acronyms - dvanmosselbeen/security-cheat-sheet GitHub Wiki
Acronyms
A list of frequently used acronyms and terminologies.
Acronyms | Full | Remarks |
---|---|---|
A&A | Assessment and Authorization | |
ADP | Automated Data Processing | |
AES | Advanced Encryption Standard | |
ANSI | American National Standards Institute | |
ATC | Authorization to Connect | |
ATM | Authorization Termination Date | |
ATO | Authorization to Operate | |
AV | Antivirus | |
C2 | Command and Control | |
C2W | Command and Control Warfare | |
C4 | Command, Control, Communications, and Computers | |
C4ISR | Command, Control, Communications, Computer, Intelligence, Surveilance and Reconnaisssance | |
CA | Certification Authority | |
CERT | Computer Emergency Response Team | |
CERT | Computer Emergency Response Team | |
CIAC | Computer Incident Advisory Capability | |
CIO | Chief Information Officer | |
CIP | Critical Infrastructure Protection | |
CIRT | Computer Incident Response Team | |
CISO | Chief Information Security Officer | |
CITAC | Computer Investigation and Infrastructure Threat Assessment Center | |
CMDS | Computer Misuse Detection System | |
CMS | COMSEC Management System | |
CNA | Computer Network Attack | |
CNDSP | Computer Network Defense Service Provider | |
CONOPS | Concept of Operations | |
CSA | Computer Security Act | |
CSIR | Computer (and Network) Security Incident Response | |
CSS | Central Security Service | |
CSSO | Computer Systems Security Officers | |
DARPA | Defense Advanced Research Projects Agency | |
DATO | Denial of Authorization To Operate | |
DCI | Director of Central Intelligence | |
DES | Digital Encryption Standard | |
DIAMOND | Defense Intrusion Analysis & Monitoring Desk | |
DIDS | Distributed Intrusions Detection System | |
DMS | Defense Message System | |
DoD CIO | DoD Chief Information Officer | |
DoDD | Department of Defense Directive | |
DoD | Department of Defense | |
DoD | Department of Defense | |
DODIN | Department of Defense information networks | |
DSS | Defense Security Service | |
EDR | EDR evasion | |
EFOIA | Electronic Freedom of Information Act | |
ETA | Education, Training and Awareness | |
FIRST | Forum of Incident Resonse and Security Teams | |
GMITS | Guidelines for the Management of IT Security | |
HBSS | Host Based Security System | |
IC | Intelligence Community | |
IEEE | Institute for Electrical and Electronics Engineers | |
INFOSEC | Information Systems Security | |
IO | Information Operations | |
IP | Internet Protocol | |
IPR | Internet Protocol Router | |
IPSec | Internet Protocol Security | |
IRM | Information Resource Management | |
IRS | Incident Reporting Structure | |
IRT | Incident Response Team | |
IS | Information System | |
ISO | International Organization for Standardization | |
ISSM | Information System Security Manager | |
ISSO | Information System Security Officer | |
IT | Information Technology | |
I&W | Indications and Warning | |
JID | Joint Intrusion Detection | |
KMI | Key Management Infrastructure | |
MCDES | Malicious Code Detection and Eradication System | |
NACIC | National Counterintelligence Center | |
NCSC | National Computer Security Center | |
NID | Network Intrusion Detector | |
NIST | National Institute of Standards and Technology | |
NOC | Network Operating Centers | |
NOSC | Network Operation Security Center | |
NSA | National Security Agency | |
OPSEC | Operations Security | |
OT&E | Operational Test and Evaluation | |
PGP | Pretty Good Privacy | |
PII | Personally Identifiable Information | |
PIN | Personal Identification Number | |
PKI | Public Key Infrastructure | |
PPS | Internet Protocol Suite and Associated Ports | |
PPSM | Ports, Protocols, and Services Management | |
PPTP | Point-to-Point Tunneling Protocol | |
RMF | Risk Management Framework | |
SAP | Special Access Program | |
SAR | Security Assessment Report | |
SATAN | Systems Administrators’ Tool for Assessing Networks | |
SDWAN | Software-Defined Wide-Area Networking | |
SEI | Software Engineering Institute | |
SET | Secure Encrypted Transaction | |
SIC | Security Intelligence Center | |
SIEM | Examples: QRadar, Splunk | |
SIPRNet | Secret Internet Protocol Router Network | |
SISO | Senior Information Security Officer | |
SITR | Secret Internet Protocol Router Network Information Technology Registry | |
SLA | Service-Level Agreement | |
SOC | Security Operation Center | |
SPB | Security Policy Board | |
SSE | System Security Engineering | |
URL | Uniform Resource Locator (Universal Resource Locator) | |
U.S.C. | United States Code | |
VAAP | Vulnerability and Assessment Program | |
VAS | Vulnerability Assessment System | |
VPN | Virtual Private Network |