Изучая различные материалы по защите информации (статьи, документации, презентации и т.д.), каждый специалист по информационной безопасности регулярно сталкивается с различными аббревиатурами. Но бывает очень сложно запомнить все расшифровки этих акронимов. Понимая это, компания Cisco Systems, мировой лидер в области решений по информационной безопасности, разработала для всех специалистов этот документ, который включает в себя трактовку свыше 900 различных аббревиатур.
A |
AA | Attribute Authority |
AAA | Authentication, Authorization And Accounting |
AADS | Account Authority Digital Signature |
AAFID | An Architecture For Intrusion Detection |
ABA | American Bar Association |
ACC | Access Control Center |
ACE | Access Control Entry |
ACF2 | Access Control Facility 2 |
ACI | Access Control Information |
ACL | Access Control List |
ACO | Access Control Officer |
ACP | Access Control Program |
ACS | 1. Access Control Server |
| 2. Access Control System |
AD | Active Directory |
ADF | Access Control Decision Function |
ADI | Access Control Decision Information |
ADO | Access Decision Object |
AEF | Access Control Enforcement Function |
AEP | Application Environment Profile |
AES | Advanced Encryption Standard |
AFCERT | Air Force CERT |
AFIS | Automated Fingerprint Identification System |
AFIWC | Air Force Information Warfare Center |
AFRL | Air Force Research Laboratory |
AFSSI | Air Force System Security Instruction |
AFSSM | Air Force System Security Memorandum |
AH | Authentication Header |
AI | Authentication Information |
AIC | Application Inspection and Control |
AID | Adaptive Intrusion Detection system |
AICPA | American institute of certified public accountants |
AIRK | Area Interswitch Rekeying Key |
AIS | Automated Information Systems |
AISS | Automated Information Systems Security |
AISEP | Australasian Information Security Evaluation Programme |
AISSAP | Automated Information System Security Assessment Program |
AISSP | Army Information Systems Security Program |
AK | Automatic Remote Rekeying |
AKA | Authentication and Key Agreement |
AKD | Automatic Key Distribution |
AKDC | Automatic Key Distribution Center |
A-Key | Authentication Key |
AKMC | Automated Key Management Center |
AKMS | Automated Key Management System |
ALG | Application Layer/Level Gateway |
AMF | Authentication Management Field |
AMI | Authentication Management Infrastructure |
ANSA | Adaptive Network Security Alliance |
ANSMM | Adaptive Network Security Manager Module |
APAR | Authorized Program Analysis Record |
AR | Army Regulation |
ARL | Authority Revocation List |
ARPA | Advanced Research Projects Agency |
AS | 1. Authentication Server |
| 2. Authentication Service |
ASA | Adaptive Security Algorithm |
ASAX | Advanced Security Audit-trail Analysis on uniX |
ASD | Attack Signature Detection |
ASIC | Application Specific Integrated Circuit |
ASIM | Automated Security Incident Measurement |
ASIS | American Society for Industrial Security |
ASR | Access and Security Representative |
ASSIST | Automated Systems Security Incident Support Team |
AUBAD | Automated User Behavior Anomaly Detection system |
AuC | Authentication Center |
AUP | Acceptable Use Policy |
AUSCERT | Australian Computer Emergency Response Team |
AUTN | Authentication Token |
AV | Antivirus |
AVERT | Anti-Virus Emergency Response Team |
| |
C |
C2 | Command and Control |
C2W | Command and Control Warfare |
C3 | Command, control and communications |
C3I | Command, control, communications and intelligence |
C4 | Command, Control, Communications, and computers |
C4I | Command, Control, Communications, Computers, and Intelligence |
C4ISR | Command, Control, Communications, Computer Intelligence, Surveillance and Reconnaissance |
C&A | Certification and Accreditation |
CA | Certification Authority |
CAT | Common Authentication Technology |
CAAT | Computer-Assisted Audit Technique |
CADS | Certification Authority Digital Signature |
CALEA | Communications Assistance for Law Enforcement Act |
CAS | Controlled Access System |
CASL | Custom Audit Scripting Language |
CAST | от имен Carlisle Adams and Stafford Tavares |
CAPI | Cryptographic Application Programming Interface |
CAW | Certification authority workstation |
CBAC | Content-based access control |
CBC | Cipher Block Chaining |
CBCC | Cipher Block Chaining With Checksum |
CC | Common Criteria |
CCA | Cardholder Certification Authority |
CCEP | Commercial COMSEC Endorsement Program |
CCI | Common Content Inspection |
CCIPS | Computer Crime and Intellectual Property Section |
CBC | Cipher Block Chaining |
CC | Common Criteria |
CCB | Configuration Control Board |
CCI | 1. Common Content Inspection |
| 2. Controlled Cryptographic Item |
CCIP | Centre for Critical Infrastructure Protection |
CCITSE | Common Criteria for Information Technology Security Evaluation |
CCM | Counter Mode with Cipher Block Chaining Message Authenticity Check |
CCMP | Counter Mode–CBC MAC Protocol |
CCSE | Check Point Certified Security Engineer |
CCSP | Cisco Certified Security Professional |
CCTL | Common Criteria Testing Laboratory |
CCTP | Common Criteria Testing Program |
CDS | 1. Cryptographic Device Services |
| 2. Certificate Discovery Server |
CDSA | 1. Common Data Security Architecture |
| 2. Communication And Data Security Architecture |
CEM | Common Evaluation Methodology |
CER | 1. Crossover Error Rate |
| 2. Cryptographic Equipment room |
CERIAS | Center for Education and Research in Information Assurance and Security |
CERT/CC | CERT Coordination Center |
CERT-NL | Computer Emergency Response Team Netherlands |
CFB | Cipher Feedback |
CHAP | Challenge Handshake Authentication Protocol |
CI | Content Inspector |
CIAC | 1. Computer Incident Advisory Capability |
| 2. Computer Incident Assessment Capability |
CID | Common Intrusion Detection |
CIDDS | Common Intrusion Detection Director System |
CIDF | Common Intrusion Detection Framework |
CIK | Cryptographic Ignition Key |
CINC | Commander-in-Chief |
CIO | Chief Information Officer |
CIP | 1. Critical Infrastructure Protection |
| 2. Crypto-Ignition Plug |
CIPA | Children‘s Internet Protection Act |
CIPC | Content Inspection Protocol Client |
CIPSO | Common IP Security Option |
CIRK | Common Interswitch Rekeying Key |
CIRT | 1. Cyber-Incident Response Team |
| 2. Computer Incident Response Team |
CIS | Center for Internet Security |
CISA | Certified Information Systems Auditor |
CISF | Catalyst Integrated Security Framework |
CISL | Common Intrusion Specification Language |
CISO | Chief Information Security Officer |
CISSP | Certified Information Systems Security Professional |
CK | 1. Compartment Key |
| 2. Cipher Key |
CKG | Cooperative Key Generation |
CKL | Compromised Key List |
CM | Configuration Management |
CMC | Ciphering Mode Command |
CMCS | COMSEC Material Control System |
CMDS | Computer Misuse Detection System |
CMEA | Cellular Message Encryption Algorithm |
CMP | Certificate Management Protocol |
CMS | Cryptographic Message Syntax |
CMW | Compartmented Mode Workstation |
CNA | Computer Network Attack |
CNCS | Cryptonet Control Station |
CND | Computer Network Defense |
CNK | Cryptonet Key |
COAST | Computer Operations, Audit, and Security Technology |
COE | Common Operating Environment |
COMPUSEC | Computer Security |
COMPSEC | Computer Security |
COMSEC | Communications Security |
COO | Chief Operating Officer |
COOP | Continuity of Operations Plan |
COPPA | Children‘s Online Privacy Protection Act |
COPS | 1. Computer Oracle and Password System |
| 2. Common Open Policy Service |
CORES | Computer Response Squad |
COTS | Commercial Off-The-Shelf |
CP | Certification Policy |
CPRM | Content Protection for Removable Media |
CPS | 1. Certificate Practices Statement |
| 2. COMSEC Parent Switch |
CRAM | Challenge-Response Authentication Mechanism |
CRC | Cyclic Redundancy Check |
CRL | Certificate Revocation List |
CRP | COMSEC Resources Program |
CS | Classified Sensitive |
CSA | Cisco Security Agent |
CSC | Computer Security Center |
CSE | 1. Communications Security Element |
| 2. Content Security Element |
CSI | Computer Security Institute |
CSIR | Computer Security Incident Response |
CSIRC | Computer Security Incident Response Capability |
CSIRT | Computer Security Incident Response Team |
CSO | Chief Security Officer |
CSOR | Computer Security Objects Register |
CSP | 1. Cryptographic Service Provider |
| 2. Critical Security Parameters |
CSR | Certificate Signing Request |
CSRC | Computer Security Response Center |
CSRT | Content Security Response Team |
CSS | 1. Comsec Subordinate Switch |
| 2. Continuous Signature Service |
CSSM | Common Security Services Manager |
CSSO | Contractor Special Security Officer |
CSTC | Computer Security Technology Center |
CSTVRP | Computer Security Technical Vulnerability Reporting Program |
CT&E | Certification Test And Evaluation |
CTAK | Cipher Text Auto-Key |
CTCPEC | Canadian Trusted Computer Product Evaluation Criteria |
CT-KIP | Cryptographic Token Key Initialization Protocol |
CTR | Counter Mode |
CUP | COMSEC Utility Program |
CVE | 1. Common Vulnerabilities and Exposures |
| 2. Common Vulnerability Enumeration |
CVP | Content Vectoring Protocol |
CVSS | Common Vulnerability Scoring System |
| |
D |
DAA | 1. Designated Approving Authority |
| 2. Delegated Accrediting Authority |
DAC | 1. Discretionary Access Control |
| 2. Data Authentication Code |
DAC | Discretionary Access Control |
DACL | Discretionary Access Control List |
DAMA | Demand Assigned Multiple Access |
DAME | Dark Avenger's Mutation Engine |
DARPA | Defense Advanced Research Projects Agency |
DASS | Distributed Authentication Security Service |
DCCS | Departmental Committee on Computer Security |
DCTF | DISA Continuity of Operations and Test Facility |
DDN SCC | Defense Data Network Security Coordination Center |
DDoS | Distributed Denial of Service |
DEA | Data encryption Algorithm |
DECC | Defense Enterprise Computing Center |
DECC-D | Defense Enterprise Computing Center œ Detachment |
DEK | Data Encryption Key |
DES | Data Encryption Standard |
DFA | Deterministic Finite Automata |
DFN-CERT | Deutsches Forschungsnetz Computer Emergency Response Team |
DH | Diffie-Hellman |
DHA | Directory Harvest Attack |
DIDS | Distributed Intrusion Detection System |
DII | Defense Information Infrastructure |
DISA | Defense Information Systems Agency |
DISAI | Defense Information Systems Agency Instruction |
DISN | Defense Information System Network |
DITSCAP | DoD Information Technology Security Certification and Accreditation Process |
DLED | Dedicated Loop Encryption Device |
DLAR | Defense Logistics Agency Regulation |
DMC | Defense Megacenter |
DMVPN | Dynamic Multipoint VPN |
DMZ | Demilitarized zone |
DNSSEC | Secure DNS |
DoD | Department of Defense |
DOD-CERT | Department of Defense Computer Emergency Response Team |
DOI | Domain of Interpretation |
DoS | Denial of Service |
DPAPI | Data Protection API |
DPL | Degausser Products List |
DRM | Digital Rights Management |
DRP | Disaster Recovery Plan |
DSA | Digital Signature Algorithm |
DSO | 1. Departmental Security Officer |
| 2. Data Security Officer |
DSS | Digital Signature Standard |
DSV | Dynamic Signature Verification |
DSX | Dynamic Security Extension |
DTIC | Defense Technical Information Center |
DTK | The Deception ToolKit |
DTLS | Descriptive Top-Level Specification |
DVCP | Dynamic VPN Configuration Protocol |
| |
E |
EA | Electronic Attack |
EAL | Evaluation Assurance Level |
EAP | Extensible Authentication Protocol |
EAPOL | EAP over LAN |
ECB | Electronic codebook |
ECC | Elliptic Curve Cryptosystem/Cryptography |
ECCM | Electronic Counter-Countermeasures |
ECDL | Elliptic Curve Discrete Logarithm |
ECDSA | Elliptic Curve Digital Signature Algorithm |
ECM | Electronic Countermeasures |
ECPA | Electronic Communications Privacy Act |
ECPL | Endorsed Cryptographic Products List |
EDESPL | Endorsed Data Encryption Standard Products List |
EDS CEN | EDS Computer Emergency Network |
EES | Escrowed Encryption Standard |
EFF | Electronic Frontier Foundation |
EFS | Encrypting File System |
EFTO | Encrypt For Transmission Only |
EICAR | European Institute of Computer Anti-Virus Research |
EKE | Encrypted Key Exchange |
EKMS | Electronic Key Management System |
ELSEC | 1. Electronic Security |
| 2. Electronic Emission Security |
EMERALD | Event Monitoring Enabling Responses to Anomalous Live Disturbances |
EMRT | Emergency Response Time |
EMSEC | 1. Emanation security |
| 2. Emissions Security |
EP | Electronic Protection |
EPL | Evaluated Products List |
EPS | Electronic Protection System |
ERS | Emergency Response Service |
ES | Electronic Warfare Support |
ESA | Encapsulating Security Payload |
ESE | Electronic Security Environment |
ESM | Enterprise Security Manager |
ESP | Encapsulating Security Payload |
ESS | Embedded Security Subsystem |
ETL | Endorsed Tools List |
EUCI | Endorsed for Unclassified Cryptographic Item/Information |
EW | Electronic warfare |
| |
G |
G7799 | GIAC Certified ISO-17799 Specialist Certified Professionals |
GAK | Government Access to Keys |
GAO | General Accounting Office |
GASSATA | Genetic Algorithm for Simplified Security Audit Trail Analysis |
GAWN | GIAC Auditing Wireless Networks Certified Professionals |
GBLC | GIAC Business Law and Computer Security Certified Professionals |
GCA | Geopolitical Certificate Authority |
GCDS | GIAC Contracting for Data Security Certified Professionals |
GCFA | GIAC Certified Forensics Analyst Certified Professionals |
GCFW | GIAC Certified Firewall Analyst Certified Professionals |
GCIA | GIAC Certified Intrusion Analyst Certified Professionals |
GCIH | GIAC Certified Incident Handler Certified Professionals |
GCSB | Government Communications Security Bureau |
GCSC | 1. Government Communications Security Committee |
| 2. GIAC Certified Security Consultant Certified Professionals |
GCUX | GIAC Certified UNIX Security Administrator Certified Professionals |
GCWN | GIAC Certified Windows Security Administrator Certified Professionals |
GEWF | GIAC E-warfare Certified Professionals |
GHSC | GIAC HIPAA Security Implementation Certified Professionals |
GHTQ | GIAC Cutting Edge Hacking Techniques Certified Professionals |
GIAC | Global Information Assurance Certification |
GID | Group ID |
GINA | Graphical Identification and Authorisation |
GISA | German Information Security Agency |
GISO | GIAC Information Security Officer Certified Professionals |
GISF | GIAC Information Security Fundamentals Certified Professionals |
GLBA | Graham-Leach-Billey Act |
GLFR | GIAC Law of Fraud Certified Professionals |
GLIT | GIAC Legal Issues in Information Technologies Certified Professionals |
GMK | Group Master Key |
GNOSC | Global Network Operations and Security Center |
GPO | Group Policy Object |
GRE | Generic Routing Encapsulation |
GREM | GIAC Reverse Engineering Malware Certified Professionals |
GrIDS | Graph-based Intrusion Detection System |
GRIP | Guidelines and Recommendations for Security Incident Processing |
GSAE | GIAC Security Audit Essentials Certified Professionals |
GSE | GIAC Security Expert Certified Professionals |
GSEC | GIAC Security Essentials Certification Certified Professionals |
GSI | Grid Security Infrastructure |
GSLC | GIAC Security Leadership Certification Certified Professionals |
GSNA | GIAC Systems and Network Auditor Certified Professionals |
GSP | Global Security Policy |
GSS-API | Generic Security Services -Application Programming Interface |
GTK | Group Transient Key |
GUID | Globally Unique Identifier |
GULS | Generic Upper Layer Security |
GW | Gateway |
| |
I |
I2WAR | Infrastructural And Information Warfare |
I&A | Identification and Authentication |
I&W/TA | Indications And Warnings / Threat Assessment |
IA | Information Assurance |
IAKERB | Initial and Pass-Through Authentication Using Kerberos V5 |
IAM | Identity and Access Management |
IAP | Intrusion Alert Protocol |
IAVA | Information Assurance Vulnerability Alert |
IAVM | Information Assurance Vulnerability Management |
IBAC | Identity Based Access Control |
IBAG | INFOSEC Business Advisory Group |
IBW | 1. Information-Based Warfare |
| 2. Intelligence-Based Warfare |
ICAT | Internet Categorization of Attacks Toolkit |
ICRA | Internet Content Rating Association |
ICRL | Indirect Certificate Revocation List |
ICS | Interdepartmental Committee on Security |
ICSA | International Computer Security Association |
ICV | Integrity Check Value |
ID | 1. Identifier |
| 2. Intrusion detection |
IDEA | International Data Encryption Algorithm |
IDES | Intrusion Detection Expert System |
IDIOT | Intrusion Detection In Our Time |
IDIP | Intruder Detection and Isolation Protocol |
IDLE | Intrusion Data Library Enterprise |
IDP | Intrusion Detection and Prevention System |
IDS | Intrusion Detection System |
IDT | Intrusion Detection Tool |
IDSC | Intrusion Detection Systems Consortium |
IDW | Information Dominance Warfare |
IDWG | Intrusion Detection Working Group |
IETF | Internet Engineering Task Force |
IHT | Incident Handling Team |
IIA | Institute of Internal Auditors |
IIRK | Interarea Interswitch Rekeying Key |
IISSCC | International Information Systems Security Certification Consortium |
IK | Integrity Key |
IKE | IPSec Key Exchange |
iKP | Internet Keyed Payments Protocol |
INFOSEC | Information Security |
INFOWAR | Information Warfare |
IP | Information Protection |
IPCA | Internet Policy Certification Authority |
IPMO | INFOSEC Program Management Office |
IPRA | Internet Policy Registration Authority |
IPS | 1. Intrusion Prevention System |
| 2. Intrusion Protection Systems |
IPSec | Internet Protocol Security |
IPSO | Internet Protocol Security Option |
IRF | Inherited Rights Filter |
IRK | Interswitch Rekeying Key |
IRT | Incident response team |
IS | 1. Information System |
| 2. Information Security |
ISA | Internet Security and Acceleration |
ISACA | Information Systems Audit and Control Association |
ISACF | Information Systems Audit and Control Foundation |
ISAKMP | Internet Security Association and Key Management Protocol |
ISC2 | International Information Systems Security Certification Consortium |
ISO | International Standards Organization |
ISS | 1. Internet Security Scanner |
| 2. Internet Security Systems |
| 3. Information Systems Security |
ISSA | 1. Information Systems Security Association |
| 2. International Systems Security Association |
ISSE | Information Systems Security Engineering |
ISSM | Information Systems Security Manager |
ISSO | 1. Information Systems Security Officer |
| 2. NSA Information Systems Security Organization |
ISSP | Information System Security Policy |
ISSPM | Information Systems Security Program Manager |
ITA | Intruder Alert |
ITAR | International Traffic in Arms Regulations |
IT-SAC | Information Technology Information Sharing and Analysis Center |
ITSEC | Information Technology Security Evaluation Criteria |
ITSEM | Information Technology Security Evaluation Manual |
ITU-T | International Telecommunications Union, Telecommunication Standardization Sector |
ItW | In the Wild |
IV | 1. Initialization Vector |
| 2. Initialization Value |
IW | Information warfare |
| |
N |
NACAM | National COMSEC Advisory Memorandum |
NACSI | National COMSEC Instruction |
NACSIM | National COMSEC Information Memorandum |
NADIR | Network Audit Director and Intrusion Reporter |
NAK | Negative Acknowledge |
NAS | Network Access Server |
NASIRC | NASA Automated Systems Incident Response Capability |
NAPT | Network Address Port Translation |
NAR | Network Address Retention |
NASL | Nessus Attack Scripting Language |
NAT | Network Address Translation |
NAVCIRT | Naval Computer Incident Response Team |
NAVSO | Navy Staff Office Publication |
NBAR | Network-Based Application Recognition |
NCIS | Naval Criminal Investigative Service |
NCS | National Cryptologic School |
NCSA | National Computer Security Association |
NCSC | National Computer Security Center |
NFAT | Network Forensic Analysis Tools |
NFR | Network Flight Recorder |
NIAC | National Infrastructure Advisory Council |
NIAP | National Information Assurance Partnership |
NID | Network Intrusion Detector |
NIDES | 1. Network Intrusion Detection Expert System |
| 2. Next-generation IDES |
NIDS | Network-based IDS |
NII | National Information Infrastructure |
NIPC | National Infrastructure Protection Center |
NISAC | 1. National Information Security Assessment Center |
| 2. National Industrial Security Advisory Committee |
NIST | National Institute of Standards and Technology |
NKSR | Nonkernel Security Related |
NLSP | Network Layer Security Protocol |
NNID | Neural Network Intrusion Detector |
NOSC | Network Operations and Security Center |
NRD token | Non-Repudiation of Delivery token |
NRO token | Non-Repudiation of Origin token |
NRS token | Non-Repudiation of Submission token |
NRT token | Non-Repudiation of Transport token |
NRI | Non-Repudiation Information |
NSA | National Security Agency |
NSAD | Network Security Architecture And Design |
NSAR | Network Security Architecture Review |
NSCSS | National Supervisory Council for Security Systems |
NSDD 145 | National Security Decision Directive 145 |
NSEP | National Security Emergency Preparedness |
NSM | Network Security Monitor |
NSO | Network Security Officer |
NSTAC | National Security Telecommunications Advisory Committee |
NSTAT | Network STAT |
NSTISSAM | National Security Telecommunications and Information Systems Security Advisory/Information |
| Memorandum |
NSTISSC | National Security Telecommunications and Information Systems Security Committee |
NSTISSD | National Security Telecommunications and Information Systems Security Directive |
NSTISSI | National Security Telecommunications and Information Systems Security Instruction |
NSTISSP | National Security Telecommunications and Information Systems Security Policy |
NTCB | Network Trusted Computing Base |
NTLM | Windows NT LAN Manager |
NZSA | New Zealand Security Association Inc |
NZSIS | New Zealand Security Intelligence Service |
NZSIT | New Zealand Security in Information Technology Publications |
| |
P |
P3P | Platform for Privacy Preferences |
PAA | Policy Approving Authority |
PAC | Privilege Attribute Certificate |
PAIIN | Privacy, Authentication, Identification, Integrity, Non-Repudiation |
PAIN | Privacy, Authentication, Identification, Non-Repudiation |
PAP | 1. Password Authentication Protocol |
| 2. Pre-Attack Probe |
PAT | Port Address Translation |
PBC | Plaintext Block Chaining |
P-BEST | Production-Based Expert System Toolset |
PCA | 1. Policy Certification Authority |
| 2. Payment Gateway Certification Authority |
| 3. Policy Creation Authority |
PCBC | Propagating Cipher Block Chaining |
PCERT | Purdue Computer Emergency Response Team |
PCT | Private Communication Technology |
PCZ | Protected Communications Zone |
PD | Protocol Decode |
PDM | Pix Device Manager |
PDP | Policy Decision Point |
PDR | Preliminary Design Review |
PDS | 1. Protected Distribution System |
| 2. Practices Dangerous To Security |
PEAP | Protected EAP |
PEM | Privacy Enhanced Mail |
PEN | Policy Enforced Networking |
PEP | Policy Enforcement Point |
PERT | Program Evaluation And Review Technique |
PFB | Plaintext Feedback |
PFS | 1. Perfect Forward Secrecy |
| 2. Public-Key Forward Secrecy |
PFX | Personal Information Exchange |
PGP | Pretty Good Privacy |
PHF | Phonebook File CGI Script |
PI | Principal investigator |
PIDS | Perimeter Intrusion Detection System |
PII | Personally Identifiable Information |
PIN | Personal Identity Number |
PIX | Private Internet eXchange |
PKA | Public Key Algorithm |
PKC | Public Key Cryptography |
PKCS | Public-Key Cryptography Standards |
PKI | Public Key Infrastructure |
PKIX | Public Key Infrastructure X.509 |
PKP | Public Key Partners |
PKSD | Programmable Key Storage Device |
PLSDU | Physical Layer Service Data Unit |
PMK | Pairwise Master Key |
PMZ | Policy Management Zone |
PNE | Protection Needs Elicitation |
PNEK | Post-Nuclear Event Key |
POC | Proof Of Concept |
POST | Platform for Open Security Testing |
POTP | Protected One-Time Password |
PP | Protection Profile |
PPK | Per Packet Keying |
PPL | Preferred Products List |
PPTP | Point-to-Point Tunneling Protocol |
PRBAC | Partition Rule Base Access Control |
PROPIN | Proprietary Information |
PRNG | Pseudo Random Number Generator |
PSE | Personal Security Environment |
PSIRT | Product Security Incident Response Team |
PSM | Protective Security Manual |
PSK | Pre-Shared Key |
PSL | Protected Services List |
PSS | Probabilistic Signature Scheme |
PTK | Pairwise Transient Key |
PUK | PIN Unblocking Key |
PVLAN | Private VLAN |
PWDS | Protected Wireline Distribution System |
| |
S |
S\MIME | Secure Multipurpose Internet Mail Extensions |
SA | 1. System Administrator |
| 2. Security Association |
| 3. Suspicious Activity |
SAA | System Agent Attack |
SACL | System Access Control List |
SAF | System Authorization Facility |
SAFE | Security Architecture for the Enterprise |
SAFER | Secure And Fast Encryption Routine |
SAID | Security Association Identifier |
SAIC | Science Applications International Corporation |
SAISS | Subcommittee on Automated Information Systems Security of NTISSC |
SAM | 1.Security Access Monitor |
| 2. Suspicious Activity Monitoring |
SAML | Security Assertion Markup Language |
SAMP | Suspicious Activity Monitoring Protocol |
SANS | 1. System Administrator and Network Security Institute |
| 2. SysAdmin, Audit, Network, Security Institute |
SARK | SAVILLE Advanced Remote Keying |
SATAN | System Administrator Tool for Analyzing Networks |
SASL | Simple Authentication and Security Layer |
SBU | Sensitive but Unclassified |
SC | Secure Client |
SCA | Subordinate Certification Authority |
SCC | Security Coordination Center |
SCEP | Simple Certificate Enrollment Protocol |
SCI | Sensitive Compartmented Information |
SCIF | Secure Compartmentalized Information Facility |
SCP | 1. Secure Copy |
| 2. SSH Copy |
SCV | Security Configuration Verification |
SD | Security Descriptor |
SDE | Secure Data Exchange |
SDEE | Security Device Event Exchange |
SDM | Security Device Manager |
SDNS | Secure Data Network System |
SDNRIU | Secure Digital Net Radio Interface Unit |
SDR | System Design Review |
SDSI | Simple Distributed Security Infrastructure |
SEAL | 1. Software-optimized Encryption Algorithm |
| 2. Screening External Access Link |
SECNAVINST | Secretary of the Navy Instruction |
SED | Secure Encryption Device |
SEE | Secure Execution Engine |
SEI | Carnegie Mellon University's Software Engineering Institute |
SENV | Secure Envelope |
SEP | Scalable Encryption Processing |
SERT | Security Emergency Response Team |
SET | Secure Electronic Transaction |
SF | Security Function |
SFA | Security Fault Analysis |
SFP | Security Function Policy |
SFUG | Security Features Users Guide |
SGID | Set Group ID |
S-HTTP | Secure HyperText Transfer Protocol |
SHA | Secure Hash Algorithm |
SHS | Secure Hash Standard |
SID | Security ID |
SIGD | Security in Government Departments |
SIGSEC | Signal Security |
SILS | Standards for Interoperable LAN/MAN Security |
SISS | Subcommittee on Information Systems Security of the NSTISSC |
SKIP | Simple Key-management for Internet Protocols |
SLA | 1. Service Level Agreement |
| 2. Security Level Agreement |
SM | Security Manager |
SMI | Security Management Infrastructure |
SML | Strength Of Mechanisms |
SOAP | Simple Object Access Protocol |
SOC | Security Operation Center |
SOF | Strength of Function |
SOP | Standard Operating Procedure |
SP3/SP4 | 1. Security Protocol |
| 2. Service Pack |
SPA | Secure Posture Assessment |
SPAN | Switched Port Analyzer |
SPC | Software Publisher Certificate |
SPF | Sender Policy Framework |
SPI | 1. Security Parameters Index |
| 2. Secure Profile Inspector |
SPIT | Spam Over Internet Telephony |
SPK | Single Point Key(Ing) |
SPKI | Simple Public Key Infrastructure |
SPKM | Simple Public Key Mechanism |
SPM | Security Policy Model |
SPNEGO | Simple and Protected GSS-API Negotiation Mechanism |
SRA | Sub-Registration Authority |
SRI | System Research Institute |
SRL | Secure Remote Login |
SRP | Secure Remote Password |
SRR | 1. Security Readiness Review |
| 2. Security Requirements Review |
SS7 | Signaling System 7 |
SSAA | System Security Authorization Agreement |
SSC | Site Security Contact |
SSH | Secure Shell |
SSID | Service Set ID |
SSL | 1. Secure Socket Layer |
| 2. Standard Security Label |
SSO | 1. Single Sign-On |
| 2. Special Security Officer |
SSP | 1. System Security Policy |
| 2. System Security Plan |
SSPI | Security Support Provider Interface |
SSRT | Software Security Response Team |
SSSO | Secure Single Sign-On |
ST | Security Target |
ST&E | Security Test And Evaluation |
STAT | State Transition Analysis Technology |
STD | State Transition Diagram |
STE | Secure Terminal Equipment |
STIG | Security Technical Implementation Guide |
STOP | Stack Overflow Protection |
STS | 1. Single Trusted System |
| 2. Subcommittee on Telecommunications Security of the NSTISSC |
STU III | Secure Telecommunication Unit III |
SUID | Set User ID |
SUNSeT | Stanford University Network Security Team |
SV | Starting Variable |
SVN | Secure Virtual Network |
S/WAN | Secure Wide Area Network |
SyOPs | Security operations procedures |
| |
T |
TA | Traffic Analysis |
TAC | Terminal Access Controller |
TACACS | Terminal Access Controller (TAC) Access Control System |
TACTED | Tactical Trunk Encryption Device |
TAISS | Telecommunications And Automated Information Systems Security |
TAP | Traffic Port Analyzer |
TASO | Terminal Area Security Officer |
TCB | Trusted Computing Base |
TCG | Trusted Computing Group |
TCSEC | Trusted Computer System Evaluation Criteria |
TECSEC | Technical Security |
TED | Trunk Encryption Device |
TEK | Traffic Encryption Key |
TESS | The Exponential Encryption System |
TFN | Tribe Flood Network |
TFN2K | Tribe Flood Network 2000 |
TFS | Traffic Flow Security |
TKIP | Temporal Key Integrity Protocol |
TLS | 1. Transport Layer Security |
| 2. Top-Level Specification |
TLSO | Top-Level Security Objectives |
TLSP | Transport Layer Security Protocol |
TNI | Trusted Network Interpretation |
TNIEG | Trusted Network Interpretation Environment Guideline |
TNIU | Trusted Network Interface Unit |
TOE | Target of Evaluation |
TPE | Trident Polymorphic Engine |
TPEP | Trusted Products Evaluation Program |
TPM | Trusted Platform Module |
Triple-DES | Triple Data Encryption Standard |
TRA | Threat and Risk Assessment |
TRANSEC | Transmission Security |
TRUSIX | Trusted UNIX Working Group |
TSA | Time-Stamping Authority |
TSC | 1. TKIP Sequence Counter |
| 2. TSF Scope of Control |
TSCM | Technical Surveillance Countermeasures |
TSEC | Telecommunications Security |
TSF | TOE Security Functions |
TSFI | TSF Interface |
TSIG | Trusted Systems Interoperability Group |
TSK | Transmission Security Key |
TSN | Transitional Security Network |
TSP | TOE Security Policy |
TTLS | Tunneled Transport Layer Security |
TTP | Trusted third party |
TTR | Time-To-Recover |
TWHS | Three-Way-Handshake |
| |