Jump to:

Popular Cyber Security Acronyms

#

3DES - Triple Data Encryption Algorithm (Also TDEA or Triple DEA)

A

ACL - Access Control List

AES - Advanced Encryption Standard

A&A - Assessment and Authorization

AACA - ASD-Approved Cryptographic Algorithm

AACP - ASD-Approved Cryptographic Protocol

ACL - Access Control List

AD - Active Directory

ADDS - Active Directory Domain Services

ADP - Automated Data Processing

AES - Advanced Encryption Standard

AFC4A - Air Force C4 Agency

AFI - Air Force Instruction

AFIWC - Air Force Information Warfare Center

ADPD - Air Force Policy Directive

AGAO - Australian Government Access Only

AH - Authentication Header

AIMS - Automated Infrastructure Management System

AISEP - Australian Information Security Evaluation Program

AMIDS - Audit Monitoring and Intrusion Detection System

AMSI - Anti-Malware Scan Interface

ANSI - American National Standards Institute

AO - Authorizing Official

AOC - Autonomic Security Operations

AODR - Authorizing Official Designated Representative

API - Application Programming interface

APRA - Australian Prudential Regulation Authority

APT - Advanced Persistent Threat

ASD - Australian Signals Directorate

ASD(C31) - Assistant Secretary of Defense for Command, Control, Communication and Intelligence

ASIMS - Automated Security Incident Measuring System

ASIO - Australian Security Intelligence Organisation

ASPM - Application Security Posture Management

ASSIST - Automated System Security Incident Support Team

AST - Application Security Testing

ATA - Advanced Technology Attachment

ATC - Authorization to Connect

ATD - Authorization Termination Date

ATM - Asynchronous Transfer Mode

ATO - Authorization to Operate

AUSTEO - Australian Eyes Only

AV - Antivirus

B

BIOS - Basic Input and Output System

BMA - Business Mission Area

BotNet - Robot Network

BMA - Business Mission Area

C

C&A - Certification and Accreditation

C&A WG - Certification and Accreditation Working Group

C2 - Command and Control

C2W - Command and Control Warfare

C4 - Command, Control, Communications, and Computers

C4ISR - Command, Control, Communications, Computer, Intelligence, Surveilance and Reconnaisssance

CA - Certification Authority

CAAP - Critical Asset Assurance Program

CAASM - Cyber Asset Attack Surface Management

CAC - Common Access Card

CAL - Category Assurance List

CAP - Connection Approval Program

CAPTCHA - Completely Automated Public Turing Test to Tell Computers and Humans Apart

CAS - Cloud Asset Inventory

CASB - Cloud Access Security Broker

CC - Common Criteria

CCA - Clinger-Cohen Act

CCB - Configuration Control Board

CCI - Control Correlation Identifier

CD - Cross Domain

CDN - content delivery network

CDR - Cloud Detection and Response

CDS - Cross-Domain Solution

CEH - Certified Ethical Hacker

CERT - Computer Emergency Response Team

CERT/CC - CERT/Coordination Center

CFR - Code of Federal Regulations

CI - Counterintelligence

CI - Configuration Item

CIAC - Computer Incident Advisory Capability

CIAM - Cloud Identity Access Management

CIAM - Customer Identity and Access Management

CIEM - Cloud Infrastructure Entitlement Management

CIO - Chief Information Officer

CIP - Critical Infrastructure Protection

CIPWG - Critical Infrastructure Protection Working Group

CIRT - Computer Incident Response Team

CISA - C4I Integration Support Activity

CISA - Certified Information Systems Auditor

CISA - Cybersecurity and Infrastructure Security Agency

CISO - Chief Information Security Officer

CISSP - Certified Information Systems Security Professional

CITAC - Computer Investigation and Infrastructure Threat Assessment Center

CJCS - Chairman of the Joint Chiefs of Staff

CJCSI - Chairman, Joints Chiefs of Staff Instruction

CMDS - Computer Misuse Detection System

CMMC - Cybersecurity Maturity Model Certification

CMS - COMSEC Management System

CNA - Computer Network Attack

CNAP - Cloud-Native Application Protection Platform

CNDSP -Computer Network Defence Service Provider

CNSS - Committee on National Security Systems

CNSSI - Committee on National Security Systems Instruction

CNSSP - Committee on National Security Systems Policy

COE - Common Operating Environment

COMSEC - Communications Security

CONOPS - Concept of Operations

COO - Chief Operating Officer

COTS - Commercial Off-the-Shelf

CSA - Cloud Security Alliances

CSA - Computer Security Act

C-SCRM - Cyber Supplly Chain Risk Management

CSIR - Computer (and Network) Security Incident Response

CSO - Chief Security Officer

CSP - Cloud Service Provider

CSPM - Cloud Security Posture Management

CSRF - Cross Site Request Forgery

CSS - Central Security Service

CSSO - Computer Systems Security Officers

CUI - Controlled Unclassified Information

CVSS - Common Vulnerability Scoring System

CWP - Cloud Workload Protection

CWPP - Cloud Workload Protection Platform

D

DA - Davies Attack

DAA - Designated Approving Authority (DAA)

DARPA - Defense Advanced Research Projects Agency

DAM - Database Activity Monitoring

DASD - Deputy Assistant Secretary of Defense

DASD(DT&E) - Deputy Assistant Secretary of Defense for Developmental Test and Evaluation

DAST - Dynamic Application Security Testing

DATO - Denial of Authorization To Operate

DCE - DoD Cyber Exchange

DC - Differential Cryptanalytics

DC - Domain Controller

DCI - Director of Central Intelligence

DCID - Director of Central Intelligence Directive DoD Cyber Exchange

DCMO - Deputy Chief Management Office

DCPDS - Defense Civilian Personnel Data System

DDoS - Distributed Denial-of-Service

DDR - Data Detection and Response

DES - Digital Encryption Standard

DevOps - a portmanteau of “Development” and “Operations”

DevSecOps - a portmanteau of “Development”, “Security” and “Operations”

DH - Diffie-Hellman

DHS - Department of Homeland Security

DIA - Defense/Defence Intelligence Agency

DIACAP - DoD Information Assurance Certification and Accreditation Process

DIACCS - Defense/Defence IA Command and Control System

DIAMOND - Defense/Defence Intrusion Analysis & Monitoring Desk

DIAP - Defense/Defence Information Assurance Program

DIB - Defense/Defence Industrial Base

DID - Distributed Intrusions Detection System

DII - DefenseDefence Information Infrastructure

DIMA - DoD Portion of the Intelligence Mission Area

DIRNSA - Director, National Security Agency

DISA - Defense Information Systems Agency

DISN - Defense/Defence Information System Network

DITPR - DoD Information Technology Portfolio Repository

DITSCAP - DoD IT Security Certification and Accreditation Process

DITSWG - Defense/Defence Information Technology Security Working Group

DKIM - DomainKeys Identified Mail

DLP - Data Loss Prevention

DMA - Direct Memory Access

DMARC - Domain-based Message Authentication, Reporting and Conformance

DMC - Defense/Defence Mega Center/Centre

DMS - Defense/Defence Message System

DNI - Director of National Intelligence

DNS - Domain Name Server

DoD - Department of Defense/Defence

DoDD - Department of Defense/Defence Directive

DoDI -DoD Instruction

DoDIIS - DoD Intelligence Information System

DODIN - Department of Defense/Defence information networks

DoDM - DoD Manual

DoE - Department of Energy

DoN - Department of the Navy

DoS - Denial-of-Service

DOT&E - Director, Operational Test and Evaluation

DREN - Defense Research and Engineering Network

DSAWG - Defense/Defence IA Security Accreditation Working Group

DSPM - Data Security Posture Management

DSS - Defense/Defence Security Service

DT&E - Developmental Test and Evaluation

DTM - Directive-Type Memorandum

E

EAL - Evaluation Assurance Level

EAP - Evaluated Approved Product

EAP - Extensible Authentication Protocol

EAP/TLS - Extensible Authentication Protocol-Transport Layer Security

ECDH - Elliptic Curve Diffie-Hellman

ECDSA - Elliptic Curve Digital Signature Algorithm

EDR - Endpoint Detection and Response

EEPROM - Electrically Erasable Programmable Read-only Memory

EFOIA - Electronic Freedom of Information Act

EIEMA - Enterprise Information Environment Mission Area

EITDR - Enterprise Information Technology Database Repository

eMASS - Enterprise Mission Assurance Support Service

EO - Executive Order

EPROM - Rrasable Programmable Read-only Memory

ESP - Encapsulating Security Payload

ETA - Education, Training and Awareness

ETAPWG - Education, Training, Awareness and Professionalization Working Group

F

FIPS - Federal Information Processing Standard

FIPSPUB - Federal Information Processing Standard Publication

FIRST - Forum of Incident Resonse and Security Teams

FISMA - Federal Information Security Management Act

FISMA - Federal Information Security Modernization Act

FIWC - Fleet information Warfare Center

FN - Foreign National

FOIA - Freedom of information Act

FSO - Field Security Office

FT - Fast Basic Service Set Transition

FTS - Federal Telecommunications Service

G

GAO - General Accounting Office

GB - Gigabyte(s)

GCCS - Global Command and Control System

GCSS - Global Combat Support System

GDPR - General Data Protection Regulation

GIG - Global Information Grid

GMITS - Guidelines for the Management of IT Security

GOSC - Global Operations and Security Center

GOTS - Government Off-the-Shelf

GRC - Governance, Risk Management and Compliance

GSA - General Services Administration

GSII - Government Services Information Infrastructure

H

HACE - High Assurance Cryptographic Equipment

HBSS - Host Based Security System

HIPAA - Health Information Portability and Accountability Act

HIPS - Host-based Intrusion Prevention System

HMAC - Hashed Message Authentication Code

HSTS - Hypertext Transfer Protocol Strict Transport Security

HTML - Hypertext Markup Language

HTTP - Hypertext Transfer Protocol

HTTPS - Hypertext Transfer Protocol Secure

I

I&W - Indications and Warning

IA - Information Assurance

IAD - Information Assurance Document

IAG - Information Assurance Group

IAM - Information Assurance Manager

IAM - Information Assurance Manager

IAO - Information Assurance Officer

IAPWG - Information Assurance Policy Working Group

IASE - Information Assurance Support Environment

IAST - Interactive Application Security Testing

IATAC - Information Assurance Technology Analysis Center

IATC - Interim Authority to Connect

IATO - Intermin Authority to Operate

IATT - Intermin Authority to Test

IAVA - Information Assurance Vulnerability Alert

IC - Intelligence Community

ICT - information and communications technology

IDS - Intrusion Detection System

IDTR - Identity Detection & Response

IEC - International Electrotechnical Commission

IEEE - Institute for Electrical and Electronics Engineers

IKE - Internet Key Exchange

INFOCON -Information Operations Conditions

INFOSEC - Information Systems Security

InfoSec - A portmanteau of “Information” and “Security”

INFOSYS - Information Systems

IO - Information Operations

IoT - Internet of Things

IP - Internet Protocol

IP - Intellectual Property

IP Address - Internet Protocol Address

IPMO - INFOSEC Program Management Office

IPR - Internet Protocol Router

IPS - Intrusion Prevention System

IPSec - Internet Protocol Security

IPTF - Infrastructure Protection Task Force

IPv4 - Internet Protocol version 4

IPv6 - Internet Protocol version 6

IR - infrared

IRAP - Infosec Registered Assessors Program

IRC - INFOSEC Research Council

IRM - Information Resource Management

IRS - Incident Reporting Structure

IRT - Incident Response Team

IS - Information System

ISACA - Information Systems Audit and Control Association

ISM - Information Security Manual

ISMS - Information Security Management System

ISO - International Organization for Standardization

ISRMC - Information Security Risk Management Committee

ISSM - Information System Security Manager

ISSO - Information Systems Security Officer

IT - Information Technology

ITDR - Identity Threat Detection & Response

ITMRA - Information Technology Management Reform Act

IW - Information Warfare

IW-D - Information Warfare – Defensive

K

JCCC - Joint Communications Control Center

JCIDS - Joint Capabilities Integration and Development System

JDIICS - Joint DII Control Systems

JID - Joint Intrusion Detection

JIE - Joint Information Environment

JIEO - Joint Interoperability Engineering Organization

JIWG - Joint IA Operations Working Group

JPO STC - Joint Program Office for Special Technical Countermeasures

JTF-CNO - Joint Task Force – Computer Network Operations

JWICS - Joint Worldwide Intelligence Communications System

JWID - Joint Warrior Interoperability Demonstration

KHz - Kilohertz

KMI - Key Management Infrastructure

KMS - Key Management Server

KMS - Key Management System

KS - Knowledge Service

L

LAN - Local Area Network

LC - Linear cryptanalytics

LE - Law Enforcement

LE/CI - Law Enforcement and Counterintelligence

LEA - Law Enforcement Agency

M

MA - Mission Area

MAC - Media Access Control

Malware - Malicious Software

MB - Megabyte(s)

MCDES - Malicious Code Detection and Eradication System

MD5 - Message-digest Algorithm

MDR - Managed Detection and Response

MDFT - Mobile Device Forensic Tool

MFA - Multi-factor Authentication

MFD - Multifunction Device

MITRE® ATT&CK - MITRE Adversarial Tactics, Techniques, and Common Knowledge

MITM - Man in the middle (also Person in the middle)

MLS WG - Multilevel Security Working Group

MOA - Memorandum of Agreement

MOU - Memorandum of Understanding

MSP - Managed Service Provider

MSSP - Managed Security Service Provider

MTA-STS - Mail Transfer Agent Strict Transport Security

N

NAA - National Archives of Australia

NACIC - National Counterintelligence Center/Centre

NACL - Network Access Control List

NC - Non-Compliant

NCIS - Naval Criminal Investiative Service

NCSAM - National Cybersecurity Awareness Month

NCSC - National Computer Security Center/Centre

NDR - Network Detection & Response

NDU - National Defense University

NGFW - Next-generation Firewall

NIAC - National Infrastructure Assurance Council

NICCS - National Initiative for Cybersecurity Careers and Studies

NICE - National Institute for Cybersecurity Education

NID - Network Intrusion Detector

NIDS - Network-based Intrusion Detection System

NII - National Information Infrastructure

NIPC - National Infrastructure Protection Center

NIPPNet - Non-Classified Internet Protocol Router Network

NIPS - Network-based Intrusion Prevention System

NISP - National Industrial Security Program

NIST - National Institute of Standards and Technology

NITB - National INFOSEC Technical baseline

NOC - Network Operating Center/Centre

NOSC - Network Operation Security Center

NS/EP - National Security and Emergency Preparedness

NSA - National Security Agency

NSA/CSS - National Security Agency/Central Security Service

NDS - National Security Directive

NSIRC - National Security Incident Response Center

NSOC - National Security Operations Center

NSS - National Security System

NSTAC - National Security Telecommunication Advisory Committee

NSTISSC - National Security Telecommunications and Information Systems Security Committee

NSTISSI - National Security Telecommunications and Information Systems Security Instruction

NTA - Network Traffic Analysis

NSU - Non-Standard Unit

NSU - Non-Standard Usage

O

OASD(C3I) - Office of the Assistant Secretary of Defense (Command, Control, Communications, and Intelligence)

OIG DoD - Office of the Inspector General of the Department of Defense

OMB - Office of Management and Budget

OPSEC - Operations Security

OSD/JS - Office of the Secretary of Defense

OSI model - Open Systems Interconnection model

OSINT - Open Source Intelligence

OT&E - Operational Test and Evaluation

OUSD(P) - Office of the Under Secretary of Defense (Policy)

OWASP - Open Web Application Security Project

P

PaaS - Platform as a Service

PAM - Privileged Access Management

PAO - Principal Authorizing Official

PCCIP - President’s Commission on Critical Infrastructure Protection

PCI-DSS - Payment Card Industry Data Security Standard

PFS - Perfect Forward Secrecy

PGP - Pretty Good Privacy

PIA - Privacy Impact Assessment

PII - Personally Identifiable Information

PIN - Personal Identification Number

PIT - Platform Information Technology

PKI - Public Key Infrastructure

PMK - Pairwise Master Key

POA&M - Plan of Action and Milestones

PP - Protection Profile

PPP - Program Protection Plan

PPSM - Ports, Protocols, and Services Management

PPTP - Point-to-Point Tunnelling Protocol

PRF - Pseudorandom Function

PSPF - Protective Security Policy Framework

PSTN - Public Switched Telephone Network

R

RADIUS - Remote Access Dial-In User Service

RAM - Random Access Memory

RaaS - Ransomware as a Service

RASP - Runtime Application Self-Protection

RAT - Remote Access Trojan

RBAC - Role Based Access Control

RCE - Remote Code Execution

RCERTs - Regional Computer Emergency Response Teams

RDT&E - Regional Computer Emergency Response Teams

RF - Radio Frequency

RMF - Risk Management Framework

ROA - Route Origin Authorization

ROSC - Regional Operations and Security Center

RPKI - Resource Public Key Infrastructure

RSA - Rivest-Sharmir-Adleman

S

S/MIME - Secure/Multipurpose Internet Mail Extension

SaaS - Software as a Service

SABI - Secret and Below Interoperability

SABI WG - Secret and Below Interoperability Working Group

SANS - Sysadmin, Audit, Network and Security

SAP - Special Access Program

SAR - Security Assessment Report

SASE - Secure Access Service Edge

SAST - Static Application Security Testing

SATAN - Systems Administrators’ Tool for Assessing Networks

SBU - Sensitive-But-Unclassified

SCA - Software Composition Analysis

SCA - Security Control Assessor

SCAO - SIPRNET Connection Approval Office

SCAP - Security Content Automation Protocol

SCCVI - Secure Configuration Compliance Validation Initiative

SCEC - Security Construction and Equipment Committee

SCG - Security Configuration Guide

SCI - Sensitive Compartment Information

SCRI - Secure Compliance Remediation Initiative

SECDEF - Secretary of Defense

SEI - Software Engineering Institute

SET - Secure Encrypted Transaction

SET - Social Engineering Toolkit

SHA - Secure Hashing Algorithm

SHA-2 - Secure Hashing Algorithm 2

SIO - Special Information Operations

SIEM - Security Information and Event Management

SIPRNet -Secret Internet Protocol Router Network

SISO - Senior Information Security Officer

SITR - Secret Internet Protocol Router Network Information Technology Registry

SLA - Service-Level Agreement

SM - System Manager

SNAP - Systems/Networks Approval Process

SNMP - Simple Network Management Protocol

SOAR - Security Orchestration, Automation, and Response

SOC - Security Operations Center

SOE - Standard Operating Environment

SP - Special Publication

SPB - Security Policy Board

SPF - Sender Policy Framework

SPN - Service Principal Name

SQL - Structured Query Language

SQLi - Structured Query Language Injection

SRG - Security Requirements Guide

SSAA - Systems Security Authorization Agreement

SSE - Security Services Edge

SSE - System Security Engineering

SSH - Secure Shell

SSFR - Server Side Request Forgery

SSID - Service Set Identifier

SSL - Secure Socket Layer

SSO - Single sign-on

SSPM - SaaS Security Posture Management

STIGs - Security Technical Implementation Guides

T

T&E - Test and Evaluation

TAG - Technical Advisory Group

TB - Terabyte(s)

TCP/IP - Transmission Control Protocol/Internet Protocol

THREATCO - Condition

TIP - Threat Intelligence Platform

TLS - Transport Layer Security

TPM - Trusted Platform Module

TPRM - Third Party Risk Management

TRANSEC - Transmission Security

TRMC - Test Resource Management Center

TSN - Trusted Systems and Networks

TTP - Tactics, Techniques and Procedures

U

UBA - User Behavior Analytics

UC - Unified Capabilities

UCAO - Unclassified Connection Approval Office

UCDMO - Unified Cross Domain Management Office

UCMJ - Uniform Code of Military Justice

UEBA - User and Entity Behavior Analytics

UEFI - Unified Extensible Firmware Interface

UR - User Representative

URI - Uniform Resource Identifier

USB - Universal Serial Bus

USD(AT&L) - Under Secretary of Defense for Acquisition, Technology, and Logistics

USD(I) - Under Secretary of Defense for Intelligence

USD(P) - Under Secretary of Defense for Policy

USD(P&R) - Under Secretary of Defense for Personnel and Readiness

USSTRATCOM - United States Strategic Command

V

VAP - Vulnerability Assessment Program

VAS - Vulnerability Assessment System

VPN - Virtual Local Area Network

VPN - Virtual Private Network

W

WAF - web application firewall

WAP - Wireless Application Protocol

WAS - Web Application Security

WEP - Wired Equivalent Privacy

WLAN - Wireless Local Area Network

WMA - Warfighting Mission Area

WPA - Wi-Fi Protected Access

WPA2 - Wi-Fi Protected Access version 2

WPA3 - Wi-Fi Protected Access version 3

X

XDR - Extended Detection and Response

XFS - Cross Frame Scripting

XSS - Cross Site Scripting

Z

ZTNA - Zero Trust Network Access

D

DAA - Designated Approving Authority (DAA)

DARPA - Defense Advanced Research Projects Agency

DASD - Deputy Assistant Secretary of Defense

DASD(DT&E) - Deputy Assistant Secretary of Defense for Developmental Test and Evaluation

DATO - Denial of Authorization To Operate

DCE - DoD Cyber Exchange

Scroll to Top