CSF Acronyms

From CMMC Toolkit Wiki
Revision as of 20:09, 9 April 2023 by Wikiadmin (talk | contribs) (Created page with "'''Source of Reference: official [https://www.nist.gov/cyberframework/online-learning/components-framework Cybersecurity Framework Components] from National Institute of Standards and Technology (NIST).''' For inquiries and reporting errors on this wiki, please [mailto:support@cmmctoolkit.org contact us]. Thank you. == A == {| |ANSI||American National Standards Institute |} == C == {| |CEA||Cybersecurity Enhancement Act of 2014 |- CIS||Center for Internet Security |-...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

Source of Reference: official Cybersecurity Framework Components from National Institute of Standards and Technology (NIST).

For inquiries and reporting errors on this wiki, please contact us. Thank you.

A

ANSI American National Standards Institute

C

CIS||Center for Internet Security
CEA Cybersecurity Enhancement Act of 2014
COBIT Control Objectives for Information and Related Technology
CPS Cyber-Physical Systems
CSC Critical Security Control

D

DHS Department of Homeland Security

E

EO Executive Order

F

FAQ Frequently Asked Question
FAR Federal Acquisition Regulation
FBI Federal Bureau of Investigation
FCI Federal Contract Information
FDDI Fiber Distributed Data Interface
FDE Full Disk Encryption
FedRAMP Federal Risk and Authorization Management Program
FFRDC Federally Funded Research and Development Center
FIPS Federal Information Processing Standard
FTP File Transfer Protocol

G

GDPR General Data Protection Regulation

H

HIPAA Health Insurance Portability and Accountability Act
HSPD Homeland Security Presidential Directive
HTTP Hypertext Transfer Protocol
HTTPS Hypertext Transfer Protocol Secure
HVA High-Value Asset

I

IA Information Assurance
IA Identification and Authentication
IBAC Identity-Based Access Control
IC3 Internet Crime Complaint Center
ICAM Identity, Credential, and Access Management
ICS Industrial Control System
ID Identification
IDA Identification and Authentication
IDPS Intrusion Detection and Prevention Systems
IEC International Electrotechnical Commission
IETF Internet Engineering Task Force
IIoT Industrial Internet of Things
IoT Internet of Things
IP Internet Protocol
IPSec Internet Protocol Security
IR Incident Response
IS Information System
ISAC Information Sharing and Analysis Center
ISAO Information Sharing and Analysis Organization
ISCM Information Security Continuous Monitoring
ISDN Integrated Services Digital Network
ISO International Organization for Standardization
IT Information Technology
ITIL Information Technology Infrastructure Library

L

L# Level Number
LAN Local Area Network
LSI Large-Scale Integration

M

MA Maintenance
MAC Media Access Control
MC Maturity Capability
MC## Maturity Capability Number
MDM Mobile Device Management
MEP Manufacturing Extension Partnership
MFA Multifactor Authentication
ML Maturity Level
ML# Maturity Level Number
MMC Multimedia Card
MP Media Protection

N

N/A Not Applicable (NA)
NARA National Archives and Records Administration
NAS Networked Attached Storage
NAS National Aerospace Standard
NCSC National Cyber Security Centre
NIST National Institute of Standards and Technology
NISTIR NIST Interagency (or Internal) Report
NPE Non-Person Entity
NSA National Security Agency
NSA/CSS NSA Central Security Service
NSPD National Security Presidential Directive
NSTISSD National Security Telecommunications and Information Systems Security Directive
NTP Network Time Protocol
NYSSCPA New York State Society of CPAs

O

OMB Office of Management and Budget
OS Operating System
OSC Organization Seeking Certification
OT Operational Technology
OUSD A&S Office of the Under Secretary of Defense for Acquisition and Sustainment

P

PCI Personal Identity Verification Card Issuers
PDA Personal Digital Assistant
PE Physical Protection
PGP Pretty Good Privacy
PII Personally Identifiable Information
PIV Personal Identify Verification
PKI Public Key Infrastructure
PLC Programmable Logic Controller
POC Point of Contact
POTS Plain Old Telephone Service
PP Physical Protection
PPD Presidential Policy Directive
PS Personnel Security
PUB Publication

R

RADIUS Remote Authentication Dial-in User Service
RE Recovery
Rev Revision
RF Radio Frequency
RFC Request for Comments
RM Risk Management
RMM Resilience Management Model
RMM Risk Management Model
RPO Recovery Point Objectives
RTO Recovery Time Objectives

S

SA Situational Awareness
SaaS Software as a Service
SAS Security Assessment
SC System and Communications Protection
SCADA Supervisory Control and Data Acquisition
SCRM Supply Chain Risk Management
SHA Security Hash Algorithm
SI System and Information Integrity
SIEM Security Integration and Event Management
SMS Short Message Service
SOC Security Operations Center
SP Special Publication
SPF Sender Policy Framework
SSC Secure Socket Layer
SSD Solid-State Disk
SSP System Security Plan
SSP Sector Specific Plan

T

TLS Transport Layer Security
TTP Tactics, Techniques, and Procedures

U

U.S. United States
UARC University Affiliated Research Center
UK United Kingdom
UMD Universal Media Disc
URL Uniform Resource Locator
USB Universal Serial Bus
UTC Coordinated Universal Time
UUENCODE Unix-to-Unix Encode

V

VLAN Virtual Local Area Network
VoIP Voice over Internet Protocol
Vol. Volume
VPN Virtual Private Network

W

WAP Wireless Access Point
WPA2-PSK WiFi Protected Access-Pre-shared Key

X

xD Extreme Digital (flash memory card device)