Acronyms and Abbreviations
Jump to navigation
Jump to search
A
AA | Audit and Accountability |
ABAC | Attribute-Based Access Control |
AC | Access Control |
ACSC | Australian Cyber Security Centre |
AES | Advanced Encryption Standard |
AIA | Aerospace Industries Association |
AM | Asset Management |
API | Application Programming Interface |
APT | Advanced Persistent Threat |
AT | Awareness and Training |
AU | Audit and Accountability |
B
BYOD | Bring Your Own Device |
C
C2M2 | Cybersecurity Capability Maturity Model |
C3PAO | CMMC Third-Party Assessment Organization |
CA | Security Assessment |
CD-ROM | Compact Disc Read-Only Memory |
CDI | Covered Defense Information |
CDI | Covered Defense Information |
CEA | Council of Economic Advisers |
CERT | Computer Emergency Response Team |
CERT RMM | CERT® Resilience Management Model |
CFR | Code of Federal Regulations |
CI | Configuration Item |
CIO | Chief Information Officer |
CIS | Computer Information System |
CIS | Center for Internet Security |
CISA | Cybersecurity and Infrastructure Security Agency |
CM | Configuration Management |
CMMC | Cybersecurity Maturity Model Certification |
CNSSD | Committee on National Security Systems Directive |
CNSSI | Committee on National Security Systems Instructions |
COMSEC | Communications Security |
CPI | Critical Program Information |
CSF | Cybersecurity Framework |
CSIS | Center for Strategic and International Studies |
CSP | Credential Service Provider |
CTI | Controlled Technical Information |
CUI | Controlled Unclassified Information |
CVE | Common Vulnerabilities and Exposures |
CVMP | Cryptographic Module Validation Program |
CWE | Common Weakness Enumeration |
D
D/A DCISE DCS DD DFARS DHC DIB DKIM DMARC DNS DNSSEC DoD DoDI DPCI DVD E.O. eSATA ESP FAQ FAR FBI FCI FDDI FDE FedRAMP CMMC Glossary and Acronyms Version 2.0 FTP GDPR HIPAA HTTP HTTPS HVA IA IA IBAC IC3 ICAM ICS ID IDA IDPS IEC IETF IIoT IoT IP IPSec IR IS ISAC ISAO ISCM ISDN ISO IT ITIL L# LAN LSI Acronyms and Abbreviations CMMC Glossary and Acronyms Version 2.0 MA MAC MC MC## MDM MEP MFA ML ML# MMC MP N/A NARA NAS NAS NCSC NIST NISTIR NPE NSA NSA/CSS NSPD NSTISSD NYSSCPA OMB OS OSC OT OUSD A&S PCI PDA PE PGP PII PIV CMMC Glossary and Acronyms Version 2.0 PLC POC POTS PP PPD PS PUB RADIUS Rev RF RFC RM RMM RMM RPO RTO SA SaaS SAS SC SHA SI SIEM SOC SP SPF SSC SSD SSP SSP TLS Acronyms and Abbreviations CMMC Glossary and Acronyms Version 2.0 U.S. UARC UK UMD URL USB UTC UUENCODE VLAN VoIP Vol. VPN WAP WPA2-PSK xDDepartment/Agency | ||
DIB Collaborative Information Sharing Environment | ||
Distributed Control System | ||
Represents any two-character CMMC Domain acronym | ||
Defense Federal Acquisition Regulation Supplement | ||
Device Health Check | ||
Defense Industrial Base | ||
Domain Key Identified Mail | ||
Domain-based Message Authentication, Reporting, and Conformance DMZ | Demilitarized Zone | |
Domain Name System | ||
Domain Name System Security | ||
Department of Defense | ||
Department of Defense Instruction | ||
Derived PIV Credential Issuers | ||
Digital Versatile Disc | ||
Executive Order | ||
External Serial Advanced Technology Attachment | ||
External Service Provider | ||
Frequently Asked Question | ||
Federal Acquisition Regulation | ||
Federal Bureau of Investigation | ||
Federal Contract Information | ||
Fiber Distributed Data Interface | ||
Full Disk Encryption | ||
Federal Risk and Authorization Management Program | ||
31
|
Federally Funded Research and Development Center FIPS | Federal Information Processing Standard |
File Transfer Protocol | ||
General Data Protection Regulation | ||
Health Insurance Portability and Accountability Act HSPD | Homeland Security Presidential Directive | |
Hypertext Transfer Protocol | ||
Hypertext Transfer Protocol Secure | ||
High-Value Asset | ||
Information Assurance | ||
Identification and Authentication | ||
Identity-Based Access Control | ||
Internet Crime Complaint Center | ||
Identity, Credential, and Access Management | ||
Industrial Control System | ||
Identification | ||
Identification and Authentication | ||
Intrusion Detection and Prevention Systems | ||
International Electrotechnical Commission | ||
Internet Engineering Task Force | ||
Industrial Internet of Things | ||
Internet of Things | ||
Internet Protocol | ||
Internet Protocol Security | ||
Incident Response | ||
Information System | ||
Information Sharing and Analysis Center | ||
Information Sharing and Analysis Organization | ||
Information Security Continuous Monitoring | ||
Integrated Services Digital Network | ||
International Organization for Standardization | ||
Information Technology | ||
Information Technology Infrastructure Library | ||
Level Number | ||
Local Area Network | ||
Large-Scale Integration | ||
32
Acronyms and Abbreviations | ||
Maintenance | ||
Media Access Control | ||
Maturity Capability | ||
Maturity Capability Number | ||
Mobile Device Management | ||
Manufacturing Extension Partnership | ||
Multifactor Authentication | ||
Maturity Level | ||
Maturity Level Number | ||
Multimedia Card | ||
Media Protection | ||
Not Applicable (NA) | ||
National Archives and Records Administration | ||
Networked Attached Storage | ||
National Aerospace Standard | ||
National Cyber Security Centre | ||
National Institute of Standards and Technology | ||
NIST Interagency (or Internal) Report | ||
Non-Person Entity | ||
National Security Agency | ||
NSA Central Security Service | ||
National Security Presidential Directive | ||
National Security Telecommunications and Information Systems Security Directive NTP | Network Time Protocol | |
New York State Society of CPAs | ||
Office of Management and Budget | ||
Operating System | ||
Organization Seeking Certification | ||
Operational Technology | ||
Office of the Under Secretary of Defense for Acquisition and Sustainment | ||
Personal Identity Verification Card Issuers | ||
Personal Digital Assistant | ||
Physical Protection | ||
Pretty Good Privacy | ||
Personally Identifiable Information | ||
Personal Identify Verification | ||
33
|
Public Key Infrastructure | |
Programmable Logic Controller | ||
Point of Contact | ||
Plain Old Telephone Service | ||
Physical Protection | ||
Presidential Policy Directive | ||
Personnel Security | ||
Publication | ||
Remote Authentication Dial-in User Service RE | Recovery | |
Revision | ||
Radio Frequency | ||
Request for Comments | ||
Risk Management | ||
Resilience Management Model | ||
Risk Management Model | ||
Recovery Point Objectives | ||
Recovery Time Objectives | ||
Situational Awareness | ||
Software as a Service | ||
Security Assessment | ||
System and Communications Protection SCADA | Supervisory Control and Data Acquisition SCRM | Supply Chain Risk Management |
Security Hash Algorithm | ||
System and Information Integrity | ||
Security Integration and Event Management SMS | Short Message Service | |
Security Operations Center | ||
Special Publication | ||
Sender Policy Framework | ||
Secure Socket Layer | ||
Solid-State Disk | ||
System Security Plan | ||
Sector Specific Plan | ||
Transport Layer Security | ||
34
|
Tactics, Techniques, and Procedures | |
United States | ||
University Affiliated Research Center | ||
United Kingdom | ||
Universal Media Disc | ||
Uniform Resource Locator | ||
Universal Serial Bus | ||
Coordinated Universal Time | ||
Unix-to-Unix Encode | ||
Virtual Local Area Network | ||
Voice over Internet Protocol | ||
Volume | ||
Virtual Private Network | ||
Wireless Access Point | ||
WiFi Protected Access-Pre-shared Key | ||
Extreme Digital (flash memory card device) |