Digital transformation through effective cybersecurity
  • Digital Transformation
  • Corporate Cybersecurity
  • Security / IT Primer
  • Advisory Services
  • Contact

Glossary of Acronyms

 

There are 10 kinds of people in the world -

Those who understand binary, and those who don't.


Glossary Search

Type an acronym/word/phrase above and press Enter to search the page. Press Enter again to jump to next search result.

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Acronym Term
(ISC)² International Information Systems Security Certification Consortium
1xRTT One Times Radio Transmission Technology
2FA/TFA Two Factor Authentication
3DES Triple Data Encryption Algorithm
3DES Triple Data Encryption Standard
3FA Three Factor Authentication
3G 3rd Generation
3GPP 3rd Generation Partnership Project
3GPP2 3rd Generation Partnership Project 2
3PAO Third Party Assessor Organization
4D QL 4D Query Language
4FA, Four Factor Authentication
A Address Resource Record Type
A&A Assessment & Authorization
AA Abac Attribute Authority
AAA Access Approval Authority
AAA Army Audit Agency
AAA Authentication Authorization Accounting
AAAK Authentication
AAC Application Authentication Cryptogram
AAD Additional Authenticated Data
AAL Authentication Assurance Level
AAR After Action Report
AAS Adaptive Antenna System
ABAC Attribute Based Access Control
ABB Architecture Building Blocks
ABCS Army Battle Command System
AC Application Cryptogram
ACA Access Control Authority
ACA Affordable Care Act
ACCM Asset Configuration Compliance Module
ACE Access Control Entry
ACES Automated Continuing Evaluation System
ACID Atomicity Consistency Isolation Durability
ACK Acknowledgement
ACL Access Control List
ACM Association For Computing Machinery
ACO Accountable Care Organizations
ACO Authenticated Cipher offset
ACSI Assistant Chief of Staff For Intelligence (Army)
AD Active Directory
AD Authenticated Data
ADB Android Debug Bridge
ADC Analog To Digital Converter
ADF Automatic Document Feeder
ADFS Active Directory Federation Services
ADH Anonymous Diffie Hellman
ADOT Academic Directors of Technology
ADP Automated Data Processing
ADPSO Automated Data Processing Security Officer
ADPSSO Automated Data Processing System Security Officer
ADR Adjudicative Desk Reference
ADS Alternate Data Stream
ADS Automated Data System
ADT Android Development Tools
ADT Admissions Discharge & Transfer
AES Advanced Encryption Standard
AES-256 Advanced Encryption Standard 256
AES-512 Advanced Encryption Standard 512
AES-CBC Advanced Encryption Standard Cipher Block Chaining
AES-CTR Advanced Encryption Standard Counter Mode
AF Air Force
AFAIK As Far As I Know
AFB Air Force Base
AFC4A Air Force C4 Agency
AFCAF Air Force Central Adjudication Facility
AFH Adaptive Frequency Hopping
AFI Air Force Instruction
AFIWC Air Force Information Warfare Center
AFMAN Air Force Manual
AFOSF Air Force Office of Security Forces
AFOSI Air Force Office of Special Investigation
AFOSP Air Force Office of Security Police
AFP Apple Filing Protocol
AFPC Air Force Personnel Center
AFPD Air Force Policy Directive
AFR Air Force Regulation
AFSCO Air Force Security Clearance Office
AG Attorney General
AG/SCM Advisory Group/Security Countermeasures
A-GPS Assisted Global Positioning System
AGS Architectural Graphic Standards
AH Authentication Header
AI Artificial Intelligence
AIA Air Intelligence Agency
AIA Army Intelligence Agency
AICPA American Institute of Certified Public Accountants
AID Application Identifier
AIDC Automatic Identification & Data Capture
AIM Association For Automatic Identification & Mobility
AIMS Automated Infrastructure Management System
AIP Application Interchange Profile
AIS Artificial Intelligence System
AIS Automated Information Systems
AISS Automated Information Systems Security
AISSP Automated Information Systems Security Plan
AIT Automatic Identification Technology
AIX Advanced Interactive Executive
AJAX Asynchronous JavaScript & XML
AK Authorization Key
AKID Authorization Key Identifier
AKM Authentication & Key Management
ALE Annualized Loss Expectancy
ALG Application Layer Gateway
ALU Arithmetic Logic Unit
AMA Ask Me Anything
AMI Amazon Machine Image
AMIDS Audit Monitoring & Intrusion Detection System
AMPS Advanced Mobile Phone System
ANACI Access National Agency Check With Written Inquiries
ANF Application Normative Framework
ANN Artificial Neural Network
ANSI American National Standards Institute
AO Area of Operations
AO Authorizing official
AOA Analysis of Alternatives
AOA Area of Application
AODR Authorizing official Designated Representative
AP Access Point
APC Ambulatory Payment Classification
APEC Asia Pacific Economic Cooperation
API Application Programming Interface
APK Android Package Kit
APM Actions Per Minute
APN Access Point Names
APT Advanced Persistent Threat
APU Accelerated Processing Unit
APWG Anti Phishing Working Group
AQ-SAP Acquisition Special Access Program
ARC Authorization Response Code
ARIN American Registry For Internet Numbers
ARN Amazon Resource Name
ARO Annualized Rate of Occurrence
ARP Address Resolution Protocol
ARPA Advanced Research Projects Agency
ARPC Authorization Response Cryptogram
ARQC Authorization Request Cryptogram
ARRA American Recovery & Reinvestment Act
AS Authentication Server
AS Autonomous System
ASAP As Soon As Possible
ASC Anti Spyware Coalition
ASC X9 Accredited Standards Committee X9
ASCII American Standard Code For Information Interchange
ASCLD-LAB The American Society of Crime Laboratory Directors Laboratory Accreditation Board
ASD (C31) Assistant Secretary of Defense For Command Control Communication & Intelligence
ASDR Application Security Desk Reference
ASG Abstract Semantic Graph
ASG Auto Scaling Group
ASIMS Automated Security Incident Measuring System
ASLR Address Space Layout Randomization
ASN Autonomous System Number
ASN.1 Abstract Syntax Notation 1
ASP Active Server Pages
ASP Application Service Provider
ASSIST Automated System Security Incident Support Team
AST Abstract Syntax Tree
ASV Approved Scanning Vendor
ASVS Application Security Verification Standards
ATA Advanced Technology Attachment
ATC Anatomical Therapeutic Chemical Classification System
ATC Application Transaction Counter
ATC Authorization To Connect
ATD Authorization Termination Date
ATIM Announcement Traffic Indication Message
ATM Asynchronous Transfer Mode
ATM Automatic Teller Machine
ATO Authorization To Operate
ATX Advanced Technology Extended
AU Activation Unit
AUP Acceptable Use Policy
AUP Agreed Upon Procedures
AV Antivirus
AVIEN Anti Virus Information Exchange Network
AVP Attribute Value Pair
AVX Advanced Vector Extensions
AWS Amazon Web Services
AZ Availability Zone
b Bit
B Byte
B2B Business To Business
B2C Business To Consumer
BA Business Associate
BAA Business Associate Agreement
BAPI Biometric Application Programming Interface
BASE Basically Available Soft State Eventually Consistent
Bash Bourne Again Shell
BBS Bulletin Board System
BC Business Continuity
BCM Business Continuity Management
BCP Best Current Practice
BCP Business Continuity Plan
BCWP Budgeted Cost of Work Performed
BCWS Budgeted Cost of Work Scheduled
BDM Banner Document Management
BGAN Broadband Global Area Network
BGP Border Gateway Protocol
BGP-4 Border Gateway Protocol 4
BI Business Intelligence
BIA Bump In The Api
BIA Business Impact Analysis
BINAS Biosafety Information Network Advisory System
BioAPI Biometric Application Programming Interface
BIOS Basic Input Output System
BIPN Background Investigation Plus Current National Agency Check
BIS Bureau of Industry & Security
BISS Base & Installation Security System
BITS Background Intelligent Transfer Service
BITS Bump In The Stack
Blob Binary Large Object
BMA Business Mission Area
BMS Balanced Magnetic Switch
BPEL Business Process Execution Language
BPML Business Process Modeling Language
BPO Business Process Outsourcing
BPSS Business Process Specification Schema
BREW Binary Runtime Environment For Wireless
BRM Business Reference Model
BRP Business Recovery (Resumption) Plan
BS Base Station
BS British Standard
BSC Base Station Controller
BSC Binary Synchronous Communications
BSI British Standards Institution
BSIA British Security Industry Association
BSIMM Building Security In Maturity Model
BSoD Blue Screen of Death
BSP Best Security Practice
BSS Basic Service Set
BSSID Basic Service Set Identifier
BT Bluetooth
BTL Block Transformation Layer
BTNS Better Than Nothing Security
BTS Base Transceiver Station
BU Binding Update
BUA Binding Update Acknowledgement
BYOA Bring Your Own Apps
BYOC Bring Your Own Cloud
BYOD Bring Your Own Device
BYOE Bring Your Own Encryption
BYOI Bring Your Own Identity
BYON Bring Your Own Network
C&A Certification & Accreditation
C&A WG Certification & Accreditation Working Group
C2 Command & Control
C2W Command & Control Warfare
C4 Command Control Communications & Computers
C4ISR Command Control Communications Computer Intelligence Surveillance & Reconnaissance
CA Certificate Authority
CA Certification Agent
CAAP Critical Asset Assurance Program
CaaS Compliance As A Service
CaaS Content As A Service
CAB Change Advisory Board
CAC Common Access Card
CADE Corporate Average Data Center Efficiency
CAIDA Cooperative Association For Internet Data Analysis
CAK Card Authentication Key
CAL Category Assurance List
CAM Card Authentication Method
CAN Computer Network Attack
CAN-SPAM Controlling The Assault of Non Solicited Pornography & Marketing Act
CAO Contract Administration Office
CAP Connection Approval Program
CAP Controlled Access Program
CAP Corrective Action Plan
CAPCO Controlled Access Program Coordination Office
CAPEC Common Attack Pattern Enumeration & Classification
CAPEX Capital Expenditure
CAPK Certificate Authority Public Key
CAPTCHA Completely Automated Public Turing Test To Tell Computers & Humans Apart
CARO Computer Antivirus Research Organization
CARVER Criticality Accessibility Recuperability Vulnerability Effect & Recognizability
CAS Casualty Actuarial Society
CAS Central Authentication System
CASB Cloud Access Security Broker
CAV Card Authentication Value
CAVP Cryptographic Algorithm Validation Program
CAVS Connected & Automated Vehicles
CBA Cost Benefit Analysis
CBAC Context Based Access Control
CBC Cipher Block Chaining
CBC-MAC Cipher Block Chaining Message Authentication Code
CBEFF Common Biometric Exchange File Format
CBI Confidential Business Information
CBIPM Confidential Business Information Protective Measure
CBSP Cloud Based Security Providers
CC Common Criteria
CCA Clinger Cohen Act
CCA Cloud Computing Agreements
CCB Change Control Board
CCB Configuration Control Board
CCE Common Configuration Enumeration
CCEVS Common Criteria Evaluation & Validation Scheme
CCI Control Correlation Identifier
CCIPS Computer Crime & Intellectual Property Section
CCK Complementary Code Keying
CCM Cloud Controls Matrix
CCM Counter Mode With CBC MAC
CCMP Counter Mode With Cipher Block Chaining Message Authentication Code Protocol
CCP Common Control Provider
CCRA Cloud Computing Reference Architecture
CCRA Common Criteria Recognition Arrangement
CCSS Common Configuration Scoring System
CCT Correlated Color Temperature
CCTA Central Computer & Telecommunications Agency
CCTL Common Criteria Testing Laboratory
ccTLD Country Code Top Level Domain
CCTV Closed Circuit Television
CD Checking Disabled
CD Compact Disc
CD Cross Domain
CDA Combined Dynamic Data Authentication
CDC Centers For Disease Control
CDE Cardholder Data Environment
CDFS Compact Disc File System
CDMA Code Division Multiple Access
CDMI Cloud Data Management Interface
CDN Content Delivery Network
CDN Content Distribution Network
CDO Chief Data Officer
CDR Call Detail Records
CDR Critical Design Review
CD-R Compact Disc Recordable
CD-ROM Compact Disc Read Only Memory
CD-RW Compact Disc Rewritable
CDS Cross Domain Solution
CDSE Center For Development of Security Excellence
CDSSO Cross Domain Single Sign On
CE Compromising Emanations
CE Covered Entity
CEM Common Evaluation Methodology
CEO Chief Executive Officer
CER Canonical Encoding Rules
CER Crossover Error Rate
CERIAS Center For Education & Research In Information Assurance & Security
CERT Computer Emergency Response Team
CERT/CC Cert/Coordination Center
CF Compact Flash
CFAA Computer Fraud & Abuse Act
CFB Cipher Feedback
CFI Computer & Financial Investigations
CFO Chief Financial Officer
CFR Code Federal Regulations
CFR Code of Federal Regulations
CFTT Computer Forensics Tool Testing
CGA Cryptographically Generated Addresses
CGI Common Gateway Interface
CHAP Challenge Handshake Authentication Protocol
CHUID Cardholder Unique Identifier
CI Counterintelligence
CI Critical Information
CI/CD Continuous Integration/Continuous Deployment
CIA Central Intelligence Agency
CIAC Computer Incident Advisory Capability
CIAO Critical Infrastructure Assurance Office
CIAR Counterintelligence Awareness & Reporting
CID Card Id
CID Cryptogram Information Data
CIDR Classless Inter Domain Routing
CIFA Counterintelligence Field Activity
CIFS Common Internet File System
CIHI Canadian Institute For Health Information
CIIA Critical Infrastructure Information Act
CIK Crypto Ignition Key
CIO Chief Information Officer
CIP Critical Infrastructure Protection
CIPA Classified Information Procedures Act
CIPC Critical Infrastructure Protection Committee
CIPSEA Confidential Information Protection & Statistical Efficiency Act
CIPWG Critical Infrastructure Protection Working Group
CIR Committed Information Rate
CIRC Computer Incident Response Capability
CIRC Computer Incident Response Center
CIRDB Cerias Incident Response Database
CIRT  Computer Incident Response Team
CIS Center For Internet Security
CIS Cryptologic Information System
CISA C4I Integration Support Activity
CISA  Certified Information Systems Auditor
CISARA Counterintelligence Security Countermeasures & Related Activities
CISC Complex Instruction Set Computing
CISM Certified Information Systems Security Manager
CISO Chief Information Security Officer
CISO Counterintelligence Support Officer
CISP Counterintelligence Support Plan
CISSM Component Information System Security Manager
CISSP Certified Information Systems Security Professional
CITAC Computer Investigation & Infrastructure Threat Assessment Center
CITS Cooperative Intelligent Transportation System
CJCS Chairman of The Joint Chiefs of Staff
CJCSI Chairman Joints Chiefs of Staff Instruction
CKTS Computerized Key Telephone System
CLAS Classified By
CLASP Comprehensive Lightweight Application Security Process
CLF Common Log Format
CLI Command Line Interface
CLOB Character Large Object
CLOUD Clarifying Lawful Overseas Use of Data
CLR Common Language Runtime
cm Centimeter
CM Classification Management
CM Configuration Management
CM Content Management
CM Countermeasure
CMA Certificate Management Authority
CMAC Cipher Based Method Authentication Code
CMB Change Management Board
CMB Configuration Management Board
CMDB Configuration Management Database
CMDS Computer Misuse Detection System
CME Common Malware Enumeration
CMI Classified Military Information
CMIWG Classification Markings & Implementation Working Group
CMM Capability Maturity Model
CMMI Capability Maturity Model Integration
CMOS Complementary Metal Oxide Semiconductor
CMP Configuration Management Plan
CMPL Civil Monetary Penalties Law
CMS Centers For Medicare & Medicaid Services
CMS Comsec Management System
CMS Configuration Management System
CMS Content Management System
CMS Cryptographic Message Syntax
CMSS Common Misuse Scoring System
CMVP Cryptographic Module Validation Program
CN Common Name
CN Correspondent Node
CNA Computer Network Attack
CNAME Canonical Name
CNAP Cybersecurity National Action Plan
CNCI Comprehensive National Cybersecurity Initiative
CND Computer Network Defense
CNDSP Computer Network Defense Service Provider
CNE Computer Network Exploitation
CNN Convolutional Neural Network
CNSI Classified National Security Information
CNSS Committee On National Security Systems
CNSSD Committee On National Security Systems Directives
CNSSI Committee On National Security Systems Instruction
CNSSP Committee On National Security Systems Policy
CO Cyberspace Operations
CoA Care of Address
COBIT Control Objectives For Information & Related Technologies
codec Coder/Decoder
COE Common Operating Environment
COI Conflict of Interest
COM Component Object Model
COMINT Communications Intelligence
CompaaS Compute As A Service
COMSEC Communications Security
CONOPS Concept of Operations
COO Chief Operating Officer
COOP Continuity of Operations
COOP Continuity of Operations Plan
COPPA Children’S Online Privacy Protection Act
CORBA Common Object Request Broker Architecture
CORS Cross Origin Resource Sharing
COSO Commission of Sponsoring Organizations of The Treadway Commission
COTM Communications On The Move
COTS Commercial off The Shelf
CP Certificate Policy
CP Contingency Plan
CPA Certified Public Accountant
CPA Cost Per Action
CPC Cost Per Click
CPE Common Platform Enumeration
CPI Compression Parameter Index
CPL Cost Per Lead
CPM Cost Per Thousand Impressions
CPM Critical Path Method
CPNI Center For The Protection of National Infrastructure
CPO Chief Privacy Officer
CPS Certificate Practice Statement
CPS Cyber Physical System
CPSO Command Program Security Officer
CPSO Contractor Program Security Officer
CPT Current Procedural Terminology
CPTED Crime Prevention Through Environmental Design
CPU Central Processing Unit
CPWG Crime Prevention Working Group
CR Conversion Rate
CRAM Challenge Response Authentication Mechanism
CRAMM Ccta Risk Analysis & Management Method
CRC Cyclic Redundancy Check
CRC–32 Cyclic Redundancy Check–32
CRG Compliance Review Group
CRL Certificate Revocation List
CRM Customer Relationship Management
CRO Chief Risk Officer
CRO Conversion Rate Optimization
CRT Cathode Ray Tube
CRYPTO Cryptography
CS Client/Server
CS Comment Spamming
CSA Child Support Agency
CSA Cloud Security Alliance
CSA Cloud Services Agreement
CSA Cognizant Security Agency
CSA Cognizant Security Authority
CSA Computer Security Act
CSC Card Security Code
CSCS Contract Security Classification Specification
CSE Center For Security Evaluation
CSEA Cyber Security Enhancement Act
CSEC Cyber Security Education Consortium
CSF Common Security Framework
CSIA Cyber Security Industries Alliance
CSIL Critical & Sensitive Information List
CSIR Computer (& Network) Security Incident Response
CSIRC Computer Security Incident Response Capability
CSIRT Computer Security Incident Response Team
CSISM Communications Security (COMSEC) Supplement To The Industrial Security Manual
CSMA / CD Carrier Sense Multiple Access/Collision Detection
CSO Chief Security Officer
CSO Cognizant Security Office
CSO Computer Security Object
CSP Cloud Service Provider
CSP Content Security Policy
CSP Credentials Service Provider
CSR Certificate Signing Request
CSRC Computer Security Resource Center
CSRDA Cyber Security Research & Development Act of 2002
CSRF Cross Site Request Forgery
CSS Cascading Style Sheet
CSS Central Security Service
CSS Constant Surveillance Service
CSSIA Center For Systems Security & Information Assurance
CSSM Communications Computer System Security Manager
CSSO Computer Systems Security Officers
CST Construction Surveillance Technician
CSV Comma Separated Values
CT Computed Tomography
CT Counter Terrorism
CTA Call To Action
CTC Connectionist Temporal Classification
CTC Counterterrorist Center
CTCPEC Canadian Trusted Computer Product Evaluation Criteria
CTO Chief Technology Officer
CTP Composite Theoretical Performance
CTR Click Through Rate
CTR Counter Mode Encryption
CTS Click Through Rate
CTS Computerized Telephone System
CTS Cosmic Top Secret
CTSA Cosmic Top Secret Atomal
CTTA Certified Transient Electromagnetic Pulse Emanation Standard (Tempest) Technical Authority
CUDA Compute Unified Device Architecture
CUI Controlled Unclassified Information
CV Computer Vision
C-V2X Cellular Vehicle To Everything
CVC Card Validation Code
CVD Card Verification Data
CVE Common Vulnerabilities & Exposures
CVE Elo Verification Code
CVM Card Verification Method
CVN Card Validation Number
CVR Card Verification Result
CVSS Common Vulnerability Scoring System
CVV Card Verification Value
CW Code Word
CW Cyber Warfare
CWE Common Weakness Enumeration
CWSS Common Weakness Scoring System
CX Customer Experience
CYBEX Cybersecurity Information Exchange
CYOD Choose Your Own Device
D2D Device To Device
DA Destination Address
DA Domain Authority
DAA Designated Approving Authority
DaaS Desktop As A Service
DAC Discretionary Access Control
DAD Duplicate Address Detection
DAM Database Activity Monitoring
DAM Digital Asset Management
DAML DARPA Agent Markup Language
DAMP Database Activity Monitoring & Prevention
D-AMPS Digital Advanced Mobile Phone Service
DAO Data Access Object
DAR Degree Audit Report
DARPA Defense Advanced Research Projects Agency
DAS Direct Attached Storage
DASD Deputy Assistant Secretary of Defense
DASD (DT&E) Deputy Assistant Secretary of Defense For Developmental Test & Evaluation
DAST Dynamic Application Security Testing
DATO Denial of Authorization To Operate
DBA Database Administrator
DBaaS Database As A Service
dBm Decibels Referenced To One Milliwatt
DBMS Database Management System
DC Data Center
DC Domain Controller
DC3 DOD Cyber Crime Center
DCaaS Data Center As A Service
DCC Defensive Counter Cyber
DCE Distributed Computing Environment
DCFL Defense Computer Forensics Lab
DCHC Defense Counterintelligence & Human Intelligence Center
DCI Director of Central Intelligence
DCI SSC Director of Central Intelligence Special Security Center
DCID Director of Central Intelligence Directive
DCL Declassify
DCMA Defense Contract Management Agency
DCMO Deputy Chief Management Office
DCOM Distributed Component Object Model
DCPDS Defense Civilian Personnel Data System
DCS Defense Clandestine Service
DCS Distributed Control System
DCSINT Deputy Chief of Staff For Intelligence Army
DD Defense Department
DDA Designated Disclosure Authority
DDA Standard Dynamic Data Authentication
DDAL Delegation of Disclosure Authority Letter
DDEP Defense Data Exchange Program
DDL Data Definition Language
DDMS Department of Defense Metadata Specification
DDNS Dynamic Domain Name Services
DDOL Dynamic Data Authentication Data
DDoS Distributed Denial of Service
DDR3 Double Data Rate Type 3
DEA Data Encryption Algorithm
DECL Declassify
DEK Data Encryption Key
DEP Data Execution Prevention
DES Data Encryption Standard
DFARS Defense Federal Acquisition Regulation Supplement
DFS Distributed File System
DFS Dynamic Frequency Selection
DH Diffie Hellman
DHAAD Dynamic Home Agent Address Discovery
DHCP Dynamic Host Configuration Protocol
DHCPv6 Dynamic Host Configuration Protocol For Internet Protocol V6
DHS U.S. Department of Homeland Security
DIA Defense Intelligence Agency
DIAC Defense Intelligence Analysis Center
DIACAP Department of Defense Information Assurance Certification & Accreditation Process
DIACCS Defense Ia Command & Control System
DIAM Defense Intelligence Agency Manual
DIAMOND Defense Intrusion Analysis & Monitoring Desk
DIAP Defense Information Assurance Program
DIB Defense Industrial Base
DIC Defense Intelligence Community
DICOB Defense Industrial Security Clearance Oversight Board
DICOM Digital Imaging & Communications In Medicine
DIDO Designated Intelligence Disclosure official
DIDS Distributed Intrusions Detection System
DII Defense Information Infrastructure
DIMA DOD Portion of The Intelligence Mission Area
DIMS Digital Identity Management Service
DIN Drug Identification Number
DIRNSA Director National Security Agency
DIS Defense Investigative Service
DISA Defense Information Systems Agency
DISA Direct Inward System Access
DISA U.S. Defense Information Systems Agency
DISN Defense Information Systems Network
DISP Department of Defense Industrial Security Program
DITPR DOD Information Technology Portfolio Repository
DITSCAP Department of Defense Information Technology Security Certification & Accreditation Process
DITSWG Defense Information Technology Security Working Group
DKIM Domain Keys Identified Mail
DLL Dynamic Link Library
DLP Data Loss Prevention
DLT Distributed Ledger Technology
DM Direct Message
DMA Direct Memory Access
DMARC Domain Based Message Authentication Reporting & Conformance
DMC Defense Megacenter
DMCA Digital Millennium Copyright Act
DMDC Defense Manpower Data Center
DMF Data Management Facility
DML Data Manipulation Language
DMNS Data Management Notification System
DMS Data Management System
DMS Database Migration Service
DMS Defense Message System
DMVPN Dynamic Multipoint VPN
DMZ Demilitarized Zone
DN Distinguished Name
DN Domain Name
DNA Deoxyribonucleic Acid
DNI Director of National Intelligence
DNI Director of Naval Intelligence
DNP Distributed Network Protocol
DNS Domain Name Server
DNS Domain Name System
DNSBL Domain Name System Blacklist
DNSSEC Domain Name System Security Extensions
DOC U.S. Department of Commerce
DoD U.S. Department of Defense
DoD ISRMC DOD Information Security Risk Management Committee
DoDAF Department of Defense Architecture Framework
DoDD Department of Defense Directive
DoDI DOD Instruction
DoDIIS Department of Defense Intelligence Information System
DODIN Department of Defense Information Networks
DoDIS Department of Defense Information System
DoDM DOD Manual
DOE U.S. Department of Energy
DOI Domain of Interpretation
DOJ U.S. Department of Justice
DOM Document Object Model
DoN Department of The Navy
DoS Denial of Service
DOS Disk Operating System
DOT&E Director Operational Test & Evaluation
DPA Data Protection Act
DPA Differential Power Analysis
DPH Department of Public Health
DPIA Data Protection Impact Assessment
DPO Data Protection Officer
DQL Data Query Language
DR Disaster Recovery
DRA Data Recovery Agent
DRAM Dynamic Random Access Memory
DRB Defense Resources Board
DRDA Distributed Relational Database Architecture
DREAD Disaster Reproducibility Exploitability Affected Users & Discoverability
DREN Defense Research & Engineering Network
DRM Digital Rights Management
DRMO Defense Reutilization Management Office
DRP Disaster Recovery Plan
DRS Distributed Resource Scheduler
DS Delegation Signer
DS Direct Support
DS Distribution System
DS Field Differentiated Services Field
DSA Data Sharing Agreement
DSA Designated Security Authority
DSA Digital Signature Algorithm
DSAWG Defense Ia Security Accreditation Working Group
DSB Defensive Security Brief
DSBS Dual Sensor Brake Support
DSCA Defense Security Cooperation Agency
DSEC Director of Security
DSL Digital Subscriber Line
DSLAM Digital Subscriber Line Access Multiplexer
DSMC Defense Systems Management College
DSML Directory Services Markup Language
DSN Defense Switched Network
DSN Delivery Status Notification
DSOD Dynamic Separation of Duty
DSS Defense Security Service
DSS Digital Signature Standard
DSSCS Defense Special Security Communication System
DSS-PIC DSS Personnel Investigations Center
DSSS Defense Special Security System
DSTM Dual Stack Transition Mechanism
DT Directory Traversal
DT/PT Directory / Path Traversal
DT&E Developmental Test & Evaluation
DTC Distributed Transaction Coordinator
DTD Document Type Definition
DTIC Defense Technical Information Center
DTLS Datagram Transport Layer Security
DTM Data Transmission Media
DTM Directive Type Memorandum
DTP Dynamic Trunking Protocol
DTR Derived Test Requirement
DTSA Defense Technology Security Administration
DUA Data Use Agreement
DUID DHCP Unique Identifier
DVD Digital Versatile Disc
DVD Digital Video Disk
DVD-R Digital Video Disc Recordable
DVD-RAM Digital Versatile Disc Random Access Memory
DVD-ROM Digital Video Disc Read Only Memory
DVD-RW Digital Video Disc Rewritable
DVMRP Distant Vector Multicast Routing Protocol
DVR Digital Video Recorder
DVR Digital Voice Recorder
DW Data Warehouse
E/APL Evaluated Approved Product
EA Electronic Attack
EA Enterprise Architecture
EA Evolutionary Acquisition
EAC Electronic Access Control
EAC Estimate At Completion
EAI Enterprise Application Integration
EAL Evaluation Assurance Level
EAP Extensible Authentication Protocol
EAP-FAST Extensible Authentication Protocol Flexible Authentication Via Secure Tunneling
EAPOL Extensible Authentication Protocol Over LAN
EAPOL-KCK Extensible Authentication Protocol Over LAN Key Confirmation Key
EAPOL-KEK Extensible Authentication Protocol Over LAN Key Encryption Key
EAP-TLS Extensible Authentication Protocol Transport Layer Security
EAP-TTLS Extensible Authentication Protocol Tunneled Transport Layer Security
EBGP Exterior Border Gateway Protocol
EBS Amazon Elastic Block Store
ebXML Electronic Business Extensible Markup Language
ebXML Electronic Business Using Extensible Markup Language
EC2 Elastic Compute Cloud
EC2N Elliptic Curve Over G[2N]
ECB Electronic Code Book
ECC Elliptic Curve Cryptography
ECC Error Correction Code
ECDH Elliptic Curve Diffie Hellman
ECDSA Elliptic Curve Digital Signature Algorithm
ECM Enterprise Configuration Manager
ECM Enterprise Content Management
ECP Encryption Control Protocol
ECP Engineering Change Proposal
ECPA Electronic Communications Privacy Act
ECS Ec2 Container Service
EDGE Enhanced Data For Global Evolution
EDI Electronic Data Interchange
EDR Endpoint Detection & Response 
EDR Enhanced Data Rate
EEPROM Electrically Erasable Programmable Read Only Memory
EF Exposure Factor
EFI Extensible Firmware Interface
EFOIA Electronic Freedom of Information Act
EFS Elastic File System
EFS Encrypting File System
EGP Exterior Gateway Protocol
EH Extension Header
EHR Electronic Health Record
EI Email Injection
EICAR European Institute For Computer Antivirus Research
EIEMA Enterprise Information Environment Mission Area
EIGRP Enhanced Interior Gateway Routing Protocol
EIK EAP Integrity Key
EIP Elastic IP
EITDR Enterprise Information Technology Database Repository
EK Endorsement Key
ELB Elastic Load Balancer
email Electronic Mail
eMASS Enterprise Mission Assurance Support Service
eMBB Enhanced Mobile Broadband
EMM Enterprise Mobility Management
EMP Electromagnetic Pulse
EMR Elastic Map Reduce
EMR Electronic Medical Record
EMS Energy Management System
EMS Enhanced Messaging Service
EMS Enterprise Messaging System
EMSK Extended Master Session Key
EMTALA Emergency Medical Treatment & Labor Act
EMV Europay Mastercard Visa Specification
EMVCo EMV Specifications Company
EnCE Encase Certified Examiner
EnCEP Encase Certified Ediscovery Practitioner
ENI Elastic Network Interface
ENISA European Network & Information Security Agency
ENRP Endpoint Handlespace Redundancy Protocol
EOF End of File
EOL End of Life
EOP Executive Office of The President
EP Eligible Provider
EPA Environmental Protection Agency
EPAL Enterprise Privacy Authorization Language
EPC Electronic Product Code
EPCIS Electronic Product Code Information Services
EPHI Electronic Protected Health Information
EPITS Essential Program Information Technologies & Systems
EPROM Erasable Programmable Read Only Memory
EPS Events Per Second
EPSQ Electronic Personnel Security Questionnaire
ERM Enterprise Risk Management
ERP Enterprise Resource Planning
ES Amazon Elasticsearch Service
ES Electronic Surveillance
ESAPI Enterprise Security Application Programming Interface
ESB Enterprise Service Bus
ESMS Enterprise Security Management System
ESMTP Extended Simple Mail Transfer Protocol
ESN Electronic Serial Number
ESP Encapsulating Security Payload
ESS Electronic Security System
ESS Extended Service Set
ESX Elastic Sky X
ET Electronic Transmission
ETA Education Training & Awareness
ETAPWG Education Training Awareness & Professionalization Working Group
ETC Estimate To Complete
ETSI European Telecommunications Standards Institute
ETZ Equipment Transient Electromagnetic Pulse Emanation Standard (Tempest) Zone
EU European Union
EU DP European Union Data Protection
EUI-64 Extended Unique Identifier 64 Bit
EULA End User License Agreement
EUP Enterprise Unified Process
EV Extended Validation
EV-DO Evolution Data Optimized
EVM Earned Value Management
EW Electronic Warfare
EWS Electronic Warfare Support
EXIF Exchangeable Image File Format
EXT Extended File System
EXT2 Second Extended File System
ext2fs Second Extended Filesystem
EXT3 Third Extended File System
ext3fs Third Extended Filesystem
EXT4 Fourth Extended File System
FaaS Function As A Service
FAFSA Free Application For Federal Student Aid
FAIR Factor Analysis of Information Risk
FAQ Frequently Asked Questions
FAR False Acceptance Rate
FAR Federal Acquisition Regulation
FASC-N Federal Agency Smart Credential Number
FASP Federal Agency Security Practices
FAT Factory Acceptance Testing
FAT File Allocation Table
FAT16 File Allocation Table (16 Bit) File System
FB Facebook
FBCA Federal Bridge Certification Authority
FBI Federal Bureau of Investigation
FBIS Foreign Broadcast Information Service
FCC Federal Communications Commission
FCIP Foreign Counterintelligence Program
FCL Facility Security Clearance
FCL Final Checklist List
FCPF Federal PKI Common Policy Framework
FCRA Fair Credit Reporting Act
FCS Frame Check Sequence
FDA Food & Drug Administration
FDCC Federal Desktop Core Configuration
FDCE Federated Development & Certification Environment
FDDI Fiber Distributed Data Interface
FDE Full Disk Encryption
FDIC Federal Deposit Insurance Corporation
FDMA Frequency Division Multiple Access
FEA Federal Enterprise Architecture
FEAF Federal Enterprise Architecture Framework
FEK File Encryption Key
FEMA Federal Emergency Management Agency Only Memory
FER Failure To Enroll Rate
FFIEC Federal Financial Institutions Examination Council
FFMIA Federal Financial Management Improvement Act
FHIR Fast Healthcare Interoperability Resources
FHSS Frequency Hopping Spread Spectrum
FI Foreign Intelligence
FIAM Federated Identity & Access Management
FIB Forwarding Information Base
FICC Federal Identity Credentialing Committee
FIDS Facility Intrusion Detection System
FIE Foreign Intelligence Entity
FIFO First In First Out
FILO First In Last Out
FIM Federated Identity Management
FIM File Integrity Monitoring
Fios Fiber Optic Service
FIPS Federal Information Processing Standard
FIPSPUB Federal Information Processing Standard Publication
FIRST Forum of Incident Response & Security Teams
FIS Foreign Intelligence Services
FISA Foreign Intelligence Surveillance Act
FISCAM Federal Information System Controls Audit Manual
FISD Federal Investigative Services Division
FISINT Foreign Instrumentation Signals Intelligence
FISMA Federal Information Security Management Act
FISSEA Federal Information Systems Security Educators’ Association
FIT Foreign Inspection Team
FIU Field Investigative Unit
FIWC Fleet Information Warfare Center
FLETC Federal Law Enforcement Training Center
FLOPS Floating Point Operations Per Second
FM Frequency Modulated
FMR False Match Rate
FMS Fluhrer Mantin Shamir
FN Foreign National
FNMR False Non Match Rate
FOIA Freedom of Information Act
FOIA/PA Freedom of Information Act/Privacy Act
FOMO Fear of Missing Out
FOSS Free & Open Source Software
FOV Field of View
FPC Federal Preparedness Circular
FPE Format Preserving Encryption
FPGA Field Programmable Gate Array
FPKI Federal Public Key Infrastructure
FPKIA Federal Public Key Infrastructure Architecture
FPKIPA Federal Public Key Infrastructure Policy Authority
FPN Fixed Pattern Noise
FPU Floating Point Unit
FQDN Fully Qualified Domain Name
FRAM Ferroelectric Random Access Memory
FRAP Facilitated Risk Analysis Process
FRCP Federal Rules of Civil Procedure
FRD Formerly Restricted Data
FRD Functional Requirements Document
FRR False Rejection Rate
FSB Frontside Bus
FSO Facility Security Officer
FSO Field Security Office
FTC Federal Trade Commission
FTCA Federal Trade Commission Act
FTP File Transfer Protocol
FTPS File Transfer Protocol Secure
FTS Federal Telecommunications Service
FTZ Facilities Transient Electromagnetic Pulse Emanation Standard (Tempest) Zone
FUD Fully Undetectable
FUS Fast User Switching
FY Fiscal Year
G2 Assistant Chief of Staff G2 Intelligence
G-2 Staff Intelligence Officer
GA Google Analytics
GAAP Generally Accepted Accounting Principles
GAO U.S. Government Accountability Office
GAPP Generally Accepted Privacy Principles
GB Gigabyte
GCCS Global Command & Control System
GCLB Google Cloud Load Balancer
GCM Galois / Counter Mode
GCP Google Cloud Platform
GCS Google Cloud Storage
GCSS Global Combat Support System
GDIP General Defense Intelligence Programs
GDPR General Data Protection Regulation
GEOINT Geospatial Intelligence
GFAC Generalized Framework For Access Control
GFE Government Furnished Equipment
GFIRST Government Forum of Incident Response & Security Teams
GHz Gigahertz
GIF Graphics Interchange Format
GIG Global Information Grid
GII Global Information Infrastructure
GINA Graphical Identification & Authentication
GIS Geographic Information Systems
GISRA Government Information Security Reform Act
GKEK Group Key Encryption Key
GLB Gramm Leach Bliley Act
GLBA Gramm Leach Bliley Act
GMITS Guidelines For The Management of It Security
GMK Group Master Key
GNU Gnu'S Not Unix!
GnuPG Gnu Privacy Guard
GOSC Global Operations & Security Center
GOTS Government off The Shelf
GPGPU General Purpose Computation On Graphics Processing Units
GPIO General Purpose Input/Output
GPL General Public License
GPMC Group Policy Management Console
GPO Group Policy Object
GPRS General Packet Radio Service
GPS Global Positioning System
GR Graceful Restart
GRC Governance Risk Management & Compliance
GRE Generic Routing Encapsulation
GRS General Records Schedule
GS1 Global Standards One
GSA U.S. General Services Administration
GSC Government Security Committee
GSII Government Services Information Infrastructure
GSM Global System For Mobile Communications
GSOIA General Security of Information Agreement
GSOMIA General Security of Military Information Agreement
GSSAPI Generic Security Services Application Program Interface
GTC Generic Token Card
GTEK Group Traffic Encryption Key
GTK Group Temporal Key
gTLD Generic Top Level Domain
GTSM Generalized Ttl Security Mechanism
GUI Graphical User Interface
GUID Globally Unique Identifier
HA High Availability
HA Home Agent
HAC High Availability Clusters
HAG High Assurance Guard
HAL Hardware Abstraction Layer
HAR Http Archive
HBSS Host Based Security System
HCERA Health Care & Education Reconciliation Act
HCI Host Controller Interface
HCISPP Healthcare Information Security & Privacy Practitioner
HDD Hard Disk Drive
HDFS Hadoop Distributed File System
HDMI High Definition Multimedia Interface
HERF Hazards of Electromagnetic Radiation To Fuel
HERO Hazards of Electromagnetic Radiation To Ordnance
HERP Hazards of Electromagnetic Radiation To Personnel
HF High Frequency
HFS Hierarchical File System
HFS+ Hierarchical File System Plus
HHS U.S. Department of Health & Human Services
HI Header Injection / HTTP response splitting
HICS Hospital Incident Command System
HIDS Host Based Intrusion Detection System
HIE Health Information Exchange
HINFO Host Information
HIP Host Identity Protocol
HIPAA Health Insurance Portability & Accountability Act
HIPERLAN High Performance Radio Local Area Network
HIPS Host Based Intrusion Prevention System
HIT Healthcare Information Technology
HITECH Health Information Technology For Economic & Clinical Health
HITRUST Health Information Trust Alliance
HITS Hyperlink Induced Topic Search
HIV Human Immunodeficiency Virus
HKLM HKEY Local_Machine
HL7 Health Level 7
HMAC Hash Message Authentication Code
HMD Head Mounted Displays
HMI Human Machine Interface
HMO Health Maintenance Organization
HOIS Hostile Intelligence Services
HP CSA Hp Cloud Service Automation
HPA Host Protected Area
HPC High Performance Compute
HPFS High Performance File System
HPSCI House Permanent Select Committee On Intelligence
HR Human Resources
HRM Human Resource Management
HSA Homeland Security Act
HSARPA Homeland Security Advanced Research Projects Agency
HSDPA High Speed Downlink Packet Access
HSF Heat Sink & Fan
HSM Hardware Security Module
HSPA High Speed Packet Access
HSPA+ Evolved High Speed Packet Access Or High Speed Packet Access
HSPD Homeland Security Presidential Directive
HTCIA High Technology Crime Investigation Association
HTCP Hyper Text Caching Protocol
HTML Hypertext Markup Language
HTTP Hypertext Transfer Protocol
HTTPS Hypertext Transfer Protocol Secure
HUMINT Human Intelligence
HVA Hazard Vulnerability Analysis
HVAC Heating Ventilation & Air Conditioning
HVM Hardware Virtual Machine
Hz Hertz
I&A Identification & Authentication
I&W Indications & Warning
I/O Input/Output
I3A International Imaging Industry Association
I3P Institute For Information Infrastructure Protection
IA Information Assurance
IA Institutional Analytics
IA Intelligence Activity
IAA Interim Access Authorization
IaaS Infrastructure As A Service
IAB Internet Architecture Board
IaC Infrastructure As Code
IAC Internal Audit & Compliance
IAC Issuer Action Codes
IACIS International Association of Computer Investigative Specialists
IACSE Interagency Advisory Committee On Security Equipment
IAD Information Assurance Document
IAG Information Assurance Group
IAIP Information Analysis & Infrastructure Protection
IAM Identity & Access Management
IAM Information Assurance Manager
IANA Internet Assigned Numbers Authority
IAO Information Assurance Officer
IAPM Information Assurance Program Manager
IAPWG Information Assurance Policy Working Group
IASE Information Assurance Support Environment
IASL Information Assurance Senior Leadership
IAST Interactive Application Security Test
IATAC Information Assurance Technology Analysis Center
IATC Interim Authority To Connect
IATF Information Assurance Technical Framework
IATO Interim Authority To Operate
IATT Interim Authorization To Test
IAVA Information Assurance Vulnerability Alert
IAX 2 Inter Asterisk Exchange
IBC Iterated Block Cipher
IBE Identity Based Encryption
iBGP Internal Border Gateway Protocol
IBIS Issue Based Information System
IBMJSSE IBM Java Secure Socket Extension
IBN Intent Based Networking
IBR Integrated Baseline Review
IBSS Independent Basic Service Set
IC Integrated Circuit
IC Intelligence Community
IC3 Internet Crime Complaint Center
ICAC Internet Crimes Against Children
ICAMP Incident Cost Analysis & Modeling Project
ICANN Internet Corporation For Assigned Names & Numbers
ICC Integrated Circuit Card
ICCID Integrated Circuit Card Identifier
ICCP Inter Control Center Communications Protocol
ICD Intelligence Community Directive
ICD Interface Control Document
ICD International Classification of Diseases
ICD-10 International Classification of Diseases Version 10
ICF Internet Connection Firewall
ICFR Internal Control Over Financial Reporting
ICM Integer Counter Mode
ICMP Internet Control Message Protocol
ICO Information Commisioner's Office
ICP Initial Control Point
ICP Internet Cache Protocol
ICS Industrial Control System
ICS Internet Connection Sharing
ICSA International Computer Security Association
ICT Information & Communication Technology
ICV Integrity Check Value
ICV Intelligent Connected Vehicles
ID Identification
IDaaS Identity As A Service
IDART Information Design Assurance Red Team
IDC International Data Center
IDE Integrated Development Environment
IDE Integrated Device Electronics
IDE Integrated Drive Electronics
IDE Intrusion Detection Equipment
IdEA Identity Entitlement & Access Management
IDEA International Data Encryption Algorithm
iDEN Integrated Digital Enhanced Network
ID-FF Identity Federation Framework
IDL Interface Definition Language
IdM Identity Management
IDMEF Intrusion Detection Message Exchange Format
IDMS Identity Management System
IdP Identity Provider
IDPS Intrusion Detection & Prevention System
IDS Intrusion Detection System
IDS/IDP Intrusion Detection/Intrusion Detection & Prevention
ID-SIS Identity Service Interface Specifications
ID-WSF Identity Web Services Framework
IE Internet Explorer
IEC International Electrotechnical Commission
IED Intelligent Electronic Device
IEEE Institute of Electrical & Electronics Engineers
IEEE-SA IEEE Standards Association
IEID International Exchange of Infrasound Data
IERD International Exchange of Radionuclide Data
IESD International Exchange of Seismological Data
IESG Internet Security Steering Group
IETF Internet Engineering Task Force
IFTTT If This Then That
IG Internet Gateway
IGMP Internet Group Management Protocol
IGP Interior Gateway Protocol
IGRP Interior Gateway Routing Protocol
IID Interface Identifier
IIF Information In Identifiable Form
IIHI Individually Identifiable Health Information
IIOC Independent International Organization For Certification
IIOP Internet Inter Orb Protocol
IIS Internet Information Services
IKE Internet Key Exchange
ILM Information Lifecycle Management
IM Instant Messaging
IMAP Internet Message Access Protocol
IMEI International Mobile Equipment Identity
IMM Information Management Model
IMS Intelligent Maintenance Systems
IMSI International Mobile Subscriber Identity
IMT-2000 International Mobile Telecommunications 2000
INCITS International Committee For Information Technology Standards
INCOSE International Council of Systems Engineering
INFOCONs Information Operations Conditions
INFOSEC Information Systems Security
INFOSYS Information Systems
INTERPOL International Police Organization
IO Information Operations
IO Information Owner
IO Insertion Order
IOC Indicators of Compromise
IOPS Input/Output Operations Per Second
IOSS Interagency Operations Security (OPSEC) Support Staff
IoT Internet of Things
IP Intellectual Property
IP Internet Protocol
IPA Initial Privacy Assessment