance
|
HERP
|
Hazards of Electromagnetic Radiation To Personnel
|
HF
|
High Frequency
|
HFS
|
Hierarchical File System
|
HFS+
|
Hierarchical File System Plus
|
HHS
|
U.S. Department of Health & Human Services
|
HI
|
Header Injection / HTTP response splitting
|
HICS
|
Hospital Incident Command System
|
HIDS
|
Host Based Intrusion Detection System
|
HIE
|
Health Information Exchange
|
HINFO
|
Host Information
|
HIP
|
Host Identity Protocol
|
HIPAA
|
Health Insurance Portability & Accountability Act
|
HIPERLAN
|
High Performance Radio Local Area Network
|
HIPS
|
Host Based Intrusion Prevention System
|
HIT
|
Healthcare Information Technology
|
HITECH
|
Health Information Technology For Economic & Clinical Health
|
HITRUST
|
Health Information Trust Alliance
|
HITS
|
Hyperlink Induced Topic Search
|
HIV
|
Human Immunodeficiency Virus
|
HKLM
|
HKEY Local_Machine
|
HL7
|
Health Level 7
|
HMAC
|
Hash Message Authentication Code
|
HMD
|
Head Mounted Displays
|
HMI
|
Human Machine Interface
|
HMO
|
Health Maintenance Organization
|
HOIS
|
Hostile Intelligence Services
|
HP CSA
|
Hp Cloud Service Automation
|
HPA
|
Host Protected Area
|
HPC
|
High Performance Compute
|
HPFS
|
High Performance File System
|
HPSCI
|
House Permanent Select Committee On Intelligence
|
HR
|
Human Resources
|
HRM
|
Human Resource Management
|
HSA
|
Homeland Security Act
|
HSARPA
|
Homeland Security Advanced Research Projects Agency
|
HSDPA
|
High Speed Downlink Packet Access
|
HSF
|
Heat Sink & Fan
|
HSM
|
Hardware Security Module
|
HSPA
|
High Speed Packet Access
|
HSPA+
|
Evolved High Speed Packet Access Or High Speed Packet Access
|
HSPD
|
Homeland Security Presidential Directive
|
HTCIA
|
High Technology Crime Investigation Association
|
HTCP
|
Hyper Text Caching Protocol
|
HTML
|
Hypertext Markup Language
|
HTTP
|
Hypertext Transfer Protocol
|
HTTPS
|
Hypertext Transfer Protocol Secure
|
HUMINT
|
Human Intelligence
|
HVA
|
Hazard Vulnerability Analysis
|
HVAC
|
Heating Ventilation & Air Conditioning
|
HVM
|
Hardware Virtual Machine
|
Hz
|
Hertz
|
I&A
|
Identification & Authentication
|
I&W
|
Indications & Warning
|
I/O
|
Input/Output
|
I3A
|
International Imaging Industry Association
|
I3P
|
Institute For Information Infrastructure Protection
|
IA
|
Information Assurance
|
IA
|
Institutional Analytics
|
IA
|
Intelligence Activity
|
IAA
|
Interim Access Authorization
|
IaaS
|
Infrastructure As A Service
|
IAB
|
Internet Architecture Board
|
IaC
|
Infrastructure As Code
|
IAC
|
Internal Audit & Compliance
|
IAC
|
Issuer Action Codes
|
IACIS
|
International Association of Computer Investigative Specialists
|
IACSE
|
Interagency Advisory Committee On Security Equipment
|
IAD
|
Information Assurance Document
|
IAG
|
Information Assurance Group
|
IAIP
|
Information Analysis & Infrastructure Protection
|
IAM
|
Identity & Access Management
|
IAM
|
Information Assurance Manager
|
IANA
|
Internet Assigned Numbers Authority
|
IAO
|
Information Assurance Officer
|
IAPM
|
Information Assurance Program Manager
|
IAPWG
|
Information Assurance Policy Working Group
|
IASE
|
Information Assurance Support Environment
|
IASL
|
Information Assurance Senior Leadership
|
IAST
|
Interactive Application Security Test
|
IATAC
|
Information Assurance Technology Analysis Center
|
IATC
|
Interim Authority To Connect
|
IATF
|
Information Assurance Technical Framework
|
IATO
|
Interim Authority To Operate
|
IATT
|
Interim Authorization To Test
|
IAVA
|
Information Assurance Vulnerability Alert
|
IAX 2
|
Inter Asterisk Exchange
|
IBC
|
Iterated Block Cipher
|
IBE
|
Identity Based Encryption
|
iBGP
|
Internal Border Gateway Protocol
|
IBIS
|
Issue Based Information System
|
IBMJSSE
|
IBM Java Secure Socket Extension
|
IBN
|
Intent Based Networking
|
IBR
|
Integrated Baseline Review
|
IBSS
|
Independent Basic Service Set
|
IC
|
Integrated Circuit
|
IC
|
Intelligence Community
|
IC3
|
Internet Crime Complaint Center
|
ICAC
|
Internet Crimes Against Children
|
ICAMP
|
Incident Cost Analysis & Modeling Project
|
ICANN
|
Internet Corporation For Assigned Names & Numbers
|
ICC
|
Integrated Circuit Card
|
ICCID
|
Integrated Circuit Card Identifier
|
ICCP
|
Inter Control Center Communications Protocol
|
ICD
|
Intelligence Community Directive
|
ICD
|
Interface Control Document
|
ICD
|
International Classification of Diseases
|
ICD-10
|
International Classification of Diseases Version 10
|
ICF
|
Internet Connection Firewall
|
ICFR
|
Internal Control Over Financial Reporting
|
ICM
|
Integer Counter Mode
|
ICMP
|
Internet Control Message Protocol
|
ICO
|
Information Commisioner's Office
|
ICP
|
Initial Control Point
|
ICP
|
Internet Cache Protocol
|
ICS
|
Industrial Control System
|
ICS
|
Internet Connection Sharing
|
ICSA
|
International Computer Security Association
|
ICT
|
Information & Communication Technology
|
ICV
|
Integrity Check Value
|
ICV
|
Intelligent Connected Vehicles
|
ID
|
Identification
|
IDaaS
|
Identity As A Service
|
IDART
|
Information Design Assurance Red Team
|
IDC
|
International Data Center
|
IDE
|
Integrated Development Environment
|
IDE
|
Integrated Device Electronics
|
IDE
|
Integrated Drive Electronics
|
IDE
|
Intrusion Detection Equipment
|
IdEA
|
Identity Entitlement & Access Management
|
IDEA
|
International Data Encryption Algorithm
|
iDEN
|
Integrated Digital Enhanced Network
|
ID-FF
|
Identity Federation Framework
|
IDL
|
Interface Definition Language
|
IdM
|
Identity Management
|
IDMEF
|
Intrusion Detection Message Exchange Format
|
IDMS
|
Identity Management System
|
IdP
|
Identity Provider
|
IDPS
|
Intrusion Detection & Prevention System
|
IDS
|
Intrusion Detection System
|
IDS/IDP
|
Intrusion Detection/Intrusion Detection & Prevention
|
ID-SIS
|
Identity Service Interface Specifications
|
ID-WSF
|
Identity Web Services Framework
|
IE
|
Internet Explorer
|
IEC
|
International Electrotechnical Commission
|
IED
|
Intelligent Electronic Device
|
IEEE
|
Institute of Electrical & Electronics Engineers
|
IEEE-SA
|
IEEE Standards Association
|
IEID
|
International Exchange of Infrasound Data
|
IERD
|
International Exchange of Radionuclide Data
|
IESD
|
International Exchange of Seismological Data
|
IESG
|
Internet Security Steering Group
|
IETF
|
Internet Engineering Task Force
|
IFTTT
|
If This Then That
|
IG
|
Internet Gateway
|
IGMP
|
Internet Group Management Protocol
|
IGP
|
Interior Gateway Protocol
|
IGRP
|
Interior Gateway Routing Protocol
|
IID
|
Interface Identifier
|
IIF
|
Information In Identifiable Form
|
IIHI
|
Individually Identifiable Health Information
|
IIOC
|
Independent International Organization For Certification
|
IIOP
|
Internet Inter Orb Protocol
|
IIS
|
Internet Information Services
|
IKE
|
Internet Key Exchange
|
ILM
|
Information Lifecycle Management
|
IM
|
Instant Messaging
|
IMAP
|
Internet Message Access Protocol
|
IMEI
|
International Mobile Equipment Identity
|
IMM
|
Information Management Model
|
IMS
|
Intelligent Maintenance Systems
|
IMSI
|
International Mobile Subscriber Identity
|
IMT-2000
|
International Mobile Telecommunications 2000
|
INCITS
|
International Committee For Information Technology Standards
|
INCOSE
|
International Council of Systems Engineering
|
INFOCONs
|
Information Operations Conditions
|
INFOSEC
|
Information Systems Security
|
INFOSYS
|
Information Systems
|
INTERPOL
|
International Police Organization
|
IO
|
Information Operations
|
IO
|
Information Owner
|
IO
|
Insertion Order
|
IOC
|
Indicators of Compromise
|
IOPS
|
Input/Output Operations Per Second
|
IOSS
|
Interagency Operations Security (OPSEC) Support Staff
|
IoT
|
Internet of Things
|
IP
|
Intellectual Property
|
IP
|
Internet Protocol
|
IPA
|
Initial Privacy Assessment
|
|