CSF Acronyms: Difference between revisions
Jump to navigation
Jump to search
Created page with "'''Source of Reference: official [https://www.nist.gov/cyberframework/online-learning/components-framework Cybersecurity Framework Components] from National Institute of Standards and Technology (NIST).''' For inquiries and reporting errors on this wiki, please [mailto:support@cmmctoolkit.org contact us]. Thank you. == A == {| |ANSI||American National Standards Institute |} == C == {| |CEA||Cybersecurity Enhancement Act of 2014 |- CIS||Center for Internet Security |-..." |
No edit summary |
||
| Line 5: | Line 5: | ||
== A == | == A == | ||
{| | {| | ||
|ANSI||American National Standards Institute | |ANSI||[https://en.wikipedia.org/wiki/American_National_Standards_Institute American National Standards Institute] | ||
|} | |} | ||
== C == | == C == | ||
{| | {| | ||
|CEA||Cybersecurity Enhancement Act of 2014 | |CEA||[https://www.congress.gov/bill/113th-congress/senate-bill/1353/text Cybersecurity Enhancement Act of 2014] | ||
|- | |- | ||
CIS||Center for Internet Security | |CIS||[https://en.wikipedia.org/wiki/Center_for_Internet_Security Center for Internet Security] | ||
|- | |- | ||
|COBIT||Control Objectives for Information and Related Technology | |COBIT||[https://en.wikipedia.org/wiki/COBIT Control Objectives for Information and Related Technology] | ||
|- | |- | ||
|CPS||Cyber-Physical Systems | |CPS||[https://en.wikipedia.org/wiki/Cyber-physical_system Cyber-Physical Systems] | ||
|- | |- | ||
|CSC||Critical Security Control | |CSC||[https://en.wikipedia.org/wiki/Center_for_Internet_Security#CIS_Controls_and_CIS_Benchmarks Critical Security Control] | ||
|} | |} | ||
== D == | == D == | ||
{| | {| | ||
|DHS||Department of Homeland Security | |DHS||[https://en.wikipedia.org/wiki/United_States_Department_of_Homeland_Security Department of Homeland Security] | ||
|} | |} | ||
| Line 29: | Line 29: | ||
{| | {| | ||
|EO||[https://en.wikipedia.org/wiki/Executive_order Executive Order] | |EO||[https://en.wikipedia.org/wiki/Executive_order Executive Order] | ||
|} | |} | ||
== I == | == I == | ||
{| | {| | ||
|ICS||[https://cmmcwiki.org/index.php/Model_Glossary#I Industrial Control Systems] | |||
|ICS||[https://cmmcwiki.org/index.php/Model_Glossary#I Industrial Control | |||
|- | |- | ||
|IEC||[https://en.wikipedia.org/wiki/International_Electrotechnical_Commission International Electrotechnical Commission] | |IEC||[https://en.wikipedia.org/wiki/International_Electrotechnical_Commission International Electrotechnical Commission] | ||
|- | |- | ||
| | |IoT||[https://en.wikipedia.org/wiki/Internet_of_things Internet of Things] | ||
|- | |- | ||
| | |IR||Interagency Report | ||
|- | |- | ||
| | |ISA||[https://en.wikipedia.org/wiki/International_Society_of_Automation International Society of Automation] | ||
|- | |- | ||
|ISAC||[https://en.wikipedia.org/wiki/Information_Sharing_and_Analysis_Center Information Sharing and Analysis Center] | |ISAC||[https://en.wikipedia.org/wiki/Information_Sharing_and_Analysis_Center Information Sharing and Analysis Center] | ||
|- | |- | ||
|ISAO||Information Sharing and Analysis Organization | |ISAO||Information Sharing and Analysis Organization | ||
|- | |- | ||
|ISO||[https://en.wikipedia.org/wiki/International_Organization_for_Standardization International Organization for Standardization] | |ISO||[https://en.wikipedia.org/wiki/International_Organization_for_Standardization International Organization for Standardization] | ||
|- | |- | ||
|IT||[https://en.wikipedia.org/wiki/Information_technology Information Technology] | |IT||[https://en.wikipedia.org/wiki/Information_technology Information Technology] | ||
|} | |} | ||
== N == | == N == | ||
{| | {| | ||
|NIST||[https://en.wikipedia.org/wiki/National_Institute_of_Standards_and_Technology National Institute of Standards and Technology] | |NIST||[https://en.wikipedia.org/wiki/National_Institute_of_Standards_and_Technology National Institute of Standards and Technology] | ||
|} | |} | ||
== O == | == O == | ||
{| | {| | ||
|OT||[https://cmmcwiki.org/index.php/Model_Glossary#O Operational Technology] | |OT||[https://cmmcwiki.org/index.php/Model_Glossary#O Operational Technology] | ||
|} | |} | ||
== P == | == P == | ||
{| | {| | ||
|PII||[https://cmmcwiki.org/index.php/Model_Glossary#P Personally Identifiable Information] | |PII||[https://cmmcwiki.org/index.php/Model_Glossary#P Personally Identifiable Information] | ||
|} | |} | ||
Revision as of 20:25, 9 April 2023
Source of Reference: official Cybersecurity Framework Components from National Institute of Standards and Technology (NIST).
For inquiries and reporting errors on this wiki, please contact us. Thank you.
A
| ANSI | American National Standards Institute |
C
| CEA | Cybersecurity Enhancement Act of 2014 |
| CIS | Center for Internet Security |
| COBIT | Control Objectives for Information and Related Technology |
| CPS | Cyber-Physical Systems |
| CSC | Critical Security Control |
D
| DHS | Department of Homeland Security |
E
| EO | Executive Order |
I
| ICS | Industrial Control Systems |
| IEC | International Electrotechnical Commission |
| IoT | Internet of Things |
| IR | Interagency Report |
| ISA | International Society of Automation |
| ISAC | Information Sharing and Analysis Center |
| ISAO | Information Sharing and Analysis Organization |
| ISO | International Organization for Standardization |
| IT | Information Technology |
N
| NIST | National Institute of Standards and Technology |
O
| OT | Operational Technology |
P
| PII | Personally Identifiable Information |
R
| RADIUS | Remote Authentication Dial-in User Service |
| RE | Recovery |
| Rev | Revision |
| RF | Radio Frequency |
| RFC | Request for Comments |
| RM | Risk Management |
| RMM | Resilience Management Model |
| RMM | Risk Management Model |
| RPO | Recovery Point Objectives |
| RTO | Recovery Time Objectives |
S
| SA | Situational Awareness |
| SaaS | Software as a Service |
| SAS | Security Assessment |
| SC | System and Communications Protection |
| SCADA | Supervisory Control and Data Acquisition |
| SCRM | Supply Chain Risk Management |
| SHA | Security Hash Algorithm |
| SI | System and Information Integrity |
| SIEM | Security Integration and Event Management |
| SMS | Short Message Service |
| SOC | Security Operations Center |
| SP | Special Publication |
| SPF | Sender Policy Framework |
| SSC | Secure Socket Layer |
| SSD | Solid-State Disk |
| SSP | System Security Plan |
| SSP | Sector Specific Plan |
T
| TLS | Transport Layer Security |
| TTP | Tactics, Techniques, and Procedures |
U
| U.S. | United States |
| UARC | University Affiliated Research Center |
| UK | United Kingdom |
| UMD | Universal Media Disc |
| URL | Uniform Resource Locator |
| USB | Universal Serial Bus |
| UTC | Coordinated Universal Time |
| UUENCODE | Unix-to-Unix Encode |
V
| VLAN | Virtual Local Area Network |
| VoIP | Voice over Internet Protocol |
| Vol. | Volume |
| VPN | Virtual Private Network |
W
| WAP | Wireless Access Point |
| WPA2-PSK | WiFi Protected Access-Pre-shared Key |
X
| xD | Extreme Digital (flash memory card device) |