Information Security Abbreviations

AAAAuthentication, Authorization, and Accounting
ACActual Cost
ACDFAccess Control Decision Function
ACIAccess Control Information
ACLAccess Control List
ACWPActual Cost of Work Performed
ADActive Directory/Activity Description
ADMArrow Diagramming Method
AESAdvanced Encryption Standard
AFActual Finish Date
ADRPArmy’s DISN Router Program
ADSLAsymmetric Digital Subscriber Line
AFIWCAir Force Information Warfare Center
AHAuthentication Header
AISAutomated Information System
APIApplication Program Interface
ASCIIAmerican Standard Code for Information Interchange
ANS1Abstract Syntax Notation
ARPAddress Resolution Protocol
ASActual Start Date
ATMAsynchronous Transfer Mode
BACBudget at Completion
BAPIBiometrics Application Program Interface
BCABridge Certificate Authority
BCWPBudgeted Cost of Work Performed
BCWSBudgeted Cost of Work Scheduled
BIOSBasic Input/Output System
BNBackbone Network
BOMBill of Materials
BOOTPBoot Protocol
BSDBerkley Software Design
C&ACertification and Accreditation
C/AIICorporate/Agency Information Infrastructure
C2Command and Control
C4ICommand, Control, Communications, Computer, and Intelligence
CACertification Authority/Control Account
CALEACommunications Assistance for Law Enforcement Act
CANCampus Area Network
CAPControl Account Plan
CAPICryptographic Application Programming Interface
CATCommon Authentication Technology
CAWCertificate Authority Workstation
CCCommon Criteria
CCBChange Control Board
CCECommon Configuration Enumeration
CCIControlled Cryptographic Item
CDMACode Division Multiple Access
CDRCritical Design Review
CDSACommon Data Security Architecture
CERTComputer Emergency Response Team
CFDCommon Fill Devices
CGECisco Global Exploiter
CGICommon Gateway Interface
CHCorrespondence Host
CICryptographic Interface/Configuration Item
CIOChief Information Officer
CIACComputer Incident Advisory Capability
CIDFCommon Instruction Detection Framework
CIKCrypto-Ignition Key
CIRTComputer Incident Response Team
CISOChief Information Security Officer
CKLCompromised Key List
CMConfiguration Management
CMACertificate Management Authority
CMICertificate Management Infrastructure
CMIPCommon Management Information Protocol
CMPCertificate Management Protocols
CMSCertificate Management Systems
CMUACertificate Management User Agent
COACourse of Action
COECommon Operating Environment
COMSECCommunications Security
CONOPSConcept of Operations
COQCost of Quality
CORBACommon Object Request Broker Architecture
CPCertificate Policy/Critical Path
CPFCost Plus Fee
CPICost Performance Index
CPMCritical Path Method
CPSCertification Practice Statement
CRLCertificate Revocation List
CSAComputer Security Act
CSPCryptographic Service Provider
CSRACritical Security Requirement Areas
CSSMCommon Security Services Manager
CTOChief Technology Officer
CVCompliance Validation/Cost Variance
CVECommon Vulnerability and Exposures
CVICompliance Validation Inspection
CVSDContinuously Variable Slope Detection
CVSSCommon Vulnerability Scoring System
CWBSContract Work Breakdown Structure
CWECommon Weakness Enumeration
DAADesignated Approving Authority
DACDiscretionary Access Control
DAPDirectory Access Protocol
DDData Date
DERDistinguished Encoding Rules
DESData Encryption Standard
DHCPDynamic Host Control Protocol
DITDirectory Information Tree
DMSDefense Messaging System
DMZDemilitarized Zone
DNDistinguished Name
DNSDomain Name Server
DNSSECDomain Name System Security
DOSDenial of Service
DSADirectory Service Agents
EACEstimate at Completion
EALEvaluation Assurance Level
ECAsExternal Certificate Authorities
EFEarly Finish Date
EKMSElectronic Key Management System
EMVExpected Monetary Value
ESMEncapsulating Security Management
ESEarly Start Date
ESPEncapsulating Security Payload
ETCEstimate to Complete
EUTEnd User Terminal
EVExpected Value/Earned Value
FedCIRCFederal Computer Incident Response Center
FFFinish-to-Finish/Free Float
FIPSFederal Information Processing Standards
FIRSTForum of Incident Response and Security Team
FISMAFederal Information Processing Standards
FMEAFailure Mode and Effect Analysis
FrSIRTFrench Security Incident Response Team
FSRSFunctional Security Requirements for Specification
FTPFile Transfer Protocol
GSAKMPGroup Service Association Key Management Protocol
GUIGraphical User Interface
GULSGeneral Upper Layer Security
HAGHigh Assurance Guard
HFHigh Frequency
HTMLHyper Text Markup Language
HTTPHyper Text Transfer Protocol
I&AIdentification and Authentication
IAInformation Assurance
IAMINFOSEC Assessment Methodology
IATFInformation Assurance Technical Framework
IBACIdentity Based Access Control
ICIntelligence Community
ICMPInternet Control Message Protocol
ICRLAIndirect Certificate Revocation List Authority
IDPSIntrusion Detection and Prevention System
IDSIntrusion Detection System
IDUPIndependent Data Unit Protection
IEEEInstitute of Electrical and Electronics Engineers
IEMINFOSEC Evaluation Methodology
IETFInternet Engineering Task Force
IFBInvitation for Bid
IISInternet Information Server
IKEInternet Key Exchange
ILSIntegrated Logistics Support
IMAPInternet Mail Access Protocol
INEInline Network Encryptor
INFOSECInformation Security
IPInternet Protocol
IPNInformation Protection Network
IPSIntrusion Prevention System
IPSecInternet Protocol Security
IPXInternet Packet Exchange
ISInformation Systems
ISAKMPInternet Security Association and Key Management Protocol
ISDNIntegrated Services Digital Network
ISOInternational Organization for Standardization
ISSAFInformation System Security Assessment Framework
ISSOInformation Systems Security Organization
ITInformation Technology
ITLInformation Technology Laboratory
IWInformation Warfare
KMIKey Management Infrastructure
LANLocal Area Network
LDAPLightweight Directory Access Protocol
LDM/KPLocal Management Device/Key Processor
LFLate Finish Date
LOELevel of Effort
LPDLow Probability of Detection
LPILow Probability of Intercept
LRALocal Registration Authority
LSLate Start Date
MACMandatory Access Control
MANMetropolitan Area Network
MD5Message Digest 5
MILSMultiple, Independent Security Levels
MIMEMultipurpose Internet Mail Extension
MSNMission Needs Statement
MoEMeasure of Effectiveness
MSPMessage Security Protocol
MTAMessage Transfer Protocol
MTSMessage Transfer System
NATNetwork Address Translation
NESNetwork Encryption System
NICNetwork Interface Card
NISNetwork Information System
NIPCNational Infrastructure Protection Center
NISTNational Institute of Standards and Technology
NOSNetwork Operating System
NSANetwork Security Agency
NSFNetwork Security Framework
NVDNational Vulnerability Database
OBSOrganizational Breakdown Structure
ODOriginal Duration
OIGOffice of Inspector General
OMBOffice of Management and Budget
OPSECOperational Security
ORDOperational Requirements Documents
OSOperating System
OSIOpen Systems Interconnection
OSSTMMOpen Source Security Testing Methodology Manual
OWASPOpen Web Application Security Project
PAAPolicy Approving Authority
PBXPrivate Branch Exchange
PCPercent Complete
PCAPolicy Creation Authority
PCIProtocol Control Information
PDAPersonal Digital Assistant
PDMPrecedence Diagramming Method
PERLPractical Extraction and Reporting Language
PFPlanned Finish Date
PGPPretty Good Privacy
PIIPersonally Identifiable Information
PINPersonal Identification Number
PKCSPublic Key Cryptographic Standards
PKIPublic Key Infrastructure
PMProject Manager/Project Management
PMAPolicy Management Authority
PMBOKProject Management Body of Knowledge
PMISProject Management Information System
PMOProject Management Office
PMPProject Management Professional
PPPPoint-to-Point Protocol
PSPlanned Start Date
PSTNPublic Switched Telephone Network
PSWBSProject Summary Work Breakdown Structure
PVPlanned Value
QAQuality Assurance
QCQuality Control
QOSQuality of Service
RADIUSRemote Access Dial In User Service
RAMResponsibility Assignment Matrix
RBACRule Based Access Control
RBRRule-Based Reasoning
RBSResource Breakdown Structure/Risk Breakdown Structure
RDRemaining Duration
RFCRequest for Comment
RFPRequest for Proposal
RFQRequest for Quotation
ROERules of Engagement
RTMRequirements Traceability Matrix
S/MIMESecure/Multipurpose Internet Mail Extension
SCADASupervisory Control and Data Acquisition
SCAPSecurity Content Automation Protocol
SDDSecure Data Device
SDESecure Data Exchange
SDLCSystem Development Life Cycle
SETSecure Electronic Transaction
SFScheduled Finish Date/Start to Finish
SFTPSecure File Transfer Protocol
SHASecure Hashing Algorithm
SIDSystem Identfication
SIPSession Initiation Protocol
SKMSymmetric Key Management
SLAService Level Agreements
SMBServer Message Block
SMESubject Matter Expert
SMISecurity Management Infrastructure
SMIBSecurity Management Information Base
SMTPSimple Mail Transfer Protocol
SNMPSimple Network Management Protocol
SOWStatement of Work
SPGSecurity Program Group
SPISchedule Performance Index
SSScheduled Start Date/Start to Start
SSASystem Security Administrator
SSAASystem Security Authorization Agreement
SSHSecure Shell
SSIDService Set Identifier
SSLSecure Sockets Layer
SSNSocial Security Number
STESecurity Test and Evaluation
SVSchedule Variance
SWOTStrengths, Weaknesses, Opportunities, and Threats
TCTarget Completion Date
TCBTrusted Computing Base
TCPTransmission Control Protocol
TCP/IPTransmission Control Protocol/Internet Protocol
TDMATime Division Multiple Access
TFTarget Finish Date/Total Float
TFTPTrivial File Transfer Protocol
TLSTransport Layer Security
TMTime and Material
TOETarget of Evaluation
TPEPTrust Product Evaluation Program
TQMTotal Quality Management
TSTarget Start Date
TTPTrusted Third Party
UDPUser Datagram Protocol
URLUniform Resource Locator
USBUniversal Serial Bus
VEValue Engineering
VMVirtual Machine
VoIPVoice over Internet Protocol
VPNVirtual Private Network
WANWide Area Network
WBSWork Breakdown Structure
WEPWired Equivalent Privacy
WIDPSWireless Intrusion Detection and Prevention System
WIFIWireless Fidelity
WLANWireless Local Area Network
WPAWi-Fi Protected Access
WVEWireless Vulnerabilities and Exploits
XMLExtensible Markup Language