A
ADP -Automated Data Processing
AES – Advanced Encryption Standard
AFC4A – Air Force C4 Agency
AFI – Air Force Instruction
AFIWC – Air Force Information Warfare Center
AFOSI – Air Force Office of Special Investigation
AFPD – Air Force Policy Directive
AIMS – Automated Infrastructure Management System
AIS – Automated Information Systems
AMIDS – Audit Monitoring and Intrusion Detection System
ANSI – American National Standards Institute
ASD(C31) – Assistant Secretary of Defense for Command, Control, Communications and Intelligence
ASIMS – Automated Security Incident Measuring System
ASSIST – Automated System Security Incident Support Team
ATC – Authorization to Connect
ATM – Asynchronous Transfer Mode
ATO – Authorization to Operate
AUP – Authorized User Policy
B-C
C&A – Certification and Accreditation
C&A WG – Certification and Accreditation Working Group
C2 – Command and Control
C2W – Command and Control Warfare
C4 – Command, Control, Communications, and Computers
C4ISR – Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance
CA – Certification Authority
CAAP – Critical Asset Assurance Program
CAC – Common Access Card
CAP – Connection Approval Program
CC – Common Criteria
CCA – Clinger-Cohen Act
CD – Cross Domain
CERT – Computer Emergency Response Team
CERT/CC – CERT/Coordination Center
CFR – Code of Federal Regulations
CI – Counterintelligence
CIAC – Computer Incident Advisory Capability
CIAO – Critical Infrastructures Assurance Office
CIP – Critical Infrastructure Protection
CIPWG – Critical Infrastructure Protection Working Group
CIRT – Computer Incident Response Team
CISA – C4I Integration Support Activity
CITAC – Computer Investigation and Infrastructure Threat Assessment Center
CJCSI – Chairman, Joints Chiefs of Staff Instruction
CMDS – Computer Misuse Detection System
CMS – COMSEC Management System
CNA – Computer Network Attack
COE – Common Operating Environment
COMSEC – Communications Security
CONOPS – Concept of Operations
COTS – Commercial Off-the-Shelf
CSA – Computer Security Act
CSIR – Computer (and Network) Security Incident Response
CSSO – Computer Systems Security Officers
D
DAA – Designated Approving Authority (DAA)
DARPA – Defense Advanced Research Projects Agency
DASD – Deputy Assistant Secretary of Defense
DCI – Director of Central Intelligence
DCID – Director of Central Intelligence Directive
DES – Digital Encryption Standard
DIA – Defense Intelligence Agency
DIACAP – DoD Information Assurance Certification and Accreditation Process
DIACCS – Defense IA Command and Control System
DIAMOND – Defense Intrusion Analysis & Monitoring Desk
DIAP – Defense Information Assurance Program
DIDS – Distributed Intrusions Detection System
DII – Defense Information Infrastructure
DIRNSA – Director, National Security Agency
DISA – Defense Information Systems Agency
DISN – Defense Information System Network
DITSCAP – DoD IT Security Certification and Accreditation Process
DITSWG – Defense Information Technology Security Working Group
DMC – Defense MegaCenter
DMS – Defense Message System
DNS – Domain Name Servers
DoD – Department of Defense
DoDD – Department of Defense Directive
DoE – Department of Energy
DoN – Department of the Navy
DSAWG – Defense IA Security Accreditation Working Group
E
EAL – Evaluation Assurance Level
E/APL – Evaluated Approved Product List
EFOIA – Electronic Freedom of Information Act
EITDR – Enterprise Information Technology Database Repository
eMASS – Enterprise Mission Assurance Support Service
EOP – Executive Office of the President
ETA – Education, Training and Awareness
ETAPWG – Education, Training, Awareness and Professionalization Working Group
F
FIPSPUB – Federal Information Processing Standard Publication
FIRST – Forum of Incident Response and Security Teams
FISMA – Federal Information Security Management Act
FIWC – Fleet Information Warfare Center
FOIA – Freedom of Information Act
FSO – Field Security Office
FTS – Federal Telecommunications Service
G
GAO – General Accounting Office
GCCS – Global Command and Control System
GCSS – Global Combat Support System
GMITS – Guidelines for the Management of IT Security
GOSC – Global Operations and Security Center
GOTS – Government Off-the-Shelf
GSA – General Services Administration
GSII – Government Services Information Infrastructure
H
HBSS – Host Based Security System
I
I&W – Indications and Warning
IA – Information Assurance
IAD – Information Assurance Document
IAG – Information Assurance Group
IAM – Information Assurance Manager
IAO – Information Assurance Officer
IAPWG – Information Assurance Policy Working Group
IATAC – Information Assurance Technology Analysis Center
IATC – Interim Authority to Connect
IATO – Interim Authority to Operate
IATT – Interim Authority to Test
IAVA – Information Assurance Vulnerability Alert
IC – Intelligence Community
IEEE – Institute for Electrical and Electronics Engineers
INFOCONs – Information Operations Conditions
INFOSEC – Information Systems Security
INFOSYS – Information Systems
IO – Information Operations
IP – Internet Protocol
IPMO – INFOSEC Program Management Office
IPR – Internet Protocol Router
IPSec – Internet Protocol Security
IPTF – Infrastructure Protection Task Force
IRC – INFOSEC Research Council
IRM – Information Resource Management
IRS – Incident Reporting Structure
IRT – Incident Response Team
ISO – International Organization for Standardization
ISSM – Information System Security Manager
ISSO – Information System Security Officer
IT – Information Technology
ITMRA – Information Technology Management Reform Act
IW – Information Warfare
IW-D – Information Warfare – Defensive
J
JCCC – Joint Communications Control Center
JDIICS – Joint DII Control Systems
JID – Joint Intrusion Detection
JIEO – Joint Interoperability Engineering Organization
JIWG – Joint IA Operations Working Group
JPO STC – Joint Program Office for Special Technical Countermeasures
JTF-CNO – Joint Task Force-Computer Network Operations
JWID – Joint Warrior Interoperability Demonstration
K
KMI – Key Management Infrastructure
L
LEA – Law Enforcement Agency
M
MCDES – Malicious Code Detection and Eradication System
MLS WG – Multilevel Security Working Group
N
NACIC – National Counterintelligence Center
NCIS – Naval Criminal Investigative Service
NCSC – National Computer Security Center
NDU – National Defense University
NIAC – National Infrastructure Assurance Council
NID – Network Intrusion Detector
NII – National Information Infrastructure
NIPC – National Infrastructure Protection Center
NIPRNET -Non-secured Internet Protocol Router Network
NISP – National Industrial Security Program
NIST – National Institute of Standards and Technology
NITB – National INFOSEC Technical Baseline
NOC – Network Operating Centers
NOSC – Network Operation Security Center
NS/EP – National Security and Emergency Preparedness
NSA – National Security Agency
NSD – National Security Directive
NSIRC – National Security Incident Response Center
NSOC – National Security Operations Center
NSTAC – National Security Telecommunications Advisory Committee
NSTISSC – National Security Telecommunications and Information Systems Security Committee
NSTISSI – National Security Telecommunications and Information Systems Security Instruction
O
OASD(C3I) – Office of the Assistant Secretary of Defense (Command, Control, Communications, and Intelligence)
OMB – Office of Management and Budget
OPSEC – Operations Security
ORNL – Oak Ridge National Laboratory
OSD – Office of the Secretary of Defense
OSD/JS – Office of the Secretary of Defense/Joint Staff
OUSD(P) – Office of the Under Secretary of Defense (Policy)
P
PCCIP – President’s Commission on Critical Infrastructure Protection
PGP – Pretty Good Privacy
PIN – Personal Identification Number
PKI – Public Key Infrastructure
POAM – Plan of Action and Milestones
PPTP – Point-to-Point Tunneling Protocol
Q-R
RCERTs – Regional Computer Emergency Response Teams
RDT&E – Research, Development, Test and Evaluation
ROSC – Regional Operations and Security Center
S
SABI – Secret and Below Interoperability
SABI WG – Secret and Below Interoperability Working Group
SATAN – Systems Administrators’ Tool for Assessing Networks
SBU – Sensitive-But-Unclassified
SCAO – SIPRNET Connection Approval Office
SCCVI – Secure Configuration Compliance Validation Initiative
SCI – Sensitive Compartmented Information
SCRI – Secure Compliance Remediation Initiative
SECDEF – Secretary of Defense
SEI – Software Engineering Institute
SET – Secure Encrypted Transaction
SIO – Special Information Operations
SIPRNET – Secret Internet Protocol Router Network
SPB – Security Policy Board
SNAP – Systems/Networks Approval Process
SSAA – Systems Security Authorization Agreement
STIGs – Security Technical Implementation Guides
T
TAG – Technical Advisory Group
THREATCON – Threat Condition
TRANSEC – Transmission Security
U
UCAO – Unclassified Connection Approval Office
UCDMO – Unified Cross Domain Management Office
U.S.C. – U.S. Code
UCMJ – Uniform Code of Military Justice
URL – Uniform Resource Locator (also Universal Resource Locator
USD – Undersecretary of Defense for Policy
V-Z
VAAP – Vulnerability and Assessment Program
VAS – Vulnerability Assessment System
VPN – Virtual Private Network
error: Content is protected !!