CSF Acronyms: Difference between revisions
Jump to navigation
Jump to search
(Created page with "'''Source of Reference: official [https://www.nist.gov/cyberframework/online-learning/components-framework Cybersecurity Framework Components] from National Institute of Standards and Technology (NIST).''' For inquiries and reporting errors on this wiki, please [mailto:support@cmmctoolkit.org contact us]. Thank you. == A == {| |ANSI||American National Standards Institute |} == C == {| |CEA||Cybersecurity Enhancement Act of 2014 |- CIS||Center for Internet Security |-...") |
No edit summary |
||
Line 5: | Line 5: | ||
== A == | == A == | ||
{| | {| | ||
|ANSI||American National Standards Institute | |ANSI||[https://en.wikipedia.org/wiki/American_National_Standards_Institute American National Standards Institute] | ||
|} | |} | ||
== C == | == C == | ||
{| | {| | ||
|CEA||Cybersecurity Enhancement Act of 2014 | |CEA||[https://www.congress.gov/bill/113th-congress/senate-bill/1353/text Cybersecurity Enhancement Act of 2014] | ||
|- | |- | ||
CIS||Center for Internet Security | |CIS||[https://en.wikipedia.org/wiki/Center_for_Internet_Security Center for Internet Security] | ||
|- | |- | ||
|COBIT||Control Objectives for Information and Related Technology | |COBIT||[https://en.wikipedia.org/wiki/COBIT Control Objectives for Information and Related Technology] | ||
|- | |- | ||
|CPS||Cyber-Physical Systems | |CPS||[https://en.wikipedia.org/wiki/Cyber-physical_system Cyber-Physical Systems] | ||
|- | |- | ||
|CSC||Critical Security Control | |CSC||[https://en.wikipedia.org/wiki/Center_for_Internet_Security#CIS_Controls_and_CIS_Benchmarks Critical Security Control] | ||
|} | |} | ||
== D == | == D == | ||
{| | {| | ||
|DHS||Department of Homeland Security | |DHS||[https://en.wikipedia.org/wiki/United_States_Department_of_Homeland_Security Department of Homeland Security] | ||
|} | |} | ||
Line 29: | Line 29: | ||
{| | {| | ||
|EO||[https://en.wikipedia.org/wiki/Executive_order Executive Order] | |EO||[https://en.wikipedia.org/wiki/Executive_order Executive Order] | ||
|} | |} | ||
== I == | == I == | ||
{| | {| | ||
|ICS||[https://cmmcwiki.org/index.php/Model_Glossary#I Industrial Control Systems] | |||
|ICS||[https://cmmcwiki.org/index.php/Model_Glossary#I Industrial Control | |||
|- | |- | ||
|IEC||[https://en.wikipedia.org/wiki/International_Electrotechnical_Commission International Electrotechnical Commission] | |IEC||[https://en.wikipedia.org/wiki/International_Electrotechnical_Commission International Electrotechnical Commission] | ||
|- | |- | ||
| | |IoT||[https://en.wikipedia.org/wiki/Internet_of_things Internet of Things] | ||
|- | |- | ||
| | |IR||Interagency Report | ||
|- | |- | ||
| | |ISA||[https://en.wikipedia.org/wiki/International_Society_of_Automation International Society of Automation] | ||
|- | |- | ||
|ISAC||[https://en.wikipedia.org/wiki/Information_Sharing_and_Analysis_Center Information Sharing and Analysis Center] | |ISAC||[https://en.wikipedia.org/wiki/Information_Sharing_and_Analysis_Center Information Sharing and Analysis Center] | ||
|- | |- | ||
|ISAO||Information Sharing and Analysis Organization | |ISAO||Information Sharing and Analysis Organization | ||
|- | |- | ||
|ISO||[https://en.wikipedia.org/wiki/International_Organization_for_Standardization International Organization for Standardization] | |ISO||[https://en.wikipedia.org/wiki/International_Organization_for_Standardization International Organization for Standardization] | ||
|- | |- | ||
|IT||[https://en.wikipedia.org/wiki/Information_technology Information Technology] | |IT||[https://en.wikipedia.org/wiki/Information_technology Information Technology] | ||
|} | |} | ||
== N == | == N == | ||
{| | {| | ||
|NIST||[https://en.wikipedia.org/wiki/National_Institute_of_Standards_and_Technology National Institute of Standards and Technology] | |NIST||[https://en.wikipedia.org/wiki/National_Institute_of_Standards_and_Technology National Institute of Standards and Technology] | ||
|} | |} | ||
== O == | == O == | ||
{| | {| | ||
|OT||[https://cmmcwiki.org/index.php/Model_Glossary#O Operational Technology] | |OT||[https://cmmcwiki.org/index.php/Model_Glossary#O Operational Technology] | ||
|} | |} | ||
== P == | == P == | ||
{| | {| | ||
|PII||[https://cmmcwiki.org/index.php/Model_Glossary#P Personally Identifiable Information] | |PII||[https://cmmcwiki.org/index.php/Model_Glossary#P Personally Identifiable Information] | ||
|} | |} | ||
Revision as of 20:25, 9 April 2023
Source of Reference: official Cybersecurity Framework Components from National Institute of Standards and Technology (NIST).
For inquiries and reporting errors on this wiki, please contact us. Thank you.
A
ANSI | American National Standards Institute |
C
CEA | Cybersecurity Enhancement Act of 2014 |
CIS | Center for Internet Security |
COBIT | Control Objectives for Information and Related Technology |
CPS | Cyber-Physical Systems |
CSC | Critical Security Control |
D
DHS | Department of Homeland Security |
E
EO | Executive Order |
I
ICS | Industrial Control Systems |
IEC | International Electrotechnical Commission |
IoT | Internet of Things |
IR | Interagency Report |
ISA | International Society of Automation |
ISAC | Information Sharing and Analysis Center |
ISAO | Information Sharing and Analysis Organization |
ISO | International Organization for Standardization |
IT | Information Technology |
N
NIST | National Institute of Standards and Technology |
O
OT | Operational Technology |
P
PII | Personally Identifiable Information |
R
RADIUS | Remote Authentication Dial-in User Service |
RE | Recovery |
Rev | Revision |
RF | Radio Frequency |
RFC | Request for Comments |
RM | Risk Management |
RMM | Resilience Management Model |
RMM | Risk Management Model |
RPO | Recovery Point Objectives |
RTO | Recovery Time Objectives |
S
SA | Situational Awareness |
SaaS | Software as a Service |
SAS | Security Assessment |
SC | System and Communications Protection |
SCADA | Supervisory Control and Data Acquisition |
SCRM | Supply Chain Risk Management |
SHA | Security Hash Algorithm |
SI | System and Information Integrity |
SIEM | Security Integration and Event Management |
SMS | Short Message Service |
SOC | Security Operations Center |
SP | Special Publication |
SPF | Sender Policy Framework |
SSC | Secure Socket Layer |
SSD | Solid-State Disk |
SSP | System Security Plan |
SSP | Sector Specific Plan |
T
TLS | Transport Layer Security |
TTP | Tactics, Techniques, and Procedures |
U
U.S. | United States |
UARC | University Affiliated Research Center |
UK | United Kingdom |
UMD | Universal Media Disc |
URL | Uniform Resource Locator |
USB | Universal Serial Bus |
UTC | Coordinated Universal Time |
UUENCODE | Unix-to-Unix Encode |
V
VLAN | Virtual Local Area Network |
VoIP | Voice over Internet Protocol |
Vol. | Volume |
VPN | Virtual Private Network |
W
WAP | Wireless Access Point |
WPA2-PSK | WiFi Protected Access-Pre-shared Key |
X
xD | Extreme Digital (flash memory card device) |