Acronyms and Abbreviations: Difference between revisions

From CMMC Toolkit Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 1: Line 1:
'''Source of Reference: The official [https://www.acq.osd.mil/cmmc/documentation.html CMMC Glossary] from the Office of the Under Secretary of Defense Acquisition & Sustainment.'''
== A ==
== A ==
{|
{|
Line 38: Line 40:
|-
|-
|CD-ROM||Compact Disc Read-Only Memory
|CD-ROM||Compact Disc Read-Only Memory
|-
|CDI||Covered Defense Information
|-
|-
|CDI||Covered Defense Information
|CDI||Covered Defense Information
Line 92: Line 92:
== D ==
== D ==
{|
{|
D/A
|D/A||Department/Agency
|Department/Agency
|-
|-
DCISE
|DCISE||DIB Collaborative Information Sharing Environment
|DIB Collaborative Information Sharing Environment
|-
|-
DCS
|DCS||Distributed Control System
|Distributed Control System
|-
|-
DD
|DD||Represents any two-character CMMC Domain acronym
|Represents any two-character CMMC Domain acronym
|-
|-
DFARS
|DFARS||Defense Federal Acquisition Regulation Supplement
|Defense Federal Acquisition Regulation Supplement
|-
|-
DHC
|DHC||Device Health Check
|Device Health Check
|-
|-
DIB
|DIB||Defense Industrial Base
|Defense Industrial Base
|-
|-
DKIM
|DKIM||Domain Key Identified Mail
|Domain Key Identified Mail
|-
|-
DMARC
|DMARC||Domain-based Message Authentication, Reporting, and Conformance
|Domain-based Message Authentication, Reporting, and Conformance DMZ
|Demilitarized Zone
|-
|-
DNS
|DMZ||Demilitarized Zone
|Domain Name System
|-
|-
DNSSEC
|DNS||Domain Name System
|Domain Name System Security
|-
|-
DoD
|DNSSEC||Domain Name System Security
|Department of Defense
|-
|-
DoDI
|DoD||Department of Defense
|Department of Defense Instruction
|-
|-
DPCI
|DoDI||Department of Defense Instruction
|Derived PIV Credential Issuers
|-
|-
DVD
|DPCI||Derived PIV Credential Issuers
|Digital Versatile Disc
|-
|-
E.O.
|DVD||Digital Versatile Disc
|Executive Order
|}
 
== E ==
{|
|E.O.||Executive Order
|-
|-
eSATA
|eSATA||External Serial Advanced Technology Attachment
|External Serial Advanced Technology Attachment
|-
|-
ESP
|ESP||External Service Provider
|External Service Provider
|}
|-
 
FAQ
== F ==
{|
|FAQ
|Frequently Asked Question
|Frequently Asked Question
|-
|-

Revision as of 23:38, 20 February 2022

Source of Reference: The official CMMC Glossary from the Office of the Under Secretary of Defense Acquisition & Sustainment.

A

AA Audit and Accountability
ABAC Attribute-Based Access Control
AC Access Control
ACSC Australian Cyber Security Centre
AES Advanced Encryption Standard
AIA Aerospace Industries Association
AM Asset Management
API Application Programming Interface
APT Advanced Persistent Threat
AT Awareness and Training
AU Audit and Accountability

B

BYOD Bring Your Own Device

C

C2M2 Cybersecurity Capability Maturity Model
C3PAO CMMC Third-Party Assessment Organization
CA Security Assessment
CD-ROM Compact Disc Read-Only Memory
CDI Covered Defense Information
CEA Council of Economic Advisers
CERT Computer Emergency Response Team
CERT RMM CERT® Resilience Management Model
CFR Code of Federal Regulations
CI Configuration Item
CIO Chief Information Officer
CIS Computer Information System
CIS Center for Internet Security
CISA Cybersecurity and Infrastructure Security Agency
CM Configuration Management
CMMC Cybersecurity Maturity Model Certification
CNSSD Committee on National Security Systems Directive
CNSSI Committee on National Security Systems Instructions
COMSEC Communications Security
CPI Critical Program Information
CSF Cybersecurity Framework
CSIS Center for Strategic and International Studies
CSP Credential Service Provider
CTI Controlled Technical Information
CUI Controlled Unclassified Information
CVE Common Vulnerabilities and Exposures
CVMP Cryptographic Module Validation Program
CWE Common Weakness Enumeration

D

D/A Department/Agency
DCISE DIB Collaborative Information Sharing Environment
DCS Distributed Control System
DD Represents any two-character CMMC Domain acronym
DFARS Defense Federal Acquisition Regulation Supplement
DHC Device Health Check
DIB Defense Industrial Base
DKIM Domain Key Identified Mail
DMARC Domain-based Message Authentication, Reporting, and Conformance
DMZ Demilitarized Zone
DNS Domain Name System
DNSSEC Domain Name System Security
DoD Department of Defense
DoDI Department of Defense Instruction
DPCI Derived PIV Credential Issuers
DVD Digital Versatile Disc

E

E.O. Executive Order
eSATA External Serial Advanced Technology Attachment
ESP External Service Provider

F

FAR FBI FCI FDDI FDE FedRAMP CMMC Glossary and Acronyms  Version 2.0 FTP GDPR HIPAA HTTP HTTPS HVA IA IA IBAC IC3 ICAM ICS ID IDA IDPS IEC IETF IIoT IoT IP IPSec IR IS ISAC ISAO ISCM ISDN ISO IT ITIL L# LAN LSI Acronyms and Abbreviations CMMC Glossary and Acronyms  Version 2.0 MA MAC MC MC## MDM MEP MFA ML ML# MMC MP N/A NARA NAS NAS NCSC NIST NISTIR NPE NSA NSA/CSS NSPD NSTISSD NYSSCPA OMB OS OSC OT OUSD A&S PCI PDA PE PGP PII PIV CMMC Glossary and Acronyms  Version 2.0 PLC POC POTS PP PPD PS PUB RADIUS Rev RF RFC RM RMM RMM RPO RTO SA SaaS SAS SC SHA SI SIEM SOC SP SPF SSC SSD SSP SSP TLS Acronyms and Abbreviations CMMC Glossary and Acronyms  Version 2.0 U.S. UARC UK UMD URL USB UTC UUENCODE VLAN VoIP Vol. VPN WAP WPA2-PSK xD
FAQ Frequently Asked Question
Federal Acquisition Regulation
Federal Bureau of Investigation
Federal Contract Information
Fiber Distributed Data Interface
Full Disk Encryption
Federal Risk and Authorization Management Program
31  



FFRDC

Federally Funded Research and Development Center FIPS Federal Information Processing Standard
File Transfer Protocol
General Data Protection Regulation
Health Insurance Portability and Accountability Act HSPD Homeland Security Presidential Directive
Hypertext Transfer Protocol
Hypertext Transfer Protocol Secure
High-Value Asset
Information Assurance
Identification and Authentication
Identity-Based Access Control
Internet Crime Complaint Center
Identity, Credential, and Access Management
Industrial Control System
Identification
Identification and Authentication
Intrusion Detection and Prevention Systems
International Electrotechnical Commission
Internet Engineering Task Force
Industrial Internet of Things
Internet of Things
Internet Protocol
Internet Protocol Security
Incident Response
Information System
Information Sharing and Analysis Center
Information Sharing and Analysis Organization
Information Security Continuous Monitoring
Integrated Services Digital Network
International Organization for Standardization
Information Technology
Information Technology Infrastructure Library
Level Number
Local Area Network
Large-Scale Integration
32  

Acronyms and Abbreviations

Maintenance
Media Access Control
Maturity Capability
Maturity Capability Number
Mobile Device Management
Manufacturing Extension Partnership
Multifactor Authentication
Maturity Level
Maturity Level Number
Multimedia Card
Media Protection
Not Applicable (NA)
National Archives and Records Administration
Networked Attached Storage
National Aerospace Standard
National Cyber Security Centre
National Institute of Standards and Technology
NIST Interagency (or Internal) Report
Non-Person Entity
National Security Agency
NSA Central Security Service
National Security Presidential Directive
National Security Telecommunications and Information Systems Security Directive NTP Network Time Protocol
New York State Society of CPAs
Office of Management and Budget
Operating System
Organization Seeking Certification
Operational Technology
Office of the Under Secretary of Defense for Acquisition and Sustainment
Personal Identity Verification Card Issuers
Personal Digital Assistant
Physical Protection
Pretty Good Privacy
Personally Identifiable Information
Personal Identify Verification
33  



PKI

Public Key Infrastructure
Programmable Logic Controller
Point of Contact
Plain Old Telephone Service
Physical Protection
Presidential Policy Directive
Personnel Security
Publication
Remote Authentication Dial-in User Service RE Recovery
Revision
Radio Frequency
Request for Comments
Risk Management
Resilience Management Model
Risk Management Model
Recovery Point Objectives
Recovery Time Objectives
Situational Awareness
Software as a Service
Security Assessment
System and Communications Protection SCADA Supervisory Control and Data Acquisition SCRM Supply Chain Risk Management
Security Hash Algorithm
System and Information Integrity
Security Integration and Event Management SMS Short Message Service
Security Operations Center
Special Publication
Sender Policy Framework
Secure Socket Layer
Solid-State Disk
System Security Plan
Sector Specific Plan
Transport Layer Security
34  



TTP

Tactics, Techniques, and Procedures
United States
University Affiliated Research Center
United Kingdom
Universal Media Disc
Uniform Resource Locator
Universal Serial Bus
Coordinated Universal Time
Unix-to-Unix Encode
Virtual Local Area Network
Voice over Internet Protocol
Volume
Virtual Private Network
Wireless Access Point
WiFi Protected Access-Pre-shared Key
Extreme Digital (flash memory card device)