CSF Acronyms: Difference between revisions

From CMMC Toolkit Wiki
Jump to navigation Jump to search
(Created page with "'''Source of Reference: official [https://www.nist.gov/cyberframework/online-learning/components-framework Cybersecurity Framework Components] from National Institute of Standards and Technology (NIST).''' For inquiries and reporting errors on this wiki, please [mailto:support@cmmctoolkit.org contact us]. Thank you. == A == {| |ANSI||American National Standards Institute |} == C == {| |CEA||Cybersecurity Enhancement Act of 2014 |- CIS||Center for Internet Security |-...")
 
No edit summary
 
(One intermediate revision by the same user not shown)
Line 5: Line 5:
== A ==
== A ==
{|
{|
|ANSI||American National Standards Institute
|ANSI||[https://en.wikipedia.org/wiki/American_National_Standards_Institute American National Standards Institute]
|}
|}


== C ==
== C ==
{|
{|
|CEA||Cybersecurity Enhancement Act of 2014
|CEA||[https://www.congress.gov/bill/113th-congress/senate-bill/1353/text Cybersecurity Enhancement Act of 2014]
|-
|-
CIS||Center for Internet Security
|CIS||[https://en.wikipedia.org/wiki/Center_for_Internet_Security Center for Internet Security]
|-
|-
|COBIT||Control Objectives for Information and Related Technology
|COBIT||[https://en.wikipedia.org/wiki/COBIT Control Objectives for Information and Related Technology]
|-
|-
|CPS||Cyber-Physical Systems
|CPS||[https://en.wikipedia.org/wiki/Cyber-physical_system Cyber-Physical Systems]
|-
|-
|CSC||Critical Security Control
|CSC||[https://en.wikipedia.org/wiki/Center_for_Internet_Security#CIS_Controls_and_CIS_Benchmarks Critical Security Control]
|}
|}


== D ==
== D ==
{|
{|
|DHS||Department of Homeland Security
|DHS||[https://en.wikipedia.org/wiki/United_States_Department_of_Homeland_Security Department of Homeland Security]
|}
|}


Line 29: Line 29:
{|
{|
|EO||[https://en.wikipedia.org/wiki/Executive_order Executive Order]
|EO||[https://en.wikipedia.org/wiki/Executive_order Executive Order]
|}
== F ==
{|
|FAQ||[https://en.wikipedia.org/wiki/FAQ Frequently Asked Question]
|-
|FAR||[https://en.wikipedia.org/wiki/Federal_Acquisition_Regulation Federal Acquisition Regulation]
|-
|FBI||[https://en.wikipedia.org/wiki/Federal_Bureau_of_Investigation Federal Bureau of Investigation]
|-
|FCI||[https://cmmcwiki.org/index.php/Model_Glossary#F Federal Contract Information]
|-
|FDDI||[https://en.wikipedia.org/wiki/Fiber_Distributed_Data_Interface Fiber Distributed Data Interface]
|-
|FDE||[https://en.wikipedia.org/wiki/Disk_encryption Full Disk Encryption]
|-
|FedRAMP||[https://en.wikipedia.org/wiki/FedRAMP Federal Risk and Authorization Management Program]
|-
|FFRDC||[https://en.wikipedia.org/wiki/Federally_funded_research_and_development_centers Federally Funded Research and Development Center]
|-
|FIPS||[https://en.wikipedia.org/wiki/Federal_Information_Processing_Standards Federal Information Processing Standard]
|-
|FTP||[https://en.wikipedia.org/wiki/File_Transfer_Protocol File Transfer Protocol]
|}
== G ==
{|
|GDPR||[https://en.wikipedia.org/wiki/General_Data_Protection_Regulation General Data Protection Regulation]
|}
== H ==
{|
|HIPAA||[https://en.wikipedia.org/wiki/Health_Insurance_Portability_and_Accountability_Act Health Insurance Portability and Accountability Act]
|-
|HSPD||[https://en.wikipedia.org/wiki/Presidential_directive#Homeland_Security_Presidential_Directive Homeland Security Presidential Directive]
|-
|HTTP||[https://en.wikipedia.org/wiki/Hypertext_Transfer_Protocol Hypertext Transfer Protocol]
|-
|HTTPS||[https://en.wikipedia.org/wiki/HTTPS Hypertext Transfer Protocol Secure]
|-
|HVA||[https://cmmcwiki.org/index.php/Model_Glossary#H High-Value Asset]
|}
|}


== I ==
== I ==
{|
{|
|IA||[https://en.wikipedia.org/wiki/Information_assurance Information Assurance]
|ICS||[https://cmmcwiki.org/index.php/Model_Glossary#I Industrial Control Systems]
|-
|IA||Identification and Authentication
|-
|IBAC||[https://cmmcwiki.org/index.php/Model_Glossary#I Identity-Based Access Control]
|-
|IC3||[https://en.wikipedia.org/wiki/Internet_Crime_Complaint_Center Internet Crime Complaint Center]
|-
|ICAM||[https://cmmcwiki.org/index.php/Model_Glossary#I Identity, Credential, and Access Management]
|-
|ICS||[https://cmmcwiki.org/index.php/Model_Glossary#I Industrial Control System]
|-
|ID||[https://cmmcwiki.org/index.php/Model_Glossary#I Identification]
|-
|IDA||Identification and Authentication
|-
|IDPS||[https://en.wikipedia.org/wiki/Intrusion_detection_system Intrusion Detection and Prevention Systems]
|-
|-
|IEC||[https://en.wikipedia.org/wiki/International_Electrotechnical_Commission International Electrotechnical Commission]
|IEC||[https://en.wikipedia.org/wiki/International_Electrotechnical_Commission International Electrotechnical Commission]
|-
|-
|IETF||[https://en.wikipedia.org/wiki/Internet_Engineering_Task_Force Internet Engineering Task Force]
|IoT||[https://en.wikipedia.org/wiki/Internet_of_things Internet of Things]
|-
|IIoT||[https://cmmcwiki.org/index.php/Model_Glossary#I Industrial Internet of Things]
|-
|IoT||[https://cmmcwiki.org/index.php/Model_Glossary#I Internet of Things]
|-
|IP||[https://en.wikipedia.org/wiki/Internet_Protocol Internet Protocol]
|-
|IPSec||[https://en.wikipedia.org/wiki/IPsec Internet Protocol Security]
|-
|-
|IR||[https://cmmcwiki.org/index.php/Model_Glossary#I Incident Response]
|IR||Interagency Report
|-
|-
|IS||[https://cmmcwiki.org/index.php/Model_Glossary#I Information System]
|ISA||[https://en.wikipedia.org/wiki/International_Society_of_Automation International Society of Automation]
|-
|-
|ISAC||[https://en.wikipedia.org/wiki/Information_Sharing_and_Analysis_Center Information Sharing and Analysis Center]
|ISAC||[https://en.wikipedia.org/wiki/Information_Sharing_and_Analysis_Center Information Sharing and Analysis Center]
|-
|-
|ISAO||Information Sharing and Analysis Organization
|ISAO||Information Sharing and Analysis Organization
|-
|ISCM||Information Security Continuous Monitoring
|-
|ISDN||[https://en.wikipedia.org/wiki/Integrated_Services_Digital_Network Integrated Services Digital Network]
|-
|-
|ISO||[https://en.wikipedia.org/wiki/International_Organization_for_Standardization International Organization for Standardization]
|ISO||[https://en.wikipedia.org/wiki/International_Organization_for_Standardization International Organization for Standardization]
|-
|-
|IT||[https://en.wikipedia.org/wiki/Information_technology Information Technology]
|IT||[https://en.wikipedia.org/wiki/Information_technology Information Technology]
|-
|ITIL||[https://en.wikipedia.org/wiki/ITIL Information Technology Infrastructure Library]
|}
== L ==
{|
|L#||Level Number
|-
|LAN||[https://en.wikipedia.org/wiki/Local_area_network Local Area Network]
|-
|LSI||[https://en.wikipedia.org/wiki/Integrated_circuit#LSI Large-Scale Integration]
|}
== M ==
{|
|MA||[https://cmmcwiki.org/index.php/Model_Glossary#M Maintenance]
|-
|MAC||[https://en.wikipedia.org/wiki/Medium_access_control Media Access Control]
|-
|MC||Maturity Capability
|-
|MC##||Maturity Capability Number
|-
|MDM||[https://en.wikipedia.org/wiki/Mobile_device_management Mobile Device Management]
|-
|MEP||[https://en.wikipedia.org/wiki/National_Institute_of_Standards_and_Technology#MEP Manufacturing Extension Partnership]
|-
|MFA||[https://cmmcwiki.org/index.php/Model_Glossary#M Multifactor Authentication]
|-
|ML||Maturity Level
|-
|ML#||Maturity Level Number
|-
|MMC||[https://en.wikipedia.org/wiki/MultiMediaCard Multimedia Card]
|-
|MP||Media Protection
|}
|}


== N ==
== N ==
{|
{|
|N/A||Not Applicable (NA)
|-
|NARA||[https://en.wikipedia.org/wiki/National_Archives_and_Records_Administration National Archives and Records Administration]
|-
|NAS||[https://en.wikipedia.org/wiki/Network-attached_storage Networked Attached Storage]
|-
|NAS||National Aerospace Standard
|-
|NCSC||[https://en.wikipedia.org/wiki/National_Cyber_Security_Centre National Cyber Security Centre]
|-
|NIST||[https://en.wikipedia.org/wiki/National_Institute_of_Standards_and_Technology National Institute of Standards and Technology]
|NIST||[https://en.wikipedia.org/wiki/National_Institute_of_Standards_and_Technology National Institute of Standards and Technology]
|-
|NISTIR||NIST Interagency (or Internal) Report
|-
|NPE||Non-Person Entity
|-
|NSA||[https://en.wikipedia.org/wiki/National_Security_Agency National Security Agency]
|-
|NSA/CSS||NSA Central Security Service
|-
|NSPD||[https://en.wikipedia.org/wiki/National_security_directive National Security Presidential Directive]
|-
|NSTISSD||National Security Telecommunications and Information Systems Security Directive
|-
|NTP||[https://en.wikipedia.org/wiki/Network_Time_Protocol Network Time Protocol]
|-
|NYSSCPA||New York State Society of CPAs
|}
|}


== O ==
== O ==
{|
{|
|OMB||[https://en.wikipedia.org/wiki/Office_of_Management_and_Budget Office of Management and Budget]
|-
|OS||[https://en.wikipedia.org/wiki/Operating_system Operating System]
|-
|OSC||[https://cmmcwiki.org/index.php/Model_Glossary#O Organization Seeking Certification]
|-
|OT||[https://cmmcwiki.org/index.php/Model_Glossary#O Operational Technology]
|OT||[https://cmmcwiki.org/index.php/Model_Glossary#O Operational Technology]
|-
|OUSD A&S||[https://en.wikipedia.org/wiki/Under_Secretary_of_Defense_for_Acquisition_and_Sustainment Office of the Under Secretary of Defense for Acquisition and Sustainment]
|}
|}


== P ==
== P ==
{|
{|
|PCI||Personal Identity Verification Card Issuers
|-
|PDA||[https://en.wikipedia.org/wiki/Personal_digital_assistant Personal Digital Assistant]
|-
|PE||Physical Protection
|-
|PGP||[https://en.wikipedia.org/wiki/Pretty_Good_Privacy Pretty Good Privacy]
|-
|PII||[https://cmmcwiki.org/index.php/Model_Glossary#P Personally Identifiable Information]
|PII||[https://cmmcwiki.org/index.php/Model_Glossary#P Personally Identifiable Information]
|-
|PIV||Personal Identify Verification
|-
|PKI||[https://en.wikipedia.org/wiki/Public_key_infrastructure Public Key Infrastructure]
|-
|PLC||[https://en.wikipedia.org/wiki/Programmable_logic_controller Programmable Logic Controller]
|-
|POC||[https://en.wikipedia.org/wiki/Point_of_contact Point of Contact]
|-
|POTS||[https://en.wikipedia.org/wiki/Plain_old_telephone_service Plain Old Telephone Service]
|-
|PP||Physical Protection
|-
|PPD||[https://en.wikipedia.org/wiki/National_security_directive Presidential Policy Directive]
|-
|PS||Personnel Security
|-
|PUB||[https://en.wikipedia.org/wiki/Publication Publication]
|}
|}


== R ==
== R ==
{|
{|
|RADIUS||[https://en.wikipedia.org/wiki/RADIUS Remote Authentication Dial-in User Service]
|RFI||[https://en.wikipedia.org/wiki/Request_for_information Request for Information]
|-
|RE||[https://cmmcwiki.org/index.php/Model_Glossary#R Recovery]
|-
|-
|Rev||Revision
|RMP||Risk Management Process
|-
|RF||[https://en.wikipedia.org/wiki/Radio_frequency Radio Frequency]
|-
|RFC||[https://en.wikipedia.org/wiki/Request_for_Comments Request for Comments]
|-
|RM||[https://cmmcwiki.org/index.php/Model_Glossary#R Risk Management]
|-
|RMM||Resilience Management Model
|-
|RMM||Risk Management Model
|-
|RPO||[https://en.wikipedia.org/wiki/Disaster_recovery#Recovery_Point_Objective Recovery Point Objectives]
|-
|RTO||[https://en.wikipedia.org/wiki/Disaster_recovery#Recovery_Time_Objective Recovery Time Objectives]
|}
|}


== S ==
== S ==
{|
{|
|SA||[https://cmmcwiki.org/index.php/Model_Glossary#S Situational Awareness]
|-
|SaaS||[https://en.wikipedia.org/wiki/Software_as_a_service Software as a Service]
|-
|SAS||[https://cmmcwiki.org/index.php/Model_Glossary#S Security Assessment]
|-
|SC||System and Communications Protection
|-
|SCADA||[https://en.wikipedia.org/wiki/SCADA Supervisory Control and Data Acquisition]
|-
|SCRM||[https://cmmcwiki.org/index.php/Model_Glossary#S Supply Chain Risk Management]
|SCRM||[https://cmmcwiki.org/index.php/Model_Glossary#S Supply Chain Risk Management]
|-
|SHA||[https://cmmcwiki.org/index.php/Model_Glossary#S Security Hash Algorithm]
|-
|SI||System and Information Integrity
|-
|SIEM||[https://en.wikipedia.org/wiki/Security_information_and_event_management Security Integration and Event Management]
|-
|SMS||[https://en.wikipedia.org/wiki/SMS Short Message Service]
|-
|SOC||[https://cmmcwiki.org/index.php/Model_Glossary#S Security Operations Center]
|-
|-
|SP||Special Publication
|SP||Special Publication
|-
|SPF||[https://en.wikipedia.org/wiki/Sender_Policy_Framework Sender Policy Framework]
|-
|SSC||[https://en.wikipedia.org/wiki/Transport_Layer_Security Secure Socket Layer]
|-
|SSD||[https://en.wikipedia.org/wiki/Solid-state_drive Solid-State Disk]
|-
|SSP||[https://cmmcwiki.org/index.php/Model_Glossary#S System Security Plan]
|-
|SSP||Sector Specific Plan
|}
== T ==
{|
|TLS||[https://en.wikipedia.org/wiki/Transport_Layer_Security Transport Layer Security]
|-
|TTP||[https://en.wikipedia.org/wiki/Terrorist_Tactics,_Techniques,_and_Procedures Tactics, Techniques, and Procedures]
|}
== U ==
{|
|U.S.||United States
|-
|UARC||[https://en.wikipedia.org/wiki/University_Affiliated_Research_Center University Affiliated Research Center]
|-
|UK||United Kingdom
|-
|UMD||[https://en.wikipedia.org/wiki/Universal_Media_Disc Universal Media Disc]
|-
|URL||[https://en.wikipedia.org/wiki/URL Uniform Resource Locator]
|-
|USB||[https://en.wikipedia.org/wiki/USB Universal Serial Bus]
|-
|UTC||[https://en.wikipedia.org/wiki/Coordinated_Universal_Time Coordinated Universal Time]
|-
|UUENCODE||[https://en.wikipedia.org/wiki/Uuencoding Unix-to-Unix Encode]
|}
== V ==
{|
|VLAN||[https://en.wikipedia.org/wiki/Virtual_LAN Virtual Local Area Network]
|-
|VoIP||[https://en.wikipedia.org/wiki/Voice_over_IP Voice over Internet Protocol]
|-
|Vol.||Volume
|-
|VPN||[https://en.wikipedia.org/wiki/Virtual_private_network Virtual Private Network]
|}
== W ==
{|
|WAP||[https://en.wikipedia.org/wiki/Wireless_access_point Wireless Access Point]
|-
|WPA2-PSK||[https://en.wikipedia.org/wiki/Wi-Fi_Protected_Access WiFi Protected Access-Pre-shared Key]
|}
== X ==
{|
|xD||[https://en.wikipedia.org/wiki/XD-Picture_Card Extreme Digital] (flash memory card device)
|}
|}

Latest revision as of 20:28, 9 April 2023