Acronyms and Abbreviations

From CMMC Toolkit Wiki
Revision as of 03:57, 20 February 2022 by Wikiadmin (talk | contribs) (Created page with "== A == {| |AA||Audit and Accountability |- |ABAC||Attribute-Based Access Control |- |AC||Access Control |- |ACSC||Australian Cyber Security Centre |- |AES||Advanced Encryption Standard |- |AIA||Aerospace Industries Association |- |AM||Asset Management |- |API||Application Programming Interface |- |APT||Advanced Persistent Threat |- |AT||Awareness and Training |- |AU||Audit and Accountability |} == B == {| |BYOD||Bring Your Own Device |} == C == {| |C2M2||Cybersecurity...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

A

AA Audit and Accountability
ABAC Attribute-Based Access Control
AC Access Control
ACSC Australian Cyber Security Centre
AES Advanced Encryption Standard
AIA Aerospace Industries Association
AM Asset Management
API Application Programming Interface
APT Advanced Persistent Threat
AT Awareness and Training
AU Audit and Accountability

B

BYOD Bring Your Own Device

C

CI CIO CIS CIS CISA CM CMMC CNSSD CNSSI CMMC Glossary and Acronyms  Version 2.0 COMSEC CPI CSF CSIS CSP CTI CUI CVE CVMP CWE D/A DCISE DCS DD DFARS DHC DIB DKIM DMARC DNS DNSSEC DoD DoDI DPCI DVD E.O. eSATA ESP FAQ FAR FBI FCI FDDI FDE FedRAMP CMMC Glossary and Acronyms  Version 2.0 FTP GDPR HIPAA HTTP HTTPS HVA IA IA IBAC IC3 ICAM ICS ID IDA IDPS IEC IETF IIoT IoT IP IPSec IR IS ISAC ISAO ISCM ISDN ISO IT ITIL L# LAN LSI Acronyms and Abbreviations CMMC Glossary and Acronyms  Version 2.0 MA MAC MC MC## MDM MEP MFA ML ML# MMC MP N/A NARA NAS NAS NCSC NIST NISTIR NPE NSA NSA/CSS NSPD NSTISSD NYSSCPA OMB OS OSC OT OUSD A&S PCI PDA PE PGP PII PIV CMMC Glossary and Acronyms  Version 2.0 PLC POC POTS PP PPD PS PUB RADIUS Rev RF RFC RM RMM RMM RPO RTO SA SaaS SAS SC SHA SI SIEM SOC SP SPF SSC SSD SSP SSP TLS Acronyms and Abbreviations CMMC Glossary and Acronyms  Version 2.0 U.S. UARC UK UMD URL USB UTC UUENCODE VLAN VoIP Vol. VPN WAP WPA2-PSK xD
C2M2 Cybersecurity Capability Maturity Model
C3PAO CMMC Third-Party Assessment Organization
CA Security Assessment
CD-ROM Compact Disc Read-Only Memory
CDI Covered Defense Information
CDI Covered Defense Information
CEA Council of Economic Advisers
CERT Computer Emergency Response Team
CERT RMM CERT® Resilience Management Model
CFR Code of Federal Regulations
Configuration Item
Chief Information Officer
Computer Information System
Center for Internet Security
Cybersecurity and Infrastructure Security Agency
Configuration Management
Cybersecurity Maturity Model Certification
Committee on National Security Systems Directive
Committee on National Security Systems Instructions
30  

Acronyms and Abbreviations

Communications Security
Critical Program Information
Cybersecurity Framework
Center for Strategic and International Studies
Credential Service Provider
Controlled Technical Information
Controlled Unclassified Information
Common Vulnerabilities and Exposures
Cryptographic Module Validation Program
Common Weakness Enumeration
Department/Agency
DIB Collaborative Information Sharing Environment
Distributed Control System
Represents any two-character CMMC Domain acronym
Defense Federal Acquisition Regulation Supplement
Device Health Check
Defense Industrial Base
Domain Key Identified Mail
Domain-based Message Authentication, Reporting, and Conformance DMZ Demilitarized Zone
Domain Name System
Domain Name System Security
Department of Defense
Department of Defense Instruction
Derived PIV Credential Issuers
Digital Versatile Disc
Executive Order
External Serial Advanced Technology Attachment
External Service Provider
Frequently Asked Question
Federal Acquisition Regulation
Federal Bureau of Investigation
Federal Contract Information
Fiber Distributed Data Interface
Full Disk Encryption
Federal Risk and Authorization Management Program
31  



FFRDC

Federally Funded Research and Development Center FIPS Federal Information Processing Standard
File Transfer Protocol
General Data Protection Regulation
Health Insurance Portability and Accountability Act HSPD Homeland Security Presidential Directive
Hypertext Transfer Protocol
Hypertext Transfer Protocol Secure
High-Value Asset
Information Assurance
Identification and Authentication
Identity-Based Access Control
Internet Crime Complaint Center
Identity, Credential, and Access Management
Industrial Control System
Identification
Identification and Authentication
Intrusion Detection and Prevention Systems
International Electrotechnical Commission
Internet Engineering Task Force
Industrial Internet of Things
Internet of Things
Internet Protocol
Internet Protocol Security
Incident Response
Information System
Information Sharing and Analysis Center
Information Sharing and Analysis Organization
Information Security Continuous Monitoring
Integrated Services Digital Network
International Organization for Standardization
Information Technology
Information Technology Infrastructure Library
Level Number
Local Area Network
Large-Scale Integration
32  

Acronyms and Abbreviations

Maintenance
Media Access Control
Maturity Capability
Maturity Capability Number
Mobile Device Management
Manufacturing Extension Partnership
Multifactor Authentication
Maturity Level
Maturity Level Number
Multimedia Card
Media Protection
Not Applicable (NA)
National Archives and Records Administration
Networked Attached Storage
National Aerospace Standard
National Cyber Security Centre
National Institute of Standards and Technology
NIST Interagency (or Internal) Report
Non-Person Entity
National Security Agency
NSA Central Security Service
National Security Presidential Directive
National Security Telecommunications and Information Systems Security Directive NTP Network Time Protocol
New York State Society of CPAs
Office of Management and Budget
Operating System
Organization Seeking Certification
Operational Technology
Office of the Under Secretary of Defense for Acquisition and Sustainment
Personal Identity Verification Card Issuers
Personal Digital Assistant
Physical Protection
Pretty Good Privacy
Personally Identifiable Information
Personal Identify Verification
33  



PKI

Public Key Infrastructure
Programmable Logic Controller
Point of Contact
Plain Old Telephone Service
Physical Protection
Presidential Policy Directive
Personnel Security
Publication
Remote Authentication Dial-in User Service RE Recovery
Revision
Radio Frequency
Request for Comments
Risk Management
Resilience Management Model
Risk Management Model
Recovery Point Objectives
Recovery Time Objectives
Situational Awareness
Software as a Service
Security Assessment
System and Communications Protection SCADA Supervisory Control and Data Acquisition SCRM Supply Chain Risk Management
Security Hash Algorithm
System and Information Integrity
Security Integration and Event Management SMS Short Message Service
Security Operations Center
Special Publication
Sender Policy Framework
Secure Socket Layer
Solid-State Disk
System Security Plan
Sector Specific Plan
Transport Layer Security
34  



TTP

Tactics, Techniques, and Procedures
United States
University Affiliated Research Center
United Kingdom
Universal Media Disc
Uniform Resource Locator
Universal Serial Bus
Coordinated Universal Time
Unix-to-Unix Encode
Virtual Local Area Network
Voice over Internet Protocol
Volume
Virtual Private Network
Wireless Access Point
WiFi Protected Access-Pre-shared Key
Extreme Digital (flash memory card device)