Appendix A: List of Acronyms
Appendix A: List of Acronyms
| Acronym
|
Meaning |
|---|---|
|
A&O |
analysis and operations |
|
ACL |
access control list |
|
ADS |
anomaly detection system |
|
A/V |
audio/video |
|
AV |
anti-virus |
|
AVS |
anti-virus software |
|
C&A |
certification and accreditation |
|
CAESARS |
Continuous Asset Evaluation, Situational Awareness, and Risk Scoring Reference Architecture Report |
|
CBK |
Common Body of Knowledge |
|
CBT |
computer-based training |
|
CCV |
Cybersecurity Capabilities Validation |
|
CD |
compact disc |
|
CERT/CC |
CERT Coordination Center |
|
CIA |
confidentiality, integrity, and availability |
|
CIO |
chief information officer |
|
CISO |
chief information security officer |
|
CISSP |
Certified Information Systems Security Professional |
|
CM |
continuous monitoring |
|
CMMI |
Capability Maturity Model Integration |
|
CMU |
Carnegie Mellon University |
|
CND |
computer network defense |
|
CNDSP |
computer network defense service provider |
|
COBIT |
Control Objectives for Information and related Technology |
|
CONOPS |
concept of operations |
|
COOP |
continuity of operations |
|
COP |
common operational picture |
|
CP |
contingency planning |
|
CSIRT |
computer security incident response team |
|
CVE |
Common Vulnerabilities and Exposures |
|
D/A |
department/agency |
|
DDOS |
distributed denial of service |
|
DHS |
Department of Homeland Security |
|
DISA |
Defense Information Systems Agency |
|
DMZ |
demilitarized zone |
|
DNS |
domain name system |
|
DoD |
Department of Defense |
|
DoS |
denial of service |
|
ETA |
education, training, and awareness |
|
F-CND |
Federal-Computer Network Defense |
|
FAX |
facsimile |
|
FCD |
Federal Continuity Directive |
|
FCMR |
Federal Cybersecurity Maturity Roadmap |
|
FE |
framework extension |
|
FFIEC |
Federal Financial Institutions Examination Council |
|
FIPS |
Federal Information Processing Standards |
|
FIRST |
Forum of Incident Response and Security Teams |
|
FISMA |
Federal Information Security Management Act of 2002 |
|
FNR |
Federal Network Resilience |
|
FNS |
Federal Network Security |
|
FOUO |
for official use only |
|
FYI |
for your information |
|
GFIRST |
Government Forum of Incident Response and Security Teams |
|
GnuPG |
GNU Privacy Guard |
|
GRS |
General Records Schedule |
|
HR |
human resources |
|
IA |
information assurance |
|
IC |
intelligence community |
|
IDPS |
Intrusion Detection and Prevention System |
|
IDS |
intrusion detection system |
|
IEC |
International Electrotechnical Commission |
|
IETF |
Internet Engineering Task Force |
|
IG |
inspector general |
|
IM |
incident management |
|
IMF |
Incident Management Function |
|
IP |
internet protocol |
|
IPS |
intrusion prevention system |
|
IR |
incident response |
|
ISAC |
Information Sharing and Analysis Center |
|
(ISC)2 |
International Information Systems Security Certification Consortium |
|
ISCM |
information system continuous monitoring |
|
ISCP |
Information System Contingency Plan |
|
ISF |
Information Security Forum |
|
ISO |
information security officer OR |
|
ISP |
internet service provider |
|
IT |
information technology |
|
ITGI |
Information Technology Governance Institute |
|
ITIL |
IT Infrastructure Library |
|
JWICS |
Joint Worldwide Intelligence Communications System |
|
LE |
law enforcement |
|
LOA |
letter of agreement |
|
MEF |
mission essential function |
|
MIME |
Multipurpose Internet Mail Extensions |
|
MO |
modus operandi (mode of operation) |
|
MOA |
memorandum of agreement |
|
MOU |
memorandum of understanding |
|
MSSP |
managed security service provider |
|
NARA |
National Archives and Records Administration |
|
NDA |
non-disclosure agreement |
|
NEF |
national essential function |
|
NFAT |
network forensics analysis tools |
|
NIC |
network information centre |
|
NIST |
National Institute of Standards and Technology |
|
NIST SP |
NIST Special Publication |
|
NITTF |
National Insider Threat Task Force |
|
NOC |
network operations centre |
|
NSA |
National Security Agency |
|
NVD |
National Vulnerability Database |
|
OCTAVE |
Operationally Critical Threat, Asset, and Vulnerability Evaluation |
|
OGC |
Office of Government Commerce |
|
OLRC |
Office of the Law Revision Counsel |
|
OMB |
Office of Management and Budget |
|
OPSEC |
operations security |
|
OS |
operating system |
|
PC |
personal computer |
|
PE |
physical and environmental |
|
PGP |
Pretty Good Privacy |
|
PII |
personally identifiable information |
|
PKI |
public key infrastructure |
|
PMEF |
primary mission essential function |
|
POC |
point of contact |
|
QA |
quality assurance |
|
RA |
risk assessment |
|
RDF |
resource description framework |
|
RFC |
request for comments |
|
RSS |
RDF Site Summary |
|
SA |
situational awareness |
|
SCIF |
Sensitive Compartment Information Facility |
|
SDLC |
system development lifecycle |
|
SEI |
Software Engineering Institute |
|
SEIM |
security event and incident management |
|
SIPRNET |
Secret Internet Protocol Router Network |
|
SKiP |
Security Knowledge in Practice |
|
SLA |
service level agreement |
|
S/MIME |
Secure/Multipurpose Internet Mail Extensions |
|
SME |
subject matter expert |
|
SMS |
short message service |
|
SOC |
security operations centre |
|
SOP |
standard operating procedure |
|
SP |
special publication |
|
SSP |
system security plan |
|
STE |
secure terminal equipment |
|
SWO |
senior watch officer |
|
TERENA |
Trans-European Research and Education Networking Association |
|
TICAP |
Trusted Internet Connection Access Provider |
|
TS |
top secret |
|
TT&E |
testing, training, and exercise |
|
US-CERT |
United States Computer Emergency Readiness Team |
|
VPN |
virtual private network |
|
VS |
vulnerability scanning |
|
XML |
Extensible Markup Language |