Skip to content
Capabilities
Close Capabilities
Open Capabilities
Featured Services
Cloud Cost Optimization
Cloud Cost Scorecard
Cloud Security Assessment
Cloud Audit [Launching soon]
Simplified Data Protection
Simplified Disaster Recovery
Cloud Advisory and Consulting
Simplify your IT while reducing cost and increasing security.
Cloud Migration
Services
Migrating workloads to AWS without disrupting your business
Simplified Cloud Networking
Increase agility, and availability and reduce cost.
Simplified Data
Protection
Reduce data protection costs by up to 50%.
Managed Disaster
Recovery
Australia's first no loc k-in Managed Disaster Recovery
Data Assurance
Never worry about your data, and its integrity anymore.
Managed Detect and Response (MDR)
Backed by Breach Prevention warranty.
Cloud Security
Assessment
Identify configurations, risks and attack surfaces.
Cyber Security Services
Radical Security uplift without breaking the bank.
Cloud Cost Optimisation
AWS Services
Close AWS Services
Open AWS Services
Cloud Advisory and Consulting
Simplify your IT while reducing cost and increasing security.
Cloud Migration
Services
Migrating workloads to AWS without disrupting your business.
Cost Optimization
Eliminate Cloud Waste, increase your ROI and reduce your costs.
AWS Cloud Security Assessment
Identify misconfigurations and risks and protect your business.
Azure to AWS Cloud
Migration
Migrating your workloads from Azure to AWS without impacting your operations.
Data Assurance
Never worry about your data, and its integrity anymore.
Managed Detect and Response (MDR)
Backed by Breach Prevention warranty.
Cloud Security
Assessment
Identify configurations, risks and attack surfaces.
Cyber Security Services
Radical Security uplift without breaking the bank.
Cyber Security
Resources
Close Resources
Open Resources
Cloud Cost Scorecard
Assess your cloud spendings and potentials to save cost.
Cloud Computing Acronyms
A collection of Helpful but sometimes confusing acronyms
Cloud Computing Encyclopedia
It is an encyclopedia, but focused on Cloud Computing.
Cloud Security Score
Launching soon.
Cyber Security Acronyms
A collection of every Cyber Security Acronym you must know
Cyber Security Encyclopedia
Launching soon
Get Started
Jump to:
A
B
c
d
e
f
g
h
i
j
k
l
m
n
o
p
q
r
s
t
u
v
w
x
y
z
Popular Cyber Security Acronyms
#
3DES
- Triple Data Encryption Algorithm (Also TDEA or Triple DEA)
A
ACL
- Access Control List
AES
- Advanced Encryption Standard
A&A
- Assessment and Authorization
AACA
- ASD-Approved Cryptographic Algorithm
AACP
- ASD-Approved Cryptographic Protocol
ACL
- Access Control List
AD
- Active Directory
ADDS
- Active Directory Domain Services
ADP
- Automated Data Processing
AES
- Advanced Encryption Standard
AFC4A
- Air Force C4 Agency
AFI
- Air Force Instruction
AFIWC
- Air Force Information Warfare Center
ADPD
- Air Force Policy Directive
AGAO
- Australian Government Access Only
AH
- Authentication Header
AIMS
- Automated Infrastructure Management System
AISEP
- Australian Information Security Evaluation Program
AMIDS
- Audit Monitoring and Intrusion Detection System
AMSI
- Anti-Malware Scan Interface
ANSI
- American National Standards Institute
AO
- Authorizing Official
AOC
- Autonomic Security Operations
AODR
- Authorizing Official Designated Representative
API
- Application Programming interface
APRA
- Australian Prudential Regulation Authority
APT
- Advanced Persistent Threat
ASD
- Australian Signals Directorate
ASD(C31)
- Assistant Secretary of Defense for Command, Control, Communication and Intelligence
ASIMS
- Automated Security Incident Measuring System
ASIO
- Australian Security Intelligence Organisation
ASPM
- Application Security Posture Management
ASSIST
- Automated System Security Incident Support Team
AST
- Application Security Testing
ATA
- Advanced Technology Attachment
ATC
- Authorization to Connect
ATD
- Authorization Termination Date
ATM
- Asynchronous Transfer Mode
ATO
- Authorization to Operate
AUSTEO
- Australian Eyes Only
AV
- Antivirus
B
BIOS
- Basic Input and Output System
BMA
- Business Mission Area
BotNet
- Robot Network
BMA
- Business Mission Area
C
C&A
- Certification and Accreditation
C&A WG
- Certification and Accreditation Working Group
C2
- Command and Control
C2W
- Command and Control Warfare
C4
- Command, Control, Communications, and Computers
C4ISR
- Command, Control, Communications, Computer, Intelligence, Surveilance and Reconnaisssance
CA
- Certification Authority
CAAP
- Critical Asset Assurance Program
CAASM
- Cyber Asset Attack Surface Management
CAC
- Common Access Card
CAL
- Category Assurance List
CAP
- Connection Approval Program
CAPTCHA
- Completely Automated Public Turing Test to Tell Computers and Humans Apart
CAS
- Cloud Asset Inventory
CASB
- Cloud Access Security Broker
CC
- Common Criteria
CCA
- Clinger-Cohen Act
CCB
- Configuration Control Board
CCI
- Control Correlation Identifier
CD
- Cross Domain
CDN
- content delivery network
CDR
- Cloud Detection and Response
CDS
- Cross-Domain Solution
CEH
- Certified Ethical Hacker
CERT
- Computer Emergency Response Team
CERT/CC
- CERT/Coordination Center
CFR
- Code of Federal Regulations
CI
- Counterintelligence
CI
- Configuration Item
CIAC
- Computer Incident Advisory Capability
CIAM
- Cloud Identity Access Management
CIAM
- Customer Identity and Access Management
CIEM
- Cloud Infrastructure Entitlement Management
CIO
- Chief Information Officer
CIP
- Critical Infrastructure Protection
CIPWG
- Critical Infrastructure Protection Working Group
CIRT
- Computer Incident Response Team
CISA
- C4I Integration Support Activity
CISA
- Certified Information Systems Auditor
CISA
- Cybersecurity and Infrastructure Security Agency
CISO
- Chief Information Security Officer
CISSP
- Certified Information Systems Security Professional
CITAC
- Computer Investigation and Infrastructure Threat Assessment Center
CJCS
- Chairman of the Joint Chiefs of Staff
CJCSI
- Chairman, Joints Chiefs of Staff Instruction
CMDS
- Computer Misuse Detection System
CMMC
- Cybersecurity Maturity Model Certification
CMS
- COMSEC Management System
CNA
- Computer Network Attack
CNAP
- Cloud-Native Application Protection Platform
CNDSP
-Computer Network Defence Service Provider
CNSS
- Committee on National Security Systems
CNSSI
- Committee on National Security Systems Instruction
CNSSP
- Committee on National Security Systems Policy
COE
- Common Operating Environment
COMSEC
- Communications Security
CONOPS
- Concept of Operations
COO
- Chief Operating Officer
COTS
- Commercial Off-the-Shelf
CSA
- Cloud Security Alliances
CSA
- Computer Security Act
C-SCRM
- Cyber Supplly Chain Risk Management
CSIR
- Computer (and Network) Security Incident Response
CSO
- Chief Security Officer
CSP
- Cloud Service Provider
CSPM
- Cloud Security Posture Management
CSRF
- Cross Site Request Forgery
CSS
- Central Security Service
CSSO
- Computer Systems Security Officers
CUI
- Controlled Unclassified Information
CVSS
- Common Vulnerability Scoring System
CWP
- Cloud Workload Protection
CWPP
- Cloud Workload Protection Platform
D
DA
- Davies Attack
DAA
- Designated Approving Authority (DAA)
DARPA
- Defense Advanced Research Projects Agency
DAM
- Database Activity Monitoring
DASD
- Deputy Assistant Secretary of Defense
DASD(DT&E)
- Deputy Assistant Secretary of Defense for Developmental Test and Evaluation
DAST
- Dynamic Application Security Testing
DATO
- Denial of Authorization To Operate
DCE
- DoD Cyber Exchange
DC
- Differential Cryptanalytics
DC
- Domain Controller
DCI
- Director of Central Intelligence
DCID
- Director of Central Intelligence Directive DoD Cyber Exchange
DCMO
- Deputy Chief Management Office
DCPDS
- Defense Civilian Personnel Data System
DDoS
- Distributed Denial-of-Service
DDR
- Data Detection and Response
DES
- Digital Encryption Standard
DevOps
- a portmanteau of “Development” and “Operations”
DevSecOps
- a portmanteau of “Development”, “Security” and “Operations”
DH
- Diffie-Hellman
DHS
- Department of Homeland Security
DIA
- Defense/Defence Intelligence Agency
DIACAP
- DoD Information Assurance Certification and Accreditation Process
DIACCS
- Defense/Defence IA Command and Control System
DIAMOND
- Defense/Defence Intrusion Analysis & Monitoring Desk
DIAP
- Defense/Defence Information Assurance Program
DIB
- Defense/Defence Industrial Base
DID
- Distributed Intrusions Detection System
DII
- DefenseDefence Information Infrastructure
DIMA
- DoD Portion of the Intelligence Mission Area
DIRNSA
- Director, National Security Agency
DISA
- Defense Information Systems Agency
DISN
- Defense/Defence Information System Network
DITPR
- DoD Information Technology Portfolio Repository
DITSCAP
- DoD IT Security Certification and Accreditation Process
DITSWG
- Defense/Defence Information Technology Security Working Group
DKIM
- DomainKeys Identified Mail
DLP
- Data Loss Prevention
DMA
- Direct Memory Access
DMARC
- Domain-based Message Authentication, Reporting and Conformance
DMC
- Defense/Defence Mega Center/Centre
DMS
- Defense/Defence Message System
DNI
- Director of National Intelligence
DNS
- Domain Name Server
DoD
- Department of Defense/Defence
DoDD
- Department of Defense/Defence Directive
DoDI
-DoD Instruction
DoDIIS
- DoD Intelligence Information System
DODIN
- Department of Defense/Defence information networks
DoDM
- DoD Manual
DoE
- Department of Energy
DoN
- Department of the Navy
DoS
- Denial-of-Service
DOT&E
- Director, Operational Test and Evaluation
DREN
- Defense Research and Engineering Network
DSAWG
- Defense/Defence IA Security Accreditation Working Group
DSPM
- Data Security Posture Management
DSS
- Defense/Defence Security Service
DT&E
- Developmental Test and Evaluation
DTM
- Directive-Type Memorandum
E
EAL
- Evaluation Assurance Level
EAP
- Evaluated Approved Product
EAP
- Extensible Authentication Protocol
EAP/TLS
- Extensible Authentication Protocol-Transport Layer Security
ECDH
- Elliptic Curve Diffie-Hellman
ECDSA
- Elliptic Curve Digital Signature Algorithm
EDR
- Endpoint Detection and Response
EEPROM
- Electrically Erasable Programmable Read-only Memory
EFOIA
- Electronic Freedom of Information Act
EIEMA
- Enterprise Information Environment Mission Area
EITDR
- Enterprise Information Technology Database Repository
eMASS
- Enterprise Mission Assurance Support Service
EO
- Executive Order
EPROM
- Rrasable Programmable Read-only Memory
ESP
- Encapsulating Security Payload
ETA
- Education, Training and Awareness
ETAPWG
- Education, Training, Awareness and Professionalization Working Group
F
FIPS
- Federal Information Processing Standard
FIPSPUB
- Federal Information Processing Standard Publication
FIRST
- Forum of Incident Resonse and Security Teams
FISMA
- Federal Information Security Management Act
FISMA
- Federal Information Security Modernization Act
FIWC
- Fleet information Warfare Center
FN
- Foreign National
FOIA
- Freedom of information Act
FSO
- Field Security Office
FT
- Fast Basic Service Set Transition
FTS
- Federal Telecommunications Service
G
GAO
- General Accounting Office
GB
- Gigabyte(s)
GCCS
- Global Command and Control System
GCSS
- Global Combat Support System
GDPR
- General Data Protection Regulation
GIG
- Global Information Grid
GMITS
- Guidelines for the Management of IT Security
GOSC
- Global Operations and Security Center
GOTS
- Government Off-the-Shelf
GRC
- Governance, Risk Management and Compliance
GSA
- General Services Administration
GSII
- Government Services Information Infrastructure
H
HACE
- High Assurance Cryptographic Equipment
HBSS
- Host Based Security System
HIPAA
- Health Information Portability and Accountability Act
HIPS
- Host-based Intrusion Prevention System
HMAC
- Hashed Message Authentication Code
HSTS
- Hypertext Transfer Protocol Strict Transport Security
HTML
- Hypertext Markup Language
HTTP
- Hypertext Transfer Protocol
HTTPS
- Hypertext Transfer Protocol Secure
I
I&W
- Indications and Warning
IA
- Information Assurance
IAD
- Information Assurance Document
IAG
- Information Assurance Group
IAM
- Information Assurance Manager
IAM
- Information Assurance Manager
IAO
- Information Assurance Officer
IAPWG
- Information Assurance Policy Working Group
IASE
- Information Assurance Support Environment
IAST
- Interactive Application Security Testing
IATAC
- Information Assurance Technology Analysis Center
IATC
- Interim Authority to Connect
IATO
- Intermin Authority to Operate
IATT
- Intermin Authority to Test
IAVA
- Information Assurance Vulnerability Alert
IC
- Intelligence Community
ICT
- information and communications technology
IDS
- Intrusion Detection System
IDTR
- Identity Detection & Response
IEC
- International Electrotechnical Commission
IEEE
- Institute for Electrical and Electronics Engineers
IKE
- Internet Key Exchange
INFOCON
-Information Operations Conditions
INFOSEC
- Information Systems Security
InfoSec
- A portmanteau of “Information” and “Security”
INFOSYS
- Information Systems
IO
- Information Operations
IoT
- Internet of Things
IP
- Internet Protocol
IP
- Intellectual Property
IP Address
- Internet Protocol Address
IPMO
- INFOSEC Program Management Office
IPR
- Internet Protocol Router
IPS
- Intrusion Prevention System
IPSec
- Internet Protocol Security
IPTF
- Infrastructure Protection Task Force
IPv4
- Internet Protocol version 4
IPv6
- Internet Protocol version 6
IR
- infrared
IRAP
- Infosec Registered Assessors Program
IRC
- INFOSEC Research Council
IRM
- Information Resource Management
IRS
- Incident Reporting Structure
IRT
- Incident Response Team
IS
- Information System
ISACA
- Information Systems Audit and Control Association
ISM
- Information Security Manual
ISMS
- Information Security Management System
ISO
- International Organization for Standardization
ISRMC
- Information Security Risk Management Committee
ISSM
- Information System Security Manager
ISSO
- Information Systems Security Officer
IT
- Information Technology
ITDR
- Identity Threat Detection & Response
ITMRA
- Information Technology Management Reform Act
IW
- Information Warfare
IW-D
- Information Warfare – Defensive
K
JCCC
- Joint Communications Control Center
JCIDS
- Joint Capabilities Integration and Development System
JDIICS
- Joint DII Control Systems
JID
- Joint Intrusion Detection
JIE
- Joint Information Environment
JIEO
- Joint Interoperability Engineering Organization
JIWG
- Joint IA Operations Working Group
JPO STC
- Joint Program Office for Special Technical Countermeasures
JTF-CNO
- Joint Task Force – Computer Network Operations
JWICS
- Joint Worldwide Intelligence Communications System
JWID
- Joint Warrior Interoperability Demonstration
KHz
- Kilohertz
KMI
- Key Management Infrastructure
KMS
- Key Management Server
KMS
- Key Management System
KS
- Knowledge Service
L
LAN
- Local Area Network
LC
- Linear cryptanalytics
LE
- Law Enforcement
LE/CI
- Law Enforcement and Counterintelligence
LEA
- Law Enforcement Agency
M
MA
- Mission Area
MAC
- Media Access Control
Malware
- Malicious Software
MB
- Megabyte(s)
MCDES
- Malicious Code Detection and Eradication System
MD5
- Message-digest Algorithm
MDR
- Managed Detection and Response
MDFT
- Mobile Device Forensic Tool
MFA
- Multi-factor Authentication
MFD
- Multifunction Device
MITRE® ATT&CK
- MITRE Adversarial Tactics, Techniques, and Common Knowledge
MITM
- Man in the middle (also Person in the middle)
MLS WG
- Multilevel Security Working Group
MOA
- Memorandum of Agreement
MOU
- Memorandum of Understanding
MSP
- Managed Service Provider
MSSP
- Managed Security Service Provider
MTA-STS
- Mail Transfer Agent Strict Transport Security
N
NAA
- National Archives of Australia
NACIC
- National Counterintelligence Center/Centre
NACL
- Network Access Control List
NC
- Non-Compliant
NCIS
- Naval Criminal Investiative Service
NCSAM
- National Cybersecurity Awareness Month
NCSC
- National Computer Security Center/Centre
NDR
- Network Detection & Response
NDU
- National Defense University
NGFW
- Next-generation Firewall
NIAC
- National Infrastructure Assurance Council
NICCS
- National Initiative for Cybersecurity Careers and Studies
NICE
- National Institute for Cybersecurity Education
NID
- Network Intrusion Detector
NIDS
- Network-based Intrusion Detection System
NII
- National Information Infrastructure
NIPC
- National Infrastructure Protection Center
NIPPNet
- Non-Classified Internet Protocol Router Network
NIPS
- Network-based Intrusion Prevention System
NISP
- National Industrial Security Program
NIST
- National Institute of Standards and Technology
NITB
- National INFOSEC Technical baseline
NOC
- Network Operating Center/Centre
NOSC
- Network Operation Security Center
NS/EP
- National Security and Emergency Preparedness
NSA
- National Security Agency
NSA/CSS
- National Security Agency/Central Security Service
NDS
- National Security Directive
NSIRC
- National Security Incident Response Center
NSOC
- National Security Operations Center
NSS
- National Security System
NSTAC
- National Security Telecommunication Advisory Committee
NSTISSC
- National Security Telecommunications and Information Systems Security Committee
NSTISSI
- National Security Telecommunications and Information Systems Security Instruction
NTA
- Network Traffic Analysis
NSU
- Non-Standard Unit
NSU
- Non-Standard Usage
O
OASD(C3I)
- Office of the Assistant Secretary of Defense (Command, Control, Communications, and Intelligence)
OIG DoD
- Office of the Inspector General of the Department of Defense
OMB
- Office of Management and Budget
OPSEC
- Operations Security
OSD/JS
- Office of the Secretary of Defense
OSI model
- Open Systems Interconnection model
OSINT
- Open Source Intelligence
OT&E
- Operational Test and Evaluation
OUSD(P)
- Office of the Under Secretary of Defense (Policy)
OWASP
- Open Web Application Security Project
P
PaaS
- Platform as a Service
PAM
- Privileged Access Management
PAO
- Principal Authorizing Official
PCCIP
- President’s Commission on Critical Infrastructure Protection
PCI-DSS
- Payment Card Industry Data Security Standard
PFS
- Perfect Forward Secrecy
PGP
- Pretty Good Privacy
PIA
- Privacy Impact Assessment
PII
- Personally Identifiable Information
PIN
- Personal Identification Number
PIT
- Platform Information Technology
PKI
- Public Key Infrastructure
PMK
- Pairwise Master Key
POA&M
- Plan of Action and Milestones
PP
- Protection Profile
PPP
- Program Protection Plan
PPSM
- Ports, Protocols, and Services Management
PPTP
- Point-to-Point Tunnelling Protocol
PRF
- Pseudorandom Function
PSPF
- Protective Security Policy Framework
PSTN
- Public Switched Telephone Network
R
RADIUS
- Remote Access Dial-In User Service
RAM
- Random Access Memory
RaaS
- Ransomware as a Service
RASP
- Runtime Application Self-Protection
RAT
- Remote Access Trojan
RBAC
- Role Based Access Control
RCE
- Remote Code Execution
RCERTs
- Regional Computer Emergency Response Teams
RDT&E
- Regional Computer Emergency Response Teams
RF
- Radio Frequency
RMF
- Risk Management Framework
ROA
- Route Origin Authorization
ROSC
- Regional Operations and Security Center
RPKI
- Resource Public Key Infrastructure
RSA
- Rivest-Sharmir-Adleman
S
S/MIME
- Secure/Multipurpose Internet Mail Extension
SaaS
- Software as a Service
SABI
- Secret and Below Interoperability
SABI WG
- Secret and Below Interoperability Working Group
SANS
- Sysadmin, Audit, Network and Security
SAP
- Special Access Program
SAR
- Security Assessment Report
SASE
- Secure Access Service Edge
SAST
- Static Application Security Testing
SATAN
- Systems Administrators’ Tool for Assessing Networks
SBU
- Sensitive-But-Unclassified
SCA
- Software Composition Analysis
SCA
- Security Control Assessor
SCAO
- SIPRNET Connection Approval Office
SCAP
- Security Content Automation Protocol
SCCVI
- Secure Configuration Compliance Validation Initiative
SCEC
- Security Construction and Equipment Committee
SCG
- Security Configuration Guide
SCI
- Sensitive Compartment Information
SCRI
- Secure Compliance Remediation Initiative
SECDEF
- Secretary of Defense
SEI
- Software Engineering Institute
SET
- Secure Encrypted Transaction
SET
- Social Engineering Toolkit
SHA
- Secure Hashing Algorithm
SHA-2
- Secure Hashing Algorithm 2
SIO
- Special Information Operations
SIEM
- Security Information and Event Management
SIPRNet
-Secret Internet Protocol Router Network
SISO
- Senior Information Security Officer
SITR
- Secret Internet Protocol Router Network Information Technology Registry
SLA
- Service-Level Agreement
SM
- System Manager
SNAP
- Systems/Networks Approval Process
SNMP
- Simple Network Management Protocol
SOAR
- Security Orchestration, Automation, and Response
SOC
- Security Operations Center
SOE
- Standard Operating Environment
SP
- Special Publication
SPB
- Security Policy Board
SPF
- Sender Policy Framework
SPN
- Service Principal Name
SQL
- Structured Query Language
SQLi
- Structured Query Language Injection
SRG
- Security Requirements Guide
SSAA
- Systems Security Authorization Agreement
SSE
- Security Services Edge
SSE
- System Security Engineering
SSH
- Secure Shell
SSFR
- Server Side Request Forgery
SSID
- Service Set Identifier
SSL
- Secure Socket Layer
SSO
- Single sign-on
SSPM
- SaaS Security Posture Management
STIGs
- Security Technical Implementation Guides
T
T&E
- Test and Evaluation
TAG
- Technical Advisory Group
TB
- Terabyte(s)
TCP/IP
- Transmission Control Protocol/Internet Protocol
THREATCO
- Condition
TIP
- Threat Intelligence Platform
TLS
- Transport Layer Security
TPM
- Trusted Platform Module
TPRM
- Third Party Risk Management
TRANSEC
- Transmission Security
TRMC
- Test Resource Management Center
TSN
- Trusted Systems and Networks
TTP
- Tactics, Techniques and Procedures
U
UBA
- User Behavior Analytics
UC
- Unified Capabilities
UCAO
- Unclassified Connection Approval Office
UCDMO
- Unified Cross Domain Management Office
UCMJ
- Uniform Code of Military Justice
UEBA
- User and Entity Behavior Analytics
UEFI
- Unified Extensible Firmware Interface
UR
- User Representative
URI
- Uniform Resource Identifier
USB
- Universal Serial Bus
USD(AT&L)
- Under Secretary of Defense for Acquisition, Technology, and Logistics
USD(I)
- Under Secretary of Defense for Intelligence
USD(P)
- Under Secretary of Defense for Policy
USD(P&R)
- Under Secretary of Defense for Personnel and Readiness
USSTRATCOM
- United States Strategic Command
V
VAP
- Vulnerability Assessment Program
VAS
- Vulnerability Assessment System
VPN
- Virtual Local Area Network
VPN
- Virtual Private Network
W
WAF
- web application firewall
WAP
- Wireless Application Protocol
WAS
- Web Application Security
WEP
- Wired Equivalent Privacy
WLAN
- Wireless Local Area Network
WMA
- Warfighting Mission Area
WPA
- Wi-Fi Protected Access
WPA2
- Wi-Fi Protected Access version 2
WPA3
- Wi-Fi Protected Access version 3
X
XDR
- Extended Detection and Response
XFS
- Cross Frame Scripting
XSS
- Cross Site Scripting
Z
ZTNA
- Zero Trust Network Access
D
DAA
- Designated Approving Authority (DAA)
DARPA
- Defense Advanced Research Projects Agency
DASD
- Deputy Assistant Secretary of Defense
DASD(DT&E)
- Deputy Assistant Secretary of Defense for Developmental Test and Evaluation
DATO
- Denial of Authorization To Operate
DCE
- DoD Cyber Exchange
Scroll to Top