CSF Acronyms: Difference between revisions

From CMMC Toolkit Wiki
Jump to navigation Jump to search
(Created page with "'''Source of Reference: official [https://www.nist.gov/cyberframework/online-learning/components-framework Cybersecurity Framework Components] from National Institute of Standards and Technology (NIST).''' For inquiries and reporting errors on this wiki, please [mailto:support@cmmctoolkit.org contact us]. Thank you. == A == {| |ANSI||American National Standards Institute |} == C == {| |CEA||Cybersecurity Enhancement Act of 2014 |- CIS||Center for Internet Security |-...")
 
No edit summary
Line 5: Line 5:
== A ==
== A ==
{|
{|
|ANSI||American National Standards Institute
|ANSI||[https://en.wikipedia.org/wiki/American_National_Standards_Institute American National Standards Institute]
|}
|}


== C ==
== C ==
{|
{|
|CEA||Cybersecurity Enhancement Act of 2014
|CEA||[https://www.congress.gov/bill/113th-congress/senate-bill/1353/text Cybersecurity Enhancement Act of 2014]
|-
|-
CIS||Center for Internet Security
|CIS||[https://en.wikipedia.org/wiki/Center_for_Internet_Security Center for Internet Security]
|-
|-
|COBIT||Control Objectives for Information and Related Technology
|COBIT||[https://en.wikipedia.org/wiki/COBIT Control Objectives for Information and Related Technology]
|-
|-
|CPS||Cyber-Physical Systems
|CPS||[https://en.wikipedia.org/wiki/Cyber-physical_system Cyber-Physical Systems]
|-
|-
|CSC||Critical Security Control
|CSC||[https://en.wikipedia.org/wiki/Center_for_Internet_Security#CIS_Controls_and_CIS_Benchmarks Critical Security Control]
|}
|}


== D ==
== D ==
{|
{|
|DHS||Department of Homeland Security
|DHS||[https://en.wikipedia.org/wiki/United_States_Department_of_Homeland_Security Department of Homeland Security]
|}
|}


Line 29: Line 29:
{|
{|
|EO||[https://en.wikipedia.org/wiki/Executive_order Executive Order]
|EO||[https://en.wikipedia.org/wiki/Executive_order Executive Order]
|}
== F ==
{|
|FAQ||[https://en.wikipedia.org/wiki/FAQ Frequently Asked Question]
|-
|FAR||[https://en.wikipedia.org/wiki/Federal_Acquisition_Regulation Federal Acquisition Regulation]
|-
|FBI||[https://en.wikipedia.org/wiki/Federal_Bureau_of_Investigation Federal Bureau of Investigation]
|-
|FCI||[https://cmmcwiki.org/index.php/Model_Glossary#F Federal Contract Information]
|-
|FDDI||[https://en.wikipedia.org/wiki/Fiber_Distributed_Data_Interface Fiber Distributed Data Interface]
|-
|FDE||[https://en.wikipedia.org/wiki/Disk_encryption Full Disk Encryption]
|-
|FedRAMP||[https://en.wikipedia.org/wiki/FedRAMP Federal Risk and Authorization Management Program]
|-
|FFRDC||[https://en.wikipedia.org/wiki/Federally_funded_research_and_development_centers Federally Funded Research and Development Center]
|-
|FIPS||[https://en.wikipedia.org/wiki/Federal_Information_Processing_Standards Federal Information Processing Standard]
|-
|FTP||[https://en.wikipedia.org/wiki/File_Transfer_Protocol File Transfer Protocol]
|}
== G ==
{|
|GDPR||[https://en.wikipedia.org/wiki/General_Data_Protection_Regulation General Data Protection Regulation]
|}
== H ==
{|
|HIPAA||[https://en.wikipedia.org/wiki/Health_Insurance_Portability_and_Accountability_Act Health Insurance Portability and Accountability Act]
|-
|HSPD||[https://en.wikipedia.org/wiki/Presidential_directive#Homeland_Security_Presidential_Directive Homeland Security Presidential Directive]
|-
|HTTP||[https://en.wikipedia.org/wiki/Hypertext_Transfer_Protocol Hypertext Transfer Protocol]
|-
|HTTPS||[https://en.wikipedia.org/wiki/HTTPS Hypertext Transfer Protocol Secure]
|-
|HVA||[https://cmmcwiki.org/index.php/Model_Glossary#H High-Value Asset]
|}
|}


== I ==
== I ==
{|
{|
|IA||[https://en.wikipedia.org/wiki/Information_assurance Information Assurance]
|ICS||[https://cmmcwiki.org/index.php/Model_Glossary#I Industrial Control Systems]
|-
|IA||Identification and Authentication
|-
|IBAC||[https://cmmcwiki.org/index.php/Model_Glossary#I Identity-Based Access Control]
|-
|IC3||[https://en.wikipedia.org/wiki/Internet_Crime_Complaint_Center Internet Crime Complaint Center]
|-
|ICAM||[https://cmmcwiki.org/index.php/Model_Glossary#I Identity, Credential, and Access Management]
|-
|ICS||[https://cmmcwiki.org/index.php/Model_Glossary#I Industrial Control System]
|-
|ID||[https://cmmcwiki.org/index.php/Model_Glossary#I Identification]
|-
|IDA||Identification and Authentication
|-
|IDPS||[https://en.wikipedia.org/wiki/Intrusion_detection_system Intrusion Detection and Prevention Systems]
|-
|-
|IEC||[https://en.wikipedia.org/wiki/International_Electrotechnical_Commission International Electrotechnical Commission]
|IEC||[https://en.wikipedia.org/wiki/International_Electrotechnical_Commission International Electrotechnical Commission]
|-
|-
|IETF||[https://en.wikipedia.org/wiki/Internet_Engineering_Task_Force Internet Engineering Task Force]
|IoT||[https://en.wikipedia.org/wiki/Internet_of_things Internet of Things]
|-
|-
|IIoT||[https://cmmcwiki.org/index.php/Model_Glossary#I Industrial Internet of Things]
|IR||Interagency Report
|-
|-
|IoT||[https://cmmcwiki.org/index.php/Model_Glossary#I Internet of Things]
|ISA||[https://en.wikipedia.org/wiki/International_Society_of_Automation International Society of Automation]
|-
|IP||[https://en.wikipedia.org/wiki/Internet_Protocol Internet Protocol]
|-
|IPSec||[https://en.wikipedia.org/wiki/IPsec Internet Protocol Security]
|-
|IR||[https://cmmcwiki.org/index.php/Model_Glossary#I Incident Response]
|-
|IS||[https://cmmcwiki.org/index.php/Model_Glossary#I Information System]
|-
|-
|ISAC||[https://en.wikipedia.org/wiki/Information_Sharing_and_Analysis_Center Information Sharing and Analysis Center]
|ISAC||[https://en.wikipedia.org/wiki/Information_Sharing_and_Analysis_Center Information Sharing and Analysis Center]
|-
|-
|ISAO||Information Sharing and Analysis Organization
|ISAO||Information Sharing and Analysis Organization
|-
|ISCM||Information Security Continuous Monitoring
|-
|ISDN||[https://en.wikipedia.org/wiki/Integrated_Services_Digital_Network Integrated Services Digital Network]
|-
|-
|ISO||[https://en.wikipedia.org/wiki/International_Organization_for_Standardization International Organization for Standardization]
|ISO||[https://en.wikipedia.org/wiki/International_Organization_for_Standardization International Organization for Standardization]
|-
|-
|IT||[https://en.wikipedia.org/wiki/Information_technology Information Technology]
|IT||[https://en.wikipedia.org/wiki/Information_technology Information Technology]
|-
|ITIL||[https://en.wikipedia.org/wiki/ITIL Information Technology Infrastructure Library]
|}
== L ==
{|
|L#||Level Number
|-
|LAN||[https://en.wikipedia.org/wiki/Local_area_network Local Area Network]
|-
|LSI||[https://en.wikipedia.org/wiki/Integrated_circuit#LSI Large-Scale Integration]
|}
== M ==
{|
|MA||[https://cmmcwiki.org/index.php/Model_Glossary#M Maintenance]
|-
|MAC||[https://en.wikipedia.org/wiki/Medium_access_control Media Access Control]
|-
|MC||Maturity Capability
|-
|MC##||Maturity Capability Number
|-
|MDM||[https://en.wikipedia.org/wiki/Mobile_device_management Mobile Device Management]
|-
|MEP||[https://en.wikipedia.org/wiki/National_Institute_of_Standards_and_Technology#MEP Manufacturing Extension Partnership]
|-
|MFA||[https://cmmcwiki.org/index.php/Model_Glossary#M Multifactor Authentication]
|-
|ML||Maturity Level
|-
|ML#||Maturity Level Number
|-
|MMC||[https://en.wikipedia.org/wiki/MultiMediaCard Multimedia Card]
|-
|MP||Media Protection
|}
|}


== N ==
== N ==
{|
{|
|N/A||Not Applicable (NA)
|-
|NARA||[https://en.wikipedia.org/wiki/National_Archives_and_Records_Administration National Archives and Records Administration]
|-
|NAS||[https://en.wikipedia.org/wiki/Network-attached_storage Networked Attached Storage]
|-
|NAS||National Aerospace Standard
|-
|NCSC||[https://en.wikipedia.org/wiki/National_Cyber_Security_Centre National Cyber Security Centre]
|-
|NIST||[https://en.wikipedia.org/wiki/National_Institute_of_Standards_and_Technology National Institute of Standards and Technology]
|NIST||[https://en.wikipedia.org/wiki/National_Institute_of_Standards_and_Technology National Institute of Standards and Technology]
|-
|NISTIR||NIST Interagency (or Internal) Report
|-
|NPE||Non-Person Entity
|-
|NSA||[https://en.wikipedia.org/wiki/National_Security_Agency National Security Agency]
|-
|NSA/CSS||NSA Central Security Service
|-
|NSPD||[https://en.wikipedia.org/wiki/National_security_directive National Security Presidential Directive]
|-
|NSTISSD||National Security Telecommunications and Information Systems Security Directive
|-
|NTP||[https://en.wikipedia.org/wiki/Network_Time_Protocol Network Time Protocol]
|-
|NYSSCPA||New York State Society of CPAs
|}
|}


== O ==
== O ==
{|
{|
|OMB||[https://en.wikipedia.org/wiki/Office_of_Management_and_Budget Office of Management and Budget]
|-
|OS||[https://en.wikipedia.org/wiki/Operating_system Operating System]
|-
|OSC||[https://cmmcwiki.org/index.php/Model_Glossary#O Organization Seeking Certification]
|-
|OT||[https://cmmcwiki.org/index.php/Model_Glossary#O Operational Technology]
|OT||[https://cmmcwiki.org/index.php/Model_Glossary#O Operational Technology]
|-
|OUSD A&S||[https://en.wikipedia.org/wiki/Under_Secretary_of_Defense_for_Acquisition_and_Sustainment Office of the Under Secretary of Defense for Acquisition and Sustainment]
|}
|}


== P ==
== P ==
{|
{|
|PCI||Personal Identity Verification Card Issuers
|-
|PDA||[https://en.wikipedia.org/wiki/Personal_digital_assistant Personal Digital Assistant]
|-
|PE||Physical Protection
|-
|PGP||[https://en.wikipedia.org/wiki/Pretty_Good_Privacy Pretty Good Privacy]
|-
|PII||[https://cmmcwiki.org/index.php/Model_Glossary#P Personally Identifiable Information]
|PII||[https://cmmcwiki.org/index.php/Model_Glossary#P Personally Identifiable Information]
|-
|PIV||Personal Identify Verification
|-
|PKI||[https://en.wikipedia.org/wiki/Public_key_infrastructure Public Key Infrastructure]
|-
|PLC||[https://en.wikipedia.org/wiki/Programmable_logic_controller Programmable Logic Controller]
|-
|POC||[https://en.wikipedia.org/wiki/Point_of_contact Point of Contact]
|-
|POTS||[https://en.wikipedia.org/wiki/Plain_old_telephone_service Plain Old Telephone Service]
|-
|PP||Physical Protection
|-
|PPD||[https://en.wikipedia.org/wiki/National_security_directive Presidential Policy Directive]
|-
|PS||Personnel Security
|-
|PUB||[https://en.wikipedia.org/wiki/Publication Publication]
|}
|}



Revision as of 20:25, 9 April 2023

Source of Reference: official Cybersecurity Framework Components from National Institute of Standards and Technology (NIST).

For inquiries and reporting errors on this wiki, please contact us. Thank you.

A

ANSI American National Standards Institute

C

CEA Cybersecurity Enhancement Act of 2014
CIS Center for Internet Security
COBIT Control Objectives for Information and Related Technology
CPS Cyber-Physical Systems
CSC Critical Security Control

D

DHS Department of Homeland Security

E

EO Executive Order

I

ICS Industrial Control Systems
IEC International Electrotechnical Commission
IoT Internet of Things
IR Interagency Report
ISA International Society of Automation
ISAC Information Sharing and Analysis Center
ISAO Information Sharing and Analysis Organization
ISO International Organization for Standardization
IT Information Technology

N

NIST National Institute of Standards and Technology

O

OT Operational Technology

P

PII Personally Identifiable Information

R

RADIUS Remote Authentication Dial-in User Service
RE Recovery
Rev Revision
RF Radio Frequency
RFC Request for Comments
RM Risk Management
RMM Resilience Management Model
RMM Risk Management Model
RPO Recovery Point Objectives
RTO Recovery Time Objectives

S

SA Situational Awareness
SaaS Software as a Service
SAS Security Assessment
SC System and Communications Protection
SCADA Supervisory Control and Data Acquisition
SCRM Supply Chain Risk Management
SHA Security Hash Algorithm
SI System and Information Integrity
SIEM Security Integration and Event Management
SMS Short Message Service
SOC Security Operations Center
SP Special Publication
SPF Sender Policy Framework
SSC Secure Socket Layer
SSD Solid-State Disk
SSP System Security Plan
SSP Sector Specific Plan

T

TLS Transport Layer Security
TTP Tactics, Techniques, and Procedures

U

U.S. United States
UARC University Affiliated Research Center
UK United Kingdom
UMD Universal Media Disc
URL Uniform Resource Locator
USB Universal Serial Bus
UTC Coordinated Universal Time
UUENCODE Unix-to-Unix Encode

V

VLAN Virtual Local Area Network
VoIP Voice over Internet Protocol
Vol. Volume
VPN Virtual Private Network

W

WAP Wireless Access Point
WPA2-PSK WiFi Protected Access-Pre-shared Key

X

xD Extreme Digital (flash memory card device)