acronyms - dvanmosselbeen/security-cheat-sheet GitHub Wiki
Acronyms
A list of frequently used acronyms and terminologies.
| Acronyms | Full | Remarks |
|---|---|---|
| A&A | Assessment and Authorization | |
| ADP | Automated Data Processing | |
| AES | Advanced Encryption Standard | |
| ANSI | American National Standards Institute | |
| ATC | Authorization to Connect | |
| ATM | Authorization Termination Date | |
| ATO | Authorization to Operate | |
| AV | Antivirus | |
| C2 | Command and Control | |
| C2W | Command and Control Warfare | |
| C4 | Command, Control, Communications, and Computers | |
| C4ISR | Command, Control, Communications, Computer, Intelligence, Surveilance and Reconnaisssance | |
| CA | Certification Authority | |
| CERT | Computer Emergency Response Team | |
| CERT | Computer Emergency Response Team | |
| CIAC | Computer Incident Advisory Capability | |
| CIO | Chief Information Officer | |
| CIP | Critical Infrastructure Protection | |
| CIRT | Computer Incident Response Team | |
| CISO | Chief Information Security Officer | |
| CITAC | Computer Investigation and Infrastructure Threat Assessment Center | |
| CMDS | Computer Misuse Detection System | |
| CMS | COMSEC Management System | |
| CNA | Computer Network Attack | |
| CNDSP | Computer Network Defense Service Provider | |
| CONOPS | Concept of Operations | |
| CSA | Computer Security Act | |
| CSIR | Computer (and Network) Security Incident Response | |
| CSS | Central Security Service | |
| CSSO | Computer Systems Security Officers | |
| DARPA | Defense Advanced Research Projects Agency | |
| DATO | Denial of Authorization To Operate | |
| DCI | Director of Central Intelligence | |
| DES | Digital Encryption Standard | |
| DIAMOND | Defense Intrusion Analysis & Monitoring Desk | |
| DIDS | Distributed Intrusions Detection System | |
| DMS | Defense Message System | |
| DoD CIO | DoD Chief Information Officer | |
| DoDD | Department of Defense Directive | |
| DoD | Department of Defense | |
| DoD | Department of Defense | |
| DODIN | Department of Defense information networks | |
| DSS | Defense Security Service | |
| EDR | EDR evasion | |
| EFOIA | Electronic Freedom of Information Act | |
| ETA | Education, Training and Awareness | |
| FIRST | Forum of Incident Resonse and Security Teams | |
| GMITS | Guidelines for the Management of IT Security | |
| HBSS | Host Based Security System | |
| IC | Intelligence Community | |
| IEEE | Institute for Electrical and Electronics Engineers | |
| INFOSEC | Information Systems Security | |
| IO | Information Operations | |
| IP | Internet Protocol | |
| IPR | Internet Protocol Router | |
| IPSec | Internet Protocol Security | |
| IRM | Information Resource Management | |
| IRS | Incident Reporting Structure | |
| IRT | Incident Response Team | |
| IS | Information System | |
| ISO | International Organization for Standardization | |
| ISSM | Information System Security Manager | |
| ISSO | Information System Security Officer | |
| IT | Information Technology | |
| I&W | Indications and Warning | |
| JID | Joint Intrusion Detection | |
| KMI | Key Management Infrastructure | |
| MCDES | Malicious Code Detection and Eradication System | |
| NACIC | National Counterintelligence Center | |
| NCSC | National Computer Security Center | |
| NID | Network Intrusion Detector | |
| NIST | National Institute of Standards and Technology | |
| NOC | Network Operating Centers | |
| NOSC | Network Operation Security Center | |
| NSA | National Security Agency | |
| OPSEC | Operations Security | |
| OT&E | Operational Test and Evaluation | |
| PGP | Pretty Good Privacy | |
| PII | Personally Identifiable Information | |
| PIN | Personal Identification Number | |
| PKI | Public Key Infrastructure | |
| PPS | Internet Protocol Suite and Associated Ports | |
| PPSM | Ports, Protocols, and Services Management | |
| PPTP | Point-to-Point Tunneling Protocol | |
| RMF | Risk Management Framework | |
| SAP | Special Access Program | |
| SAR | Security Assessment Report | |
| SATAN | Systems Administrators’ Tool for Assessing Networks | |
| SDWAN | Software-Defined Wide-Area Networking | |
| SEI | Software Engineering Institute | |
| SET | Secure Encrypted Transaction | |
| SIC | Security Intelligence Center | |
| SIEM | Examples: QRadar, Splunk | |
| SIPRNet | Secret Internet Protocol Router Network | |
| SISO | Senior Information Security Officer | |
| SITR | Secret Internet Protocol Router Network Information Technology Registry | |
| SLA | Service-Level Agreement | |
| SOC | Security Operation Center | |
| SPB | Security Policy Board | |
| SSE | System Security Engineering | |
| URL | Uniform Resource Locator (Universal Resource Locator) | |
| U.S.C. | United States Code | |
| VAAP | Vulnerability and Assessment Program | |
| VAS | Vulnerability Assessment System | |
| VPN | Virtual Private Network |