|
|
| (One intermediate revision by the same user not shown) |
| Line 5: |
Line 5: |
| == A == | | == A == |
| {| | | {| |
| |ANSI||American National Standards Institute | | |ANSI||[https://en.wikipedia.org/wiki/American_National_Standards_Institute American National Standards Institute] |
| |} | | |} |
|
| |
|
| == C == | | == C == |
| {| | | {| |
| |CEA||Cybersecurity Enhancement Act of 2014 | | |CEA||[https://www.congress.gov/bill/113th-congress/senate-bill/1353/text Cybersecurity Enhancement Act of 2014] |
| |- | | |- |
| CIS||Center for Internet Security | | |CIS||[https://en.wikipedia.org/wiki/Center_for_Internet_Security Center for Internet Security] |
| |- | | |- |
| |COBIT||Control Objectives for Information and Related Technology | | |COBIT||[https://en.wikipedia.org/wiki/COBIT Control Objectives for Information and Related Technology] |
| |- | | |- |
| |CPS||Cyber-Physical Systems | | |CPS||[https://en.wikipedia.org/wiki/Cyber-physical_system Cyber-Physical Systems] |
| |- | | |- |
| |CSC||Critical Security Control | | |CSC||[https://en.wikipedia.org/wiki/Center_for_Internet_Security#CIS_Controls_and_CIS_Benchmarks Critical Security Control] |
| |} | | |} |
|
| |
|
| == D == | | == D == |
| {| | | {| |
| |DHS||Department of Homeland Security | | |DHS||[https://en.wikipedia.org/wiki/United_States_Department_of_Homeland_Security Department of Homeland Security] |
| |} | | |} |
|
| |
|
| Line 29: |
Line 29: |
| {| | | {| |
| |EO||[https://en.wikipedia.org/wiki/Executive_order Executive Order] | | |EO||[https://en.wikipedia.org/wiki/Executive_order Executive Order] |
| |}
| |
|
| |
| == F ==
| |
| {|
| |
| |FAQ||[https://en.wikipedia.org/wiki/FAQ Frequently Asked Question]
| |
| |-
| |
| |FAR||[https://en.wikipedia.org/wiki/Federal_Acquisition_Regulation Federal Acquisition Regulation]
| |
| |-
| |
| |FBI||[https://en.wikipedia.org/wiki/Federal_Bureau_of_Investigation Federal Bureau of Investigation]
| |
| |-
| |
| |FCI||[https://cmmcwiki.org/index.php/Model_Glossary#F Federal Contract Information]
| |
| |-
| |
| |FDDI||[https://en.wikipedia.org/wiki/Fiber_Distributed_Data_Interface Fiber Distributed Data Interface]
| |
| |-
| |
| |FDE||[https://en.wikipedia.org/wiki/Disk_encryption Full Disk Encryption]
| |
| |-
| |
| |FedRAMP||[https://en.wikipedia.org/wiki/FedRAMP Federal Risk and Authorization Management Program]
| |
| |-
| |
| |FFRDC||[https://en.wikipedia.org/wiki/Federally_funded_research_and_development_centers Federally Funded Research and Development Center]
| |
| |-
| |
| |FIPS||[https://en.wikipedia.org/wiki/Federal_Information_Processing_Standards Federal Information Processing Standard]
| |
| |-
| |
| |FTP||[https://en.wikipedia.org/wiki/File_Transfer_Protocol File Transfer Protocol]
| |
| |}
| |
|
| |
| == G ==
| |
| {|
| |
| |GDPR||[https://en.wikipedia.org/wiki/General_Data_Protection_Regulation General Data Protection Regulation]
| |
| |}
| |
|
| |
| == H ==
| |
| {|
| |
| |HIPAA||[https://en.wikipedia.org/wiki/Health_Insurance_Portability_and_Accountability_Act Health Insurance Portability and Accountability Act]
| |
| |-
| |
| |HSPD||[https://en.wikipedia.org/wiki/Presidential_directive#Homeland_Security_Presidential_Directive Homeland Security Presidential Directive]
| |
| |-
| |
| |HTTP||[https://en.wikipedia.org/wiki/Hypertext_Transfer_Protocol Hypertext Transfer Protocol]
| |
| |-
| |
| |HTTPS||[https://en.wikipedia.org/wiki/HTTPS Hypertext Transfer Protocol Secure]
| |
| |-
| |
| |HVA||[https://cmmcwiki.org/index.php/Model_Glossary#H High-Value Asset]
| |
| |} | | |} |
|
| |
|
| == I == | | == I == |
| {| | | {| |
| |IA||[https://en.wikipedia.org/wiki/Information_assurance Information Assurance]
| | |ICS||[https://cmmcwiki.org/index.php/Model_Glossary#I Industrial Control Systems] |
| |-
| |
| |IA||Identification and Authentication
| |
| |-
| |
| |IBAC||[https://cmmcwiki.org/index.php/Model_Glossary#I Identity-Based Access Control]
| |
| |-
| |
| |IC3||[https://en.wikipedia.org/wiki/Internet_Crime_Complaint_Center Internet Crime Complaint Center]
| |
| |-
| |
| |ICAM||[https://cmmcwiki.org/index.php/Model_Glossary#I Identity, Credential, and Access Management]
| |
| |-
| |
| |ICS||[https://cmmcwiki.org/index.php/Model_Glossary#I Industrial Control System] | |
| |-
| |
| |ID||[https://cmmcwiki.org/index.php/Model_Glossary#I Identification]
| |
| |-
| |
| |IDA||Identification and Authentication
| |
| |-
| |
| |IDPS||[https://en.wikipedia.org/wiki/Intrusion_detection_system Intrusion Detection and Prevention Systems]
| |
| |- | | |- |
| |IEC||[https://en.wikipedia.org/wiki/International_Electrotechnical_Commission International Electrotechnical Commission] | | |IEC||[https://en.wikipedia.org/wiki/International_Electrotechnical_Commission International Electrotechnical Commission] |
| |- | | |- |
| |IETF||[https://en.wikipedia.org/wiki/Internet_Engineering_Task_Force Internet Engineering Task Force] | | |IoT||[https://en.wikipedia.org/wiki/Internet_of_things Internet of Things] |
| |-
| |
| |IIoT||[https://cmmcwiki.org/index.php/Model_Glossary#I Industrial Internet of Things]
| |
| |-
| |
| |IoT||[https://cmmcwiki.org/index.php/Model_Glossary#I Internet of Things]
| |
| |-
| |
| |IP||[https://en.wikipedia.org/wiki/Internet_Protocol Internet Protocol]
| |
| |-
| |
| |IPSec||[https://en.wikipedia.org/wiki/IPsec Internet Protocol Security]
| |
| |- | | |- |
| |IR||[https://cmmcwiki.org/index.php/Model_Glossary#I Incident Response] | | |IR||Interagency Report |
| |- | | |- |
| |IS||[https://cmmcwiki.org/index.php/Model_Glossary#I Information System] | | |ISA||[https://en.wikipedia.org/wiki/International_Society_of_Automation International Society of Automation] |
| |- | | |- |
| |ISAC||[https://en.wikipedia.org/wiki/Information_Sharing_and_Analysis_Center Information Sharing and Analysis Center] | | |ISAC||[https://en.wikipedia.org/wiki/Information_Sharing_and_Analysis_Center Information Sharing and Analysis Center] |
| |- | | |- |
| |ISAO||Information Sharing and Analysis Organization | | |ISAO||Information Sharing and Analysis Organization |
| |-
| |
| |ISCM||Information Security Continuous Monitoring
| |
| |-
| |
| |ISDN||[https://en.wikipedia.org/wiki/Integrated_Services_Digital_Network Integrated Services Digital Network]
| |
| |- | | |- |
| |ISO||[https://en.wikipedia.org/wiki/International_Organization_for_Standardization International Organization for Standardization] | | |ISO||[https://en.wikipedia.org/wiki/International_Organization_for_Standardization International Organization for Standardization] |
| |- | | |- |
| |IT||[https://en.wikipedia.org/wiki/Information_technology Information Technology] | | |IT||[https://en.wikipedia.org/wiki/Information_technology Information Technology] |
| |-
| |
| |ITIL||[https://en.wikipedia.org/wiki/ITIL Information Technology Infrastructure Library]
| |
| |}
| |
|
| |
| == L ==
| |
| {|
| |
| |L#||Level Number
| |
| |-
| |
| |LAN||[https://en.wikipedia.org/wiki/Local_area_network Local Area Network]
| |
| |-
| |
| |LSI||[https://en.wikipedia.org/wiki/Integrated_circuit#LSI Large-Scale Integration]
| |
| |}
| |
|
| |
| == M ==
| |
| {|
| |
| |MA||[https://cmmcwiki.org/index.php/Model_Glossary#M Maintenance]
| |
| |-
| |
| |MAC||[https://en.wikipedia.org/wiki/Medium_access_control Media Access Control]
| |
| |-
| |
| |MC||Maturity Capability
| |
| |-
| |
| |MC##||Maturity Capability Number
| |
| |-
| |
| |MDM||[https://en.wikipedia.org/wiki/Mobile_device_management Mobile Device Management]
| |
| |-
| |
| |MEP||[https://en.wikipedia.org/wiki/National_Institute_of_Standards_and_Technology#MEP Manufacturing Extension Partnership]
| |
| |-
| |
| |MFA||[https://cmmcwiki.org/index.php/Model_Glossary#M Multifactor Authentication]
| |
| |-
| |
| |ML||Maturity Level
| |
| |-
| |
| |ML#||Maturity Level Number
| |
| |-
| |
| |MMC||[https://en.wikipedia.org/wiki/MultiMediaCard Multimedia Card]
| |
| |-
| |
| |MP||Media Protection
| |
| |} | | |} |
|
| |
|
| == N == | | == N == |
| {| | | {| |
| |N/A||Not Applicable (NA)
| |
| |-
| |
| |NARA||[https://en.wikipedia.org/wiki/National_Archives_and_Records_Administration National Archives and Records Administration]
| |
| |-
| |
| |NAS||[https://en.wikipedia.org/wiki/Network-attached_storage Networked Attached Storage]
| |
| |-
| |
| |NAS||National Aerospace Standard
| |
| |-
| |
| |NCSC||[https://en.wikipedia.org/wiki/National_Cyber_Security_Centre National Cyber Security Centre]
| |
| |-
| |
| |NIST||[https://en.wikipedia.org/wiki/National_Institute_of_Standards_and_Technology National Institute of Standards and Technology] | | |NIST||[https://en.wikipedia.org/wiki/National_Institute_of_Standards_and_Technology National Institute of Standards and Technology] |
| |-
| |
| |NISTIR||NIST Interagency (or Internal) Report
| |
| |-
| |
| |NPE||Non-Person Entity
| |
| |-
| |
| |NSA||[https://en.wikipedia.org/wiki/National_Security_Agency National Security Agency]
| |
| |-
| |
| |NSA/CSS||NSA Central Security Service
| |
| |-
| |
| |NSPD||[https://en.wikipedia.org/wiki/National_security_directive National Security Presidential Directive]
| |
| |-
| |
| |NSTISSD||National Security Telecommunications and Information Systems Security Directive
| |
| |-
| |
| |NTP||[https://en.wikipedia.org/wiki/Network_Time_Protocol Network Time Protocol]
| |
| |-
| |
| |NYSSCPA||New York State Society of CPAs
| |
| |} | | |} |
|
| |
|
| == O == | | == O == |
| {| | | {| |
| |OMB||[https://en.wikipedia.org/wiki/Office_of_Management_and_Budget Office of Management and Budget]
| |
| |-
| |
| |OS||[https://en.wikipedia.org/wiki/Operating_system Operating System]
| |
| |-
| |
| |OSC||[https://cmmcwiki.org/index.php/Model_Glossary#O Organization Seeking Certification]
| |
| |-
| |
| |OT||[https://cmmcwiki.org/index.php/Model_Glossary#O Operational Technology] | | |OT||[https://cmmcwiki.org/index.php/Model_Glossary#O Operational Technology] |
| |-
| |
| |OUSD A&S||[https://en.wikipedia.org/wiki/Under_Secretary_of_Defense_for_Acquisition_and_Sustainment Office of the Under Secretary of Defense for Acquisition and Sustainment]
| |
| |} | | |} |
|
| |
|
| == P == | | == P == |
| {| | | {| |
| |PCI||Personal Identity Verification Card Issuers
| |
| |-
| |
| |PDA||[https://en.wikipedia.org/wiki/Personal_digital_assistant Personal Digital Assistant]
| |
| |-
| |
| |PE||Physical Protection
| |
| |-
| |
| |PGP||[https://en.wikipedia.org/wiki/Pretty_Good_Privacy Pretty Good Privacy]
| |
| |-
| |
| |PII||[https://cmmcwiki.org/index.php/Model_Glossary#P Personally Identifiable Information] | | |PII||[https://cmmcwiki.org/index.php/Model_Glossary#P Personally Identifiable Information] |
| |-
| |
| |PIV||Personal Identify Verification
| |
| |-
| |
| |PKI||[https://en.wikipedia.org/wiki/Public_key_infrastructure Public Key Infrastructure]
| |
| |-
| |
| |PLC||[https://en.wikipedia.org/wiki/Programmable_logic_controller Programmable Logic Controller]
| |
| |-
| |
| |POC||[https://en.wikipedia.org/wiki/Point_of_contact Point of Contact]
| |
| |-
| |
| |POTS||[https://en.wikipedia.org/wiki/Plain_old_telephone_service Plain Old Telephone Service]
| |
| |-
| |
| |PP||Physical Protection
| |
| |-
| |
| |PPD||[https://en.wikipedia.org/wiki/National_security_directive Presidential Policy Directive]
| |
| |-
| |
| |PS||Personnel Security
| |
| |-
| |
| |PUB||[https://en.wikipedia.org/wiki/Publication Publication]
| |
| |} | | |} |
|
| |
|
| == R == | | == R == |
| {| | | {| |
| |RADIUS||[https://en.wikipedia.org/wiki/RADIUS Remote Authentication Dial-in User Service] | | |RFI||[https://en.wikipedia.org/wiki/Request_for_information Request for Information] |
| |-
| |
| |RE||[https://cmmcwiki.org/index.php/Model_Glossary#R Recovery]
| |
| |- | | |- |
| |Rev||Revision | | |RMP||Risk Management Process |
| |-
| |
| |RF||[https://en.wikipedia.org/wiki/Radio_frequency Radio Frequency]
| |
| |-
| |
| |RFC||[https://en.wikipedia.org/wiki/Request_for_Comments Request for Comments]
| |
| |-
| |
| |RM||[https://cmmcwiki.org/index.php/Model_Glossary#R Risk Management]
| |
| |-
| |
| |RMM||Resilience Management Model
| |
| |-
| |
| |RMM||Risk Management Model
| |
| |-
| |
| |RPO||[https://en.wikipedia.org/wiki/Disaster_recovery#Recovery_Point_Objective Recovery Point Objectives]
| |
| |-
| |
| |RTO||[https://en.wikipedia.org/wiki/Disaster_recovery#Recovery_Time_Objective Recovery Time Objectives]
| |
| |} | | |} |
|
| |
|
| == S == | | == S == |
| {| | | {| |
| |SA||[https://cmmcwiki.org/index.php/Model_Glossary#S Situational Awareness]
| |
| |-
| |
| |SaaS||[https://en.wikipedia.org/wiki/Software_as_a_service Software as a Service]
| |
| |-
| |
| |SAS||[https://cmmcwiki.org/index.php/Model_Glossary#S Security Assessment]
| |
| |-
| |
| |SC||System and Communications Protection
| |
| |-
| |
| |SCADA||[https://en.wikipedia.org/wiki/SCADA Supervisory Control and Data Acquisition]
| |
| |-
| |
| |SCRM||[https://cmmcwiki.org/index.php/Model_Glossary#S Supply Chain Risk Management] | | |SCRM||[https://cmmcwiki.org/index.php/Model_Glossary#S Supply Chain Risk Management] |
| |-
| |
| |SHA||[https://cmmcwiki.org/index.php/Model_Glossary#S Security Hash Algorithm]
| |
| |-
| |
| |SI||System and Information Integrity
| |
| |-
| |
| |SIEM||[https://en.wikipedia.org/wiki/Security_information_and_event_management Security Integration and Event Management]
| |
| |-
| |
| |SMS||[https://en.wikipedia.org/wiki/SMS Short Message Service]
| |
| |-
| |
| |SOC||[https://cmmcwiki.org/index.php/Model_Glossary#S Security Operations Center]
| |
| |- | | |- |
| |SP||Special Publication | | |SP||Special Publication |
| |-
| |
| |SPF||[https://en.wikipedia.org/wiki/Sender_Policy_Framework Sender Policy Framework]
| |
| |-
| |
| |SSC||[https://en.wikipedia.org/wiki/Transport_Layer_Security Secure Socket Layer]
| |
| |-
| |
| |SSD||[https://en.wikipedia.org/wiki/Solid-state_drive Solid-State Disk]
| |
| |-
| |
| |SSP||[https://cmmcwiki.org/index.php/Model_Glossary#S System Security Plan]
| |
| |-
| |
| |SSP||Sector Specific Plan
| |
| |}
| |
|
| |
| == T ==
| |
| {|
| |
| |TLS||[https://en.wikipedia.org/wiki/Transport_Layer_Security Transport Layer Security]
| |
| |-
| |
| |TTP||[https://en.wikipedia.org/wiki/Terrorist_Tactics,_Techniques,_and_Procedures Tactics, Techniques, and Procedures]
| |
| |}
| |
|
| |
| == U ==
| |
| {|
| |
| |U.S.||United States
| |
| |-
| |
| |UARC||[https://en.wikipedia.org/wiki/University_Affiliated_Research_Center University Affiliated Research Center]
| |
| |-
| |
| |UK||United Kingdom
| |
| |-
| |
| |UMD||[https://en.wikipedia.org/wiki/Universal_Media_Disc Universal Media Disc]
| |
| |-
| |
| |URL||[https://en.wikipedia.org/wiki/URL Uniform Resource Locator]
| |
| |-
| |
| |USB||[https://en.wikipedia.org/wiki/USB Universal Serial Bus]
| |
| |-
| |
| |UTC||[https://en.wikipedia.org/wiki/Coordinated_Universal_Time Coordinated Universal Time]
| |
| |-
| |
| |UUENCODE||[https://en.wikipedia.org/wiki/Uuencoding Unix-to-Unix Encode]
| |
| |}
| |
|
| |
| == V ==
| |
| {|
| |
| |VLAN||[https://en.wikipedia.org/wiki/Virtual_LAN Virtual Local Area Network]
| |
| |-
| |
| |VoIP||[https://en.wikipedia.org/wiki/Voice_over_IP Voice over Internet Protocol]
| |
| |-
| |
| |Vol.||Volume
| |
| |-
| |
| |VPN||[https://en.wikipedia.org/wiki/Virtual_private_network Virtual Private Network]
| |
| |}
| |
|
| |
| == W ==
| |
| {|
| |
| |WAP||[https://en.wikipedia.org/wiki/Wireless_access_point Wireless Access Point]
| |
| |-
| |
| |WPA2-PSK||[https://en.wikipedia.org/wiki/Wi-Fi_Protected_Access WiFi Protected Access-Pre-shared Key]
| |
| |}
| |
|
| |
| == X ==
| |
| {|
| |
| |xD||[https://en.wikipedia.org/wiki/XD-Picture_Card Extreme Digital] (flash memory card device)
| |
| |} | | |} |