Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Glossary

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z  |  Symbols

A

Acronym(s):

None

Definition(s):

  Additional input that is bound to keying material; a byte string.
Source(s): NIST SP 800-56B Rev. 1

  A state array.
Source(s): FIPS 202

Synonym(s):

None

See Also:
(t + k)-way combination coverage
[a, b]
{, a, b, …}
{a1, ...ai}
|a|
⎾ a⏋
⎾a⏋
⎿a⏌
0xab
2TDEA
3Rd Generation
3TDEA
3-TDEA
4-Way Handshake
64-Bit Intel Itanium Architecture
8 phase Differential Phase Shift Keying
A (i)
a | x
a || b
A Cloud Infrastructure
A MAC tag
a mod n
a, b, c, …, h
A[x, y, z]
AA
AAA
AAAA
AAAK
AAD
AAS
AASC
ABAC
Abstract Syntax Notation 1
Abstract Syntax Notation One
Abstract Syntax Notion One
AC
Acceptable
Acceptable Risk
Acceptance
Access
Access Authentication
Access Authority
Access Control
Access Control (NIST SP 800-53 security control family)
Access Control Entry
Access Control List
Access Control Mechanism
Access Control Rule
Access Control System
Access Cross Domain Solution
Access Level
Access List
Access Point
Access Profile
Access Type
Access-Control Mechanism
Account Management (User)
Accountability
Accounting Legend Code
Accounting Number
Accredit
Accreditation
Accreditation (C.F.D.)
Accreditation Authority
Accreditation Boundary
Accreditation Boundary (C.F.D.)
Accreditation Package (C.F.D.)
Accredited Standards Committee
Accrediting Authority
Accrediting Authority (C.F.D.)
ACE
ACL
ACM
ACO
ACPI
Acquirer
Acquisition
Acquisition, Development, And Installation Controls
ACR
ACS
Activation Data
Activation/Issuance
Active Attack
Active Attack (WLAN attack)
Active Content
Active Cyber Defense
Active Directory
Active Security Testing
Active State
Active Tag
Activities
Activities (assessment)
ACTS Covering Array Generator
Actual Cost Of Work Performed
Actuator
ACWP
AD
Ad Hoc Mode
Ad Hoc Network
Adaptable Antenna Support
Adaptive Frequency Hopping
Additional Authenticated Data
Additional Authentication Data
Additional Input
Add-On Security (C.F.D.)
Address
Address Fields
Address Of Record
Address Resolution Protocol
Addressable
AddRoundKey()
Adequate Security
adj-RIB-In
adj-RIB-Out
Administrative Account
Administrative Incident (COMSEC)
Administrative Safeguards
Administrator
ADS
Advanced Configuration And Power Interface
Advanced Encryption Standard
Advanced Encryption Standard (as Specified In FIPS 197)
Advanced Encryption Standard–Counter With Cbc-Mac
Advanced Key Processor
Advanced Persistent Threat
Advanced Persistent Threats
Advanced Technology Attachment
Adversary
Advisory
Advisory (C.F.D)
AEAD
AES
AES(k, input)
AES-CBC
AES-CCM
AES-Cipher Block Chaining
AES-CMAC(k, M)
AES-Counter Mode
AES-CTR
AF
Affiliated Covered Entities
Affine Transformation
AFH
Africa Network Information Centre
AfriNIC
After Action Report
AGA
Agency
Agency CA
Agent
Aggregate
Aggregated Information
Aggregation
aggregator
Aggressive Mode
AH
AI
AID
AIDC
AIM
Air Gap
AIT
AJAX
AK
AKID
AKM
AKP
Alarm
ALC
Alert
ALG
Algorithm
Algorithm Identifier
Algorithm Originator-Usage Period
Algorithm Security Lifetime
Algorithm Transition
All Source Intelligence
Allied Nation
Allocation
All-Source Intelligence
Alternate COMSEC account manager
alternate COMSEC custodian (C.F.D.)
Alternate Data Stream
Alternate Facility
Alternate MAC/PHY
Alternating Current
Alternating Current Drive
American Gas Association
American National Standard
American National Standards Institute
American Petroleum Institute
American Registry For Internet Numbers
American Registry Of Internet Numbers
American Society For Testing And Materials
American Standard Code For Information Interchange
AMP
An Object
Analysis
Analysis Approach
Analytic Systems
Analyzer
Announcement Traffic Indication Message
Anomaly-Based Detection
Anonymity
Anonymized Information
ANS
ANSI
Answer To Reset
Anti-Forensic
Anti-Jam
Anti-Signal Fingerprint
Anti-Signal Spoof
Anti-Spoof
Antispyware Software
Anti-Tamper
Antivirus
Anti-Virus
Antivirus Software
Antivirus Tools
Anycast Addresses
AO
AP
APDU
APEC
API
APNIC
App Security Requirement
App Vetting Process
Applicant
Application
Application Control Programs
Application Firewall
Application Identifier
Application Layer
Application Layer Gateway
Application Level Gateway
Application Program Interface
Application Program Interfaces
Application Programming Interface
Application Property Template
Application Protocol Data Unit
Application Server
Application Session
Application Translation
Application Virtualization
Application Whitelist
Application Whitelisting Technologies
Application-Based Intrusion Detection And Prevention System
Application-Proxy Gateway
Application-Specific Integrated Circuits
Approval To Operate
Approval To Operate (C.F.D.)
Approved
Approved Entropy Source
Approved Hash Algorithms
Approved Hash Function
Approved Mode Of Operation
Approved Security Function
Approver
APS
APT
Architecture
Archive
Archive (key and/or metadata)
Archive (Noun)
Archive (Verb)
Archive Facility
ARF
ARIN
ARP
Array
Artificial Intelligence
AS
AS&W
ASC
ASCII
Asia Pacific Network Information Centre
Asia-Pacific Economic Cooperation
ASIC's
ASN
ASN.1
ASN.l
Assembly
Assertion
Assertion Reference
Assessment
Assessment (as applied to an issuer)
Assessment Approach
Assessment Findings
Assessment Method
Assessment Object
Assessment Objective
Assessment Procedure
Assessor
Asset
Asset Identification
Asset Reporting Format
Associated Data
Associated Federal Organizations
Associated Federal-State Organizations
Associated Metadata
Associated Metadataalso Metadata
Association
Association For Automatic Identification And Mobility
Association Function
Association Request
Association Response
Assumption
Assurance
Assurance Case
Assurance Message
Assurance Of Domain Parameter Validity
Assurance of integrity
Assurance Of Possession
Assurance Of Possession (private key)
Assurance Of Possession Of A Private Key
Assurance Of Private-Key Possession
Assurance Of Public Key Validity
Assurance Of Validity
assurance_level
assurance_time
Assurance-Signature
Assured Information Sharing
Assured Software
ASTM
asymmetric
Asymmetric Cryptographic Algorithm
Asymmetric Cryptography
Asymmetric Key
Asymmetric Key Algorithm
Asymmetric Keys
Asymmetric-Key Algorithm
Asymptotic Analysis
Asymptotic Distribution
Asynchronous Transfer Mode
AT
ATA
ATIM
ATM
ATO
ATR
ATT
Attack
Attack Free
Attack Sensing And Warning
Attack Signature
Attacker
Attended
Attribute
Attribute And Authorization Services Committee
Attribute Authority
Attribute Based Access Control
Attribute Practice Statement
Attribute Protocol
Attribute Value Pair
Attribute-Based Access Control
Attribute-Based Authorization
Attributes
Attribute-Value Pair
AU
Audit
Audit Administrator
Audit And Accountability
Audit And Accountability (NIST SP 800-53 security control family)
Audit Data
Audit Log
Audit Record
Audit Reduction Tools
Audit Trail
Auditor
Authenticable Entity
Authenticate
Authenticated Cipher Offset
Authenticated Data
Authenticated Decryption
Authenticated Encryption
Authenticated Encryption With Associated Data
Authenticated RFID
Authenticated-Decryption Function
Authenticated-Encryption Function
Authentication
Authentication And Key Management
Authentication Chain
Authentication Code
Authentication Credentials
Authentication Framework
Authentication Header
Authentication Header (IPv6 extension header)
Authentication Header Protocol
Authentication Key
Authentication Mechanism
Authentication Method
Authentication Period
Authentication Protocol
Authentication Protocol Run
Authentication Protocols
Authentication Secret
Authentication Server
Authentication Service
Authentication Tag
Authentication Tagtag
Authentication, Authorization And Accounting
Authentication, Authorization, And Accounting
Authentication, Authorization, And Accounting Key
Authenticator
Authenticity
Authoritative RRSet
Authoritative Time Source
Authority
Authority (C.F.D.)
Authorization
Authorization (as applied to an issuer)
Authorization (to operate)
Authorization (to operate)
Authorization Boundary
Authorization Key
Authorization Key Identifier
Authorization Package
Authorization To Operate
Authorize Processing
Authorized Data Security Association List
authorized ID
Authorized User
Authorized Vendor
Authorizing Official
Authorizing Official Designated Representative
Automated Key Transport
Automated Security Monitoring
Automatic Identification And Data Capture
Automatic Identification Technology
Automatic Remote Rekeying
Autonomous System
Autonomous System Number
AV
Availability
AVP
Awareness
Awareness And Training
Awareness And Training (NIST SP 800-53 security control family)
Awareness, Training, And Education Controls
b ≡ a mod n
BAC
Back Channel
Backdoor
Backhaul
Backscatter Channel
Backtracking Resistance
Backup
Backup (key and/or metadata)
Backup (system)
Backup Facility
Banner
Banner Grabbing
Bare Metal Virtualization
Base Station
Base Station Controller
Base Transceiver Station
Baseline
Baseline Configuration
Baseline Criticality
Baseline Security
Baseline Security Requirement
Baseline Security Requirements
Baselining
Basic Encode Rules
Basic Encoding Rules
Basic Encoding Rules Tag-Length-Value
Basic Input/Output System
Basic Rate
Basic Service Set
Basic Service Set Identifier
Basic Testing
Basis Vector
Bastion Host
Batch Process
BCA
Beacon
Bearer Assertion
Behavior Analysis
Behavior Blockers
Behavioral Outcome
Bernoulli Random Variable
BER-TLV Data Object
Best Current Practice
Better Than Nothing Security
BGP Speaker
BIA
Biased
Bi-Directional
Binary Coded Decimal
Binary Sequence
Binding Cache (on HA or CN)
Binding Update
Binding Update Acknowledgement
Binding Update List (on MN)
Binomial Distribution
Biometric Data Block
Biometric Information
Biometric Information Template
Bit Error Rate
Bit Stream Image
Bit Stream Imaging
BLACK
Black Box Testing
Black Core
BLACK data
Blacklist
Blacklisting
Blended Attack
Block Cipher Algorithm
Block Cipher Mode Of Operation
Blue Team
Blu-Ray Disc
Border Gateway Protocol
Border Gateway Protocol 4
Boundary
Boundary Protection
Boundary Protection Device
Broad Network Access
Broadcast
Brute Force Password Attack
BUA
Budget Year
Buffer Overflow Attack
Bump In The API
Bump In The Stack
Business Areas
Business Associate
Business Associate Contract
Business Case Analysis
Business Continuity Plan
Business Impact Analysis
Business Impact Assessment
Business Process Markup Language
Business Process Specification Schema
C&A
CA
CA Facility
CAC
CAIDA
CAK
Call Back
Call Detail Record
Call Processor
Candidate Checklist
Canister (COMSEC; C.F.D.)
CAP
Capability Maturity Model Integration
Capacity
CAPCO
CAPEC
Capital Planning And Investment Control
Capital Planning Investment Control
Capital Programming
CAPP
CAPTCHA
Capture
Card
Card Application
Card Authentication Key
Card Capability Container
Card Holder Unique Identifier
Card Management
Card Management System
Card Management System To The Card
Card Verifiable Certificate
Cardholder
Cardholder To Card
Cardholder To External System
Cardholder Unique Identifier
Cardiopulmonary Resuscitation
Care Of Address
Care-Of Address
CARL
Carrier-Grade NAT
Cascading (Cross Domain)
Categorization
Category (C.F.D.)
CAVP
CAW
CBC-MAC
CDMA
CDMA Subscriber Identity Module
CD-Read Only Memory
CD-Rewritable
Cellular Network Isolation Card
Cellular Telecommunications And Internet Association
Center For Education And Research In Information Assurance And Security
Center For Magnetic Recording Research
Centers For Medicare And Medicaid Services
Central Facility
Central Limit Theorem
Central Management
Central Office Of Record
Central Oversight Authority
Central Processing Unit
Central Service Node
Central Services Node
Centre For The Protection Of National Infrastructure
CERIAS
CERT® Coordination Center
Certificate
Certificate Authority
Certificate Authority Workstation
Certificate Holder
Certificate Management
Certificate Management Authority
Certificate Management System
Certificate Policy
Certificate- Related Information
Certificate Revocation List
Certificate Status Authority
Certificate Status Server
Certificate User
Certificatecertification Authority
Certificate-Related Information
Certificates
Certificate-Using System
Certification
Certification Agent
Certification Anaylist
Certification And Accreditation
Certification Authority
Certification Authority Revocation List
Certification Authority Software
Certification Authority Workstation (C.F.D.)
Certification Package (C.F.D.)
Certification Path
Certification Practice Statement
Certification Practices Statement
Certification Test And Evaluation
Certification, Accreditation, And Security Assessments (NIST SP 800-53 security control family)
Certified Tempest Technical Authority
CGA
Chain Of Custody
Chain Of Evidence (C.F.D.)
Chain Of Trust
Chained Secure Zone
Chaining
Chain-Of-Trust
Challenge And Reply Authentication
Challenge Handshake Authentication Protocol
Challenge-Handshake Authentication Protocol
Challenge-Response Protocol
Change Control Board
Channel Binding
Channel Scanning
CHAP
Checking Disabled
Chemical Industry Data Exchange
Chief Financial Officer
Chief Information Officer
Chief Information Security Officer
Chief Operating Officer
Chief Privacy Officer
Children‘S Online Privacy Protection Act
Chinese Remainder Theorem
Choreography
CIAC
CIMA
Cipher Block Chaining
Cipher Block Chaining Message Authentication Code
Cipher Block Chaining-Message Authentication Code
Cipher Feedback
Cipher Text Auto-Key
Cipher-based MAC
Cipher-Based Message Authentication Code
Ciphersuite Negotiation
CIPSEA
Cisco Global Exploiter
Claimant
Claimed Address
Claimed Signatory
Classified Information
Classified Information Spillage (C.F.D.)
Classified National Security Information
Classless Interdomain Routing
Classless Inter-Domain Routing
Clean Word List
Clear
Clear Text
Clearance
Cleartext
Client Application
Clinger-Cohen Act Of 1996
Cloned Tag
Closed Source Operating System
Closed Storage
Cloud Infrastructure
CMA
CMAC
CMDAUTH
CNA
CoA
Coalition Partner
Code Analysis
Code Division Multiple Access
Code Of Federal Regulations
Code Vocabulary (C.F.D.)
Cofactor
Cofactor Diffie-Hellman
Cognizant Security Officer/Authority
Collateral Information
Collision Resistance
Comma Separated Values
Command And Control
Command Authority (COMSEC)
Command Line Interface
Command-Line Interface
commercial COMSEC evaluation program
Commercial Off-The-Shelf
Commercial Solutions For Classified
Commercial-Off-The-Shelf
Committee For National Security Systems
Committee On National Security Systems
Committee On National Security Systems Instruction
Common Access Card
Common Attack Pattern Enumeration & Classification
Common Attack Pattern Enumeration And Classification
Common Biometric Exchange Formats Framework
Common Carrier
Common Configuration Enumeration
Common Configuration Enumeration 5
Common Configuration Scoring System
Common Criteria
Common Criteria Evaluation And Validation Scheme
Common Criteria Evaluation Assurance Level
Common Gateway Interface
Common Language Runtime
Common Object Request Broker Architecture
Common Platform Enumeration
Common Platform Enumeration 2.2
Common Secure Configuration
Common User Application Software
Common Vulnerabilities And Exposures
Common Vulnerabilities Scoring System
Common Vulnerability Enumeration
Common Vulnerability Scoring System
Common Vulnerability Scoring System 2.0
Common Weakness Enumeration
Common Weakness Scoring System
communication channel
Communications Cover
Communications Deception (C.F.D.)
Communications Profile
Communications Router
Communications Security
Communications Security Establishment
Communications Security Establishment Of The Government Of Canada
Compact Disc
Compact Disc Read Only Memory
Compact Disc Read/Write
Compact Disc Recordable
Compact Disk
Compact Flash
Comparison
Compartmentalization
Compatible Security Domains
Compensating Security Control
Compensating Security Controls
Competent Security Official
Complementary Error Function
Complementary Metal Oxide Semiconductor
Completely Automated Public Turing Test To Tell Computers And Humans Apart
Compliance
Compliant CKMS
Component Schema
Component Specification
Composed Commercial Solution
Compression Parameter Index
Compromised State
Compromising Emanations
Computer Abuse
Computer And Financial Investigations
Computer Crime And Intellectual Property Section
Computer Cryptography
Computer Emergency Readiness Team
Computer Forensics Research And Development Center
Computer Incident Advisory Capability
Computer Incident Response Capability
Computer Incident Response Center or Computer Incident Response Capability
Computer Incident Response Team
Computer Information Security Officer
Computer Matching Agreement
Computer Network Attack
Computer Network Exploitation
Computer Network Operations
Computer Security Incident Response Capability
Computer Security Incident Response Team
Computer Security Log Management
Comsec Account
Comsec Account Audit
Comsec Account Manager
Comsec Aids
Comsec Assembly (C.F.D.)
Comsec Boundary (C.F.D.)
Comsec Control Program (C.F.D.)
Comsec Custodian (C.F.D.)
Comsec Demilitarization (C.F.D.)
Comsec Facility
Comsec Incident Monitoring Activity
Comsec Manager
Comsec Material
Comsec Material Control System
Comsec Service Authority
Comsec Software
Comsec System Data (C.F.D.)
Comsec Training
CONAUTH
Concept Of Operation
Concept Of Operations
Condition Coverage
Confidential Information Protection And Statistical Efficiency Act
Confidentiality
Confidentiality
Confidentiality Mode
Configurable
Configuration
Configuration (of a system or device)
Configuration Baseline
Configuration Control
Configuration Control Board
Configuration Control Review Board
Configuration Controlor Configuration Management
Configuration Item
Configuration Management
Configuration Management (NIST SP 800-53 security control family)
Configuration Management Database
Configuration Management Plan
Configuration Settings
Conformance Testing
Connection Signature Resolving Key
Consent Banner
Consortia
Consuming Application
Contagion Research Center (fictional)
Container
Contamination
Content Generator
Content Signing Certificate
Context Handler
Contingency Plan
Contingency Planning
Contingency Planning (NIST SP 800-53 security control family)
Continuity Of Operations
Continuity Of Operations Plan
Continuous Assessment (process)
Contract
Contract Administration
Contract Administration Office
Contracting Office
Contracting Officer
Contracting Officer’S Technical Representative
Contracting Officer'S Technical Representative
Control Algorithm
Control Correlation Identifier
Control Frame
Control Gate
Control Information
Controlled Access Area
Controlled Access Program Coordination Office
Controlled Access Protection (C.F.D.)
Controlled Access Protection Profile
Controlled Area
Controlled Cryptographic Item
controlled cryptographic item (CCI) assembly
controlled cryptographic item (CCI) component
controlled cryptographic item (CCI) equipment
Controlled Interface
Controlled Space
Controlled Unclassified Information
controlled unclassified information (CUI) registry
Controlled Variable
Controlling Authority
Controlling Domain
Conventional BIOS
Conversation
Cooperative Association For Internet Data Analysis
Cooperative Key Generation
Cooperative Remote Rekeying Correctness Proof
Coordination
COPPA
CORBA
Core Root Of Trust For Measurement
Corrective Action Plan
Correlation
Cost, Benefit, Schedule, And Risk
Counter Mode For A Block Cipher Algorithm
Counter Mode with Cipher Block Chaining Message Authentication Code
Counter Mode with Cipher Block Chaining Message Authentication Protocol
Counter with Cipher Block Chaining-Message Authentication Code
Countermeasure
Countermeasures
Counter-Mode/CBC-MAC Protocol
Country-Code Top-Level Domain
Course Of Action
Course Of Action (risk response)
Court Services And Offender Supervision Agency
Coverage
Coverage Measurement Tool
Covert Channel
Covert Channel Analysis
Covert Storage Channel
Covert Timing Channel
CoverTRANSEC
Cradle
Credential
Credential Service Provider
Critical Component
Critical Infrastructure
Critical Infrastructure Protection
Critical Infrastructure Sectors
Critical Security Parameter
Critical Security Parameters
Critical Value
Criticality
Criticality Analysis
Criticality Level
Cross Certificate
Cross- Certificate
Cross Certification
Cross Domain
Cross Domain Baseline List
Cross Domain Capabilities
Cross Domain Enabled
Cross Domain Portal
Cross Domain Service
Cross Domain Solution
Cross Domain Solutioncds Filtering
Cross Domain Sunset List
Cross-Certificate
Cryptanalysis
Cryptanalyze
crypto-algorithm
crypto-ancillary equipment
Cryptographic
Cryptographic (Binding)
Cryptographic (Key)
Cryptographic (Module)
Cryptographic Alarm
Cryptographic Algorithm
Cryptographic Algorithm
Cryptographic Algorithm Validation Program
Cryptographic Ancillary Equipment
Cryptographic Binding
Cryptographic Boundary
Cryptographic Boundary
Cryptographic Component
Cryptographic Equipment
Cryptographic Erase
Cryptographic Hash Function
Cryptographic High Value Product
Cryptographic Ignition Key
Cryptographic Incident
Cryptographic Initialization
Cryptographic Key
Cryptographic key component
Cryptographic Key Management System
Cryptographic Key Management System(s)
Cryptographic Keykey
Cryptographic Logic
Cryptographic Material
Cryptographic Message Syntax
Cryptographic Module
Cryptographic Module
Cryptographic Module (compromised)
Cryptographic Module Boundary
Cryptographic Module Security Policy
Cryptographic Module Validation Program
Cryptographic Net
Cryptographic Officer
Cryptographic Operation
Cryptographic Period
Cryptographic Product
Cryptographic Randomization
Cryptographic Security
Cryptographic Service Provider
Cryptographic Solution
Cryptographic Synchronization
Cryptographic System
Cryptographic System Analysis
Cryptographic System Evaluation
Cryptographic System Review
Cryptographic System Survey
Cryptographic Token
Cryptographically Generated Address
Cryptography
Cryptomaterial
Cryptonet Evaluation Report
CSA
CSOSA
CT&E
CTAK
CTIA
CTTA
CUAS
CUI categories or subcategories
CUI Executive Agent
CUI program
Cumulative Distribution Function F(X)
Current Year
Customer Relationship Management
Customization
Cyber Attack
Cyber Incident Response Team
Cyber Red Team
Cyberspace
Cyberspace Attack
Cyberspace Capability
Cyberspace Defense
Cyberspace Operations
Cyberspace Superiority
Cyclic Redundancy Check
Cyclical Redundancy Check
DA
DAA
DAC
DAD
Daily Use Account
DAML
DAO
DARPA
DARPA Agent Markup Language
Data
Data Access Object
Data Aggregation
Data And Information Reference Model
Data Asset
Data Blockblock
Data Collector
Data Diode
Data Element
Data Encryption Algorithm
Data Encryption Security Association Type Indicator
Data Encryption Standard
Data Encryption Standard Electronic Code Book
Data Execution Prevention
Data Flow Control
Data Frame
Data Governance
Data Group
Data Historian
Data Integrity
Data Key, Data Encrypting Key
Data Link Layer
Data Loss
Data Loss Prevention
Data Mining
Data Mining/Harvesting
Data Modification
Data Object
Data Origin Authentication
Data Path
Data Protection Key
Data Provenance
Data Recovery Agent
Data Segmentsegment
Data Spillage
Data Tag
Data Transfer Device (COMSEC)
Data Transfer Solution
Database
Database Examine/Modify Utility ((PBX))
Database Management System
Database Server
Database Upload/ Download Utility ((PBX))
Date Of Birth
DATO
DCO-RA
DEA
Deactivated State
Deauthentication
Decapsulation
Decertification
Decibels Referenced To One Milliwatt
Decision Or Branch Coverage
Decryption-Verification
Dedicated Line
Dedicated Proxy Server
Deep Packet Inspection
Default Classification
Defense Advanced Research Projects Agency
Defense Discovery Metadata Standard
Defense Information Systems Agency
Defense-In-Breadth
Defensive Cyberspace Operation Response Action
Defensive Cyberspace Operations
Degauss
Degradation
De-Identified Information
Delegated Accrediting Authority
Delegation Point
Delegation Signer
Deliverable
Delta-Crl
Demilitarize
Demilitarized Zone
Denial Of Authorization To Operate
Denial Of Service
Denial Of Service (WLAN attack)
Deny By Default
Department Of Defense
Department Of Defense Information Network Operations
Department Of Defense Information Networks
Department Of Energy
Department Of Health And Human Services
Department Of Homeland Security
Department Of Justice
Deprecated
Deprecated Address
Derived Credential
Derived PIV Application
Derived PIV Credential
Derived PIV Credentialand Associated Token Issuer
DerivedKeyingMaterial
DES MAC
Designated Accrediting Authority
Designated Approval Authority
Designated Approval Authority (C.F.D.)
Designated Approving Authority
Designated Authorizing Official
Designated Cipher Function
Destination Address
Destination Address (IPv6 Field)
Destination Options Header (IPv6 extension header)
Destroyed Compromised State
Destroyed State
Detection Error Tradeoff ((characteristic))
Deterministic Algorithm
Deterministic Random Bit Generator
deterministic random number generator
Development, Modernization, And/Or Enhancement
Device Registration Manager
DHAAD
Diagnostics
Diameter
Dictionary Attack Resistance
Differential Power Analysis
Differential Quaternary Phase Shift Keying
Differentiated Services
Diffie-Hellman
Diffie-Hellman Group
Diffie-Hellman Key Exchange
Diffie-Hellmana Key Establishment Algorithm
Digital
Digital Encryption Standard
Digital Evidence
Digital Forensics
Digital Identity Management Service
Digital Media
Digital Policy
Digital Policy Management
Digital Rights Management
Digital Signature
Digital Signature Algorithm
Digital Signature Standard
Digital Signature Standard (implies DSA)
Digital Subscriber Line
Digital Versatile Disc
Digital Video Disc
Direct Application Access
direct BLACK wireline
Direct Random String
DISA
Disallowed
Disassociation
Disaster Recovery
Disaster Recovery Plan
Disclosure Of Information
Discrete Logarithm Cryptography
Discretionary Access Control
Disintegration
Disk Image
Disk Imaging
Disposal
Distinguishable Information
Distinguished Name
Distributed Denial Of Service
Distributed denial-of-service attack
Distributed Energy Technology Laboratory
Distributed Plant
Distributed Transaction Coordinator
Disturbance
DMARC
DNS Administrator
DNS-ALG
DNSSEC-Aware Name Server
DNSSEC-Aware Recursive Name Server
DNSSEC-Aware Resolver
DNSSEC-Aware Stub Resolver
DoD Discovery Metadata Standard
DoD Information
Domain
Domain Authority
Domain Controller
Domain Name Server
Domain Name System
Domain Name System Key
Domain Name System Security Extensions
Domain Name System-Application Layer Gateway
Domain Of Interpretation
Domain Parameter
Domain Parameter Seed
Domain Parameters
Domain Separation
domain_parameter_seed
Domain-Based Message Authentication, Reporting & Conformance
Downgrading
DPA
DRA
DRBG Mechanism Boundary
DSA
Dual Control
Dual Stack Transition Mechanism
Dual Use Certificate
Duplicate Address Detection
Duplicate Digital Evidence
Duration
Duration/ID
DVD.Read Only Memory
DVD-Rewritable
Dynamic Analysis
Dynamic Authentication
Dynamic Frequency Selection
Dynamic Home Agent Address Discovery
Dynamic Host Configuration Protocol
Dynamic Host Configuration Protocol For Ipv4
Dynamic Host Configuration Protocol For Ipv6
Dynamic Link Library
Dynamic Subsystem
e- authentication
EA
EAL
EAN
EAP
EAP execution
EAP Integrity Key
EAP layer
EAP method
EAP server
EAP-FAST
EAPOL
EAPOL-KCK
EAPOL-KEK
EAP-TLS
EAP-TTLS
Earned Value Management
Earned Value Management System
EAS
Ease-Of-Use
E-Authentication Assurance Level
Eavesdropper
Eavesdropping
Eavesdropping (WLAN attack)
Eavesdropping Attack
ECDSA
Ecordable
Education
Education
EICAR
Electric Power Research Institute
Electrically Erasable Programmable Read-Only Memory
Electromagnetic Compatibility
Electromagnetic Environmental Effects
Electromagnetic Interference
Electronic Article Surveillance
Electronic Authentication
Electronic Biometric Transmission Specification
Electronic Credentials
Electronic Data Interchange
Electronic Key Management System
Electronic Mail
Electronic Media
Electronic Messaging Services
Electronic Product Code Information Services
Electronic Protected Health Information
Electronic Serial Number
Electronic Signature (C.F.D.)
Electronically Erasable Programmable Read-Only Memory
Electronically Generated Key
Electronically Stored Information
Electronically-Erasable Programmable Read-Only Memory
Elliptic Curve Cryptography
Elliptic Curve Diffie-Hellman
Elliptic Curve Diffie–Hellman
Elliptic Curve Digital Signature Algorithm
Elliptic Curve DSA
Elliptic Curve Group Modulo A Prime
E-Mail
Embedded IPv4 Unicast
Embedded Universal Integrated Circuit Card
Emergency Action Plan
Emergency Medical Services
Emergency Medical Technician
Emergency Response Team
Encapsulating Security Payload
Encapsulating Security Payload Header (IPv6 extension header)
Encapsulating Security Payload Protocol
Encapsulating Security Protocol
Encapsulation
Enclave
Enclave Boundary
Encryption Algorithm
Encryption Certificate
End Cryptographic Unit
End User License Agreement
End-Item Accounting
Endpoint Protection Platform
End-Point Protection Platform
Energy Management System
Enhanced Data for GSM Evolution
Enhanced Data Rate
Enhanced Interior Gateway Routing Protocol
Enhanced Messaging Service
Enhanced Overlay
Enhancements
Enrollment Data Set
Enrollment Manager
Enterprise Architecture
Enterprise Configuration Manager
Enterprise Cross Domain Services
Enterprise Cross Domain Services Provider
Enterprise Privacy Authorization Language
Enterprise Resource Planning
Enterprise Resource Planning System
Enterprise Risk Management
Enterprise-Hosted Cross Domain Solutions
Entity Authentication
Environment Of Operation
Environmental Failure Protection
Environmental Failure Testing
Environmental Testing
EPAL
Ephemeral Diffie-Hellman Key Exchange
Ephemeral Elliptic Curve Diffie-Hellman
Ephemeral Key
Ephemeral Key Pair
Equivalent Process
Equivalent Security Domain Policies
Equivalent Security Domains
Erasable Programmable Read-Only Memory
Erasure
Escape
EULA
European Article Number
European Institute For Computer Antivirus Research
European Telecommunications Standards Institute
Evaluate
Evaluated Products List (C.F.D.)
Evaluating Authority
Evaluation Assurance Level (C.F.D.)
Evasion
Event Aggregation
Event Correlation
Examination
Examine
Exclusive-Or operation
Exculpatory Evidence
eXecute in Place
Executive Agency
Exfiltration
Explicit Congestion Notification
Exploitable Channel
Extendable-Output
Extended Data Encryption Standard
Extended Master Session Key
Extended Unique Identifier 64 Bit Addresses
Extended Validation Secure Sockets Layer
Extensible Access Control Markup Language
Extensible Authentication Protocol
Extensible Authentication Protocol Flexible Authentication Via Secure Tunneling
Extensible Authentication Protocol Over LAN
Extensible Authentication Protocol Over LAN Key Confirmation Key
Extensible Authentication Protocol Over LAN Key Encryption Key
Extensible Authentication Protocol-Transport Layer Security
Extensible Authentication Protocol-Tunneled Transport Layer Security
Extensible Configuration Checklist Description Format
Extensible Configuration Checklist Description Format 1.1.4
Extensible Firmware Interface
Extensible Markup Language
Extensible Mark-Up Language
Extensible Rights Markup Language
Extensible Stylesheet Language Transformation
Exterior Border Gateway Protocol
Exterior Gateway Protocol
External Information System (or component)
External Information System or Component
External Information System Service
External Information System Service Provider
External Information Systems Service Provider
External Network
External Operational Management Role
External Security Testing
external utility
Extraction-Then-Expansion
Extranet
FACCI
Facilitator
Facilitator Guide
Facility
Facility (mobile device)
Facility (static device)
Fail Safe
Fail Secure
Fail Soft
Failover
Failure Access
Failure Control
Failure To Enroll Rate
Fair Information Practice Principles
False Accept Rate
False Accept Rate ((defined over an authentication transaction))
False Acceptance
False Match Rate ((defined over single comparisons))
False Negative
False Non-Match Rate ((defined over single comparisons))
False Positive
False Reject Rate
False Reject Rate ((defined over an authentication transaction))
False Rejection
FAM
Family Education Rights Privacy Act
FAQ
FAR
FASC-N
Fast IDentity Online
Fast Reconnect
Fast User Switching
FAT
Fault Injection Testing
Fault Tolerant
Fault Tree Analysis
FBCA
FBCA Operational Authority
FCKMS architecture
FCKMS documentation
FCKMS Security Domain
FCKMS service-providing organization
FCKMS service-using organization
FDA
FEA
FEA-SPP
Feature
Feature Phone
Feature Set
Federal Acquisition Register
Federal Acquisition Regulation
Federal Agency
Federal Agency Smart Credential Number
Federal Bridge Certificate Authority
Federal Bridge Certification Authority
Federal Bridge Certification Authority Membrane
Federal Bureau Of Investigation
Federal Communications Commission
Federal Communications Commission Identification Number
Federal Cryptographic Key Management System (FCKMS)
Federal Desktop Core Configuration
Federal Emergency Management Agency
Federal Enterprise Architecture
Federal Enterprise Architecture (FEA Program Management Office)
Federal Enterprise Architecture Security And Privacy Profile
Federal Financial Management Improvement Act
Federal Identity Credentialing Committee
Federal Identity, Credential, And Access Management
Federal Information Processing Standard
Federal Information Processing Standard(s)
Federal Information Processing Standards
Federal Information Processing Standards Publications
Federal Information Processing Standards-Validated Cryptography
Federal Information Processing
Standards

Federal Information Security Management Act
Federal Information Security Management Act Of 2002
Federal Information Security Modernization Act
Federal Information System
Federal Information System Controls Audit Manual
Federal Information Systems Security Educator’s Association
Federal Information Technology Security Assessment Framework
Federal Law Enforcement Training Center
Federal Managers Financial Integrity Act
Federal Preparedness Circular
Federal Public Key Infrastructure Policy Authority
Federally Aided Organizations
Federated Development And Certification Environment
Federated Trust
Federation
FEMA
FERPA
FFMIA
FICAM
Field-programmable gate array
File Allocation Table
File Allocation Unit
File Association
File Header
File Name Anomaly
File Signature Anomaly
File Slack
File Transfer Protocol
File Transfer Protocol Secure
Filename
Final Checklist
Financial Audit Manual
Fingerprint Segmentation
Finite Field Cryptography
Finite State Model
FIPS Publication
FIPS-validated cryptography
Firefly Credential Manager
Firewall
Firewall Control Proxy
Firmware
First Byte Of A Two-Byte Status Word
First Parameter Of A Card Command
Fiscal Year
FISCAM
FISMA
FISMA Report
FISSEA
FITSAF
Fixed Comsec Facility
Flapping
Flash ROM
Florida Association Of Computer Crime Investigators
Flow Label (IPv6 Field)
Fluhrer-Mantin-Shamir
FMFIA
Focused Observation
FOIA
Food And Drug Administration
Forensic And Incident Response Environment
Forensic Specialist
Forensically Clean
Form Factor
Formal Access Approval
Formal Language
Formal Method
Formal Policy Model
Format
Formatting Function
Forum Of Incident Response And Security Teams
Forward Channel
Forward Cipher Function
Forward Cipher Functionforward Cipher Operation
Forward Cipher Operation
Forward Cipher Operation/Forward Transformation
Forward Transformation
Forwarding Information Base
FPGA
FPKI PA
Fragment Header (IPv6 extension header)
Frame Body
Frame Check Sequence
Frame Control Field
Framework
Framework (for CKMS)
Framework Requirement
Framework Response
Framework Topic
Free Space
Freedom Of Information Act
French Security Incident Response Team
Frequency Hopping Spread Spectrum
Frequently Asked Questions
Full Virtualization
Full/Depot Maintenance
Fully Qualified Domain Name
Functional Exercise
Functional Testing
Functionality Testing
Galois Counter Mode
Galois Message Authentication Code
Galois/Counter Mode
GAO
GAP
Garbled
Gateway
Gateway-To-Gateway (IPsec protection model)
GATT
Gaussian Frequency-Shift Keying
GCD (a, b)
GCD(a, b)
General Accountability Office
General Packet Radio Service
General Purpose Input/Output
General Record Schedule
General Records Schedule
General Services Administration
General Support
General Support System
Generalized Pre-Shared Key
Generalized TTL Security Mechanism
Generate Key
Generation
Generation-Encryption
Generic Access Profile
Generic Attribute Protocol
Generic Routing Encapsulation
Generic Token Card
Generic Top-Level Domain
Geographic location
Geometric Random Variable
Gigabits Per Second
Gigabyte
Gigahertz
GINA
GLBA
Global
Global Information Grid
Global Information Grid (C.F.D.)
Global Positioning System
Global Standards One
Global Structure/Global Value
Global System For Mobile Communications
Global Unique Identification Number
Globally Unique Identifier
GMAC
Government Accountability Office
Government Forum Of Incident Response And Security Teams
Government Paperwork Elimination Act
Government Performance And Results Act
Government Smart Card Interoperability Specification
GPEA
GPRA
Graceful Restart
Gramm-Leach-Bliley Act
Graphical Identification And Authentication
Graphical User Interface
Gray Box Testing
Gray Market
Graylist
Greatest Common Divisor
Group Authenticator
Group Key Handshake
Group Master Key
Group Policy Management Console
Group Security Research Group
Group Temporal Key
Group Traffic Encryption Key
GSA
Guard (System)
Guardsystem (System)
Guest Operating System
GUID Partition Table
HA
Hacker
HAG
HAIPE
HAIPE-IS
Hand Receipt
Hand Receipt Holder
Handshake
Hard Copy Key
Hard Disk
Hardening
Hardware
Hardware Description Language
Hardware Driver
Hardwired Key
Harm
Hash
Hash (M)
Hash Algorithm
Hash Code
Hash Function
Hash Message Authentication Code
Hash Output
Hash Value
Hash Value/Result
hash( )
Hash-Based Key Derivation Function
Hash-Based Message Authentication Code
Hashed
Hashed Message Authentication Code
Hashed Next Secure
Hashing
Hashing Algorithm
Hashword (C.F.D.)
Hazardous Materials
Hazards Of Electromagnetic Radiation To Fuel
Hazards Of Electromagnetic Radiation To Ordnance
Hazards Of Electromagnetic Radiation To People
HAZMAT
Header
Health Information
Health Information Portability And Accountability Act
Health Insurance Portability And Accountability Act
Health Level 7
Health Plan
Health Testing
Health, Education And Welfare
Healthcare Clearinghouse
Healthcare Provider
Heap
Heating, Ventilation, And Air Conditioning
Hierarchical File System
High Assurance Guard
High Assurance Internet Protocol Encryptor
High Assurance Internet Protocol Encryptor Interoperability Specification
High Availability
High Impact
High Performance Radio Local Area Network
High Technology Crime Investigation Association
High-Impact System
High-Performance File System
High-Power Transmitter
HIPAA
HIPERLAN
Hkey_Local_Machine
HMAC
HMAC-HASH
HMAC-hash(k, M)
HMAC-PRF
HoA
Holder-Of-Key Assertion
Home Address
Home Agent
Homeland Security Presidential Directive
Hop-By-Hop Option Header (IPv6 extension header)
Host Controller Interface
Host Information
Host Operating System
Host Protected Area
Host Vulnerability Scanners
Host-Based Firewall
Host-Based Intrusion Detection And Prevention System
Host-Based Security
Hosted Virtualization
Host-To-Gateway (IPsec protection model)
Hotwash
HPA
HTCIA
Human Resources
Human-Computer Interaction
Human-Machine Interface
HVAC
Hypertext Markup Language
Hypertext Transfer Protocol
Hypertext Transfer Protocol over SSL
HyperText Transfer Protocol over SSL/TLS
Hypertext Transfer Protocol over Transport Layer Security
Hypertext Transfer Protocol Secure
I&A
IA
IA architecture
IA infrastructure
IA product
IA-64
IaaS
IAB
IAC
IACIS
IACS
IAD
IA-enabled information technology product
IA-enabled product
IAFIS
IAM
IANA
IAO
IAONA
IATO
IATT
IAVA
IAVB
IBAC
ICAM
ICAMSC
ICANN
ICAO
ICT Supply Chain
ICT Supply Chain Compromise
ICT Supply Chain Infrastructure
ICT Supply Chain Logistics
ICT Supply Chain Risk
ICT Supply Chain Risk Management
Idaho National Laboratory
IDART
IDEA
Ideal Random Bitstring
Ideal Random Sequence
Identification
Identification And Authentication
Identification And Authentication (NIST SP 800-53 security control family)
Identity Based Access Control
Identity Certificate
Identity Federation Framework
Identity Management System
Identity Registration
Identity Verification
Identity Web Services Framework
Identity, Credential, And Access Management
Identity, Credential, And Access Management Subcommittee
Identity-Based Access Control
Identity-Based Authentication
Identity-Based Security Policy
Igamc
IKEv2 Mobility and Multihoming Protocol
Image
IMAP
Impact
Impact Level
Impact Value
Impact-Level
Implant
Implementation
Implementation Guidance
Implementation Specification
Implementation Testing For Validation
Implementation Under Test
Implicit Key Authentication
Inadvertent Disclosure
Incident Handling
Incident Response Plan
Incineration
Incomplete Gamma Function
Incremental Testing
Inculpatory Evidence
Independent Basic Service Set
Independent Qualified Reviewer
Independent Regulatory Agency
Independent Validation Authority
Independent Verification & Validation
Indicator
Individual
Individual Accountability
Individually Identifiable Health Information
Individuals
Industrial Automation And Control System
Industrial Automation Open Networking Association
Industrial Control System
Industrial Control System(s)
Industrial Control Systems
Industrial Control Systems - Cyber Emergency Response Team
Industrial Security
Industrial Security Incident Database
Industrial, Scientific, And Medical
Information
Information Access Division
Information And Communication Technology
Information And Communications Technology
Information Assessment Methodology
Information Assurance
Information Assurance Component
Information Assurance Manager (C.F.D.)
Information Assurance Officer (C.F.D.)
Information Assurance Professional (C.F.D.)
Information Assurance Vulnerability Alert
Information Assurance Vulnerability Bulletin
Information Design Assurance Red Team
Information Domain
Information Environment
Information Flow Control
Information In Identifiable Form
Information Leakage
Information Management
Information Management Policy
Information Operations
Information Owner
Information Resources
Information Resources Management
Information Security
Information Security Architect
Information Security Architecture
Information Security Continuous Monitoring
Information Security Continuous Monitoring Process
Information Security Continuous Monitoring Program
Information Security Governance
Information Security Marketing
Information Security Metrics
Information Security Officer
Information Security Oversight Office
Information Security Policy
Information Security Program Plan
Information Security Risk
Information Security Testing
Information Sharing
Information Sharing And Analysis Center
Information Sharing Environment
Information Steward
Information System
Information System Administrator
Information System Boundary
Information System Component
Information System Component Inventory
Information System Contingency Management Plan
Information System Life Cycle
Information System Owner
Information System Resilience
Information System Security Engineer
Information System Security Engineering
Information System Security Manager
Information System Security Officer
Information System Service
Information System User
Information System-Related Security Risk
Information System-Related Security Risks
Information Systems Security
Information Systems Security Boundary
Information Systems Security Engineer
Information Systems Security Engineering
Information Systems Security Manager
Information Systems Security Officer
Information Systems Security Program Manager
Information Technology
Information Technology Infrastructure Library
Information Technology Investment Management
Information Technology Laboratory
Information Technology Laboratory ((of NIST))
Information Technology Laboratory (NIST)
Information Technology Management Reform Act
Information Technology Product
Information Technology Security Evaluation Criteria
Information Type
Information Value
Infra Red Data Association
Infrastructure As A Service
Infrastructure Mode
Infrastructure Network
Infrastructure-As-A-Service
Inheritance
Initial Counter Block
Initial Privacy Assessment
Initialization Vector
Input Data
Inside Threat
Insider Threat
Insider Threat Program
Inspectable Space
Inspector General
Instant Messaging
Instantiation Of An RBG
Institute For Information Infrastructure Protection
Institute Of Electrical And Electronics Engineers
Institute Of Electrical And Electronics Engineers, Inc.
Institute of Electronics and Electrical Engineers
Institutional Review Board
Instructional System Methodology
Integer Factorization Cryptography
Integrated Automated Fingerprint Identification System
integrated CCI component
Integrated Circuit
Integrated Circuit Card
Integrated Circuit Card ID
Integrated Circuit Card Identification
Integrated Circuit Chip
Integrated Circuit(s) Card Device
Integrated Circuit(s) Card Devices
Integrated Development Environment
Integrated Digital Enhanced Network
Integrated Drive Electronics
Integrated Services Digital Network
Integrity Check Value
Integrity Check Value (C.F.D.)
Integrity Restoration
Integrity Verification
Intellectual Property
Intelligence Activities
Intended Signatory
Interagency Advisory Board
Interagency Report
Interconnection Security Agreement
Inter-Control Center Communications Protocol
Interface
Interface Identifier
Interface-Local (IPv6 Scope)
Interim Approval To Operate (C.F.D.)
Interim Authorization To Operate
Interim Authorization To Test
Inter-Integrated Circuit
Interior Gateway Protocol
Interior Gateway Protocol (e.g., Ibgp, Ospf, Rip)
Intermediary Service
Intermediate CA
Intermediate Certification Authority
Intermediate System To Intermediate System
Internal Border Gateway Protocol
Internal Network
Internal Review Service
Internal Security Controls
Internal Security Testing
Internal State
International Association Of Computer Investigative Specialists
International Civil Aviation Organization
International Committee For Information Technology Standards
International Council On Large Electric Systems
International Data Encryption Algorithm
International Electrotechnical Commission
International Mobile Equipment Identity
International Mobile Subscriber Identity
International Organization For Standardization
International Organization For Standardization/International Electrotechnical Commission
International Organizations
International Society Of Automation
International Standards Organization
International Systems Security Engineering Association
International Telecommunication Union
Internet Architecture Board
Internet Assigned Number Authority
Internet Assigned Numbers Authority
Internet Connection Firewall
Internet Connection Sharing
Internet Control Message Protocol
Internet Control Message Protocol for IPv4
Internet Control Message Protocol for IPv6
Internet Corporation For Assigned Names And Numbers
Internet Engineering Task Force
Internet Group Management Protocol
Internet Group Management Protocol Version 3
Internet Information Server
Internet Information Services
Internet Key Exchange
Internet Key Exchange Protocol
Internet Key Exchange Version 1
Internet Key Exchange Version 2
Internet Message Access Protocol
Internet Protocol Next Generation
Internet Protocol/Intellectual Property
Internet Relay Chat
Internet Research Task Force
Internet Security Association And Key Management Protocol
Internetwork Operating System
Internetwork Packet Exchange
Interoperability
Interoperability Test
Interstate Organization
Intranet
Intra-Site Automatic Tunnel Addressing Protocol
Intrusion Detection And Prevention
Intrusion Detection Message Exchange Format
Intrusion Detection System Load Balancer
Invalid Address
Inverse Cipher Functioninverse Cipher Operation
Inverse Cipher Operation
Inverse Cipher Operation/Inverse Transformation
Inverse Transformation
Investment Review Board
Invocation Field
Inward-Facing
IP Payload Compression Protocol
IPA
ipad
iPhone Operating System
IPsec Web Based Interoperability Tester
IrDA
Iris Exchange
Iris Segmentation
ISA
ISAC
ISAKMP
ISATAP
Island Of Security
ISSEA
Issuing Facility
IT security architecture
IT security awareness and training program
IT Security Basics
IT Security Body of Knowledge Topics and Concepts
IT security goal
IT Security Literacy
IT Security Program
Iterated Block Cipher
Iteration Count
IT-related risk
IV&V
IVA
JAD
Jamming
Java
Java API For XML Registries
Java EE
Java Platform, Enterprise Edition
Java Security Manager
Java Virtual Machine
Javascript
JAXR
Joint Application Development
Joint Authorization
Joint Photographic Experts Group
Joint Test Action Group
JTAG
KAK
KAS
KAS1-basic
KAS1-Party_V-confirmation
KAS2-basic
KAS2-bilateral-confirmation
KAS2-Party_U-confirmation
KAS2-Party_V-confirmation
KBA
KECCAK
KECCAK[c]
KECCAK-f [b]
KECCAK-p[b, nr]
Kerberized Internet Negotiation Of Keys
Key Administration
Key Agreement
Key And Metadata Management Functions
Key Attribute
Key Confirmation
Key Confirmation Key
Key Custodian
Key De-Registration
Key Derivation
Key Derivation Function
Key Derivation Key
Key Establishment
Key Exchange
Key Expansion
Key Format
Key Generation
Key Generation And Distribution
Key Generation Material
Key Generator
Key Hierarchy
Key Label
Key Lifecycle State
Key Loader
Key Management
Key Management Archive
Key Management Device
Key Management Entity
Key Management Facility
Key Management Infrastructure
Key Management Message
Key Management Plan
Key Management Policy
Key Management Practices Statement
Key Management Product
Key Management Service
Key Pair
Key Processing Facility
Key Registration
Key Revocation
Key Specification
Key State Transition
Key States
Key Stream
Key Stream Generator
Key Tag
Key Tape
Key Transport
Key Update
Key Wrapping
Key Wrapping Key
Key/Metadata Recovery
Key-Agreement Primitive
Key-Agreement Scheme
Key-Agreement Transaction
Key-Auto-Key
Key-Confirmation
Key-Confirmation Provider
KeyData
Key-Derivation Function
Key-Derivation Key
Key-Derivation Method
Key-Derivation Procedure
Keyed Hash Algorithm
Keyed Hash-Based Message Authentication Code
Keyed-Hash Message Authentication Code
Keyed-Hash Message Authentication Code (as Specified In Fips 198-1.)
Key-Encapsulation Mechanism
Key-Establishment
Key-Establishment Key Pair
Key-Establishment Transaction
Key-Generating Module
Keying Material
Keying Material Installation
Key-Management Archive
Key-Pair Owner
Key-Recovery Agent
Key-Transport
Key-Transport Scheme
Key-Transport Transaction
Key-Usage Period
Key-Wrap Algorithm
Key-Wrapping
Key-Wrapping Key
Key-Wrapping Scheme (Symmetric)
Kill Command
KMI operating account
KMI protected channel
KMI-aware device
Knowledge Based Authentication
Knowledge, Skills, And Abilities
Knowledge-based authentication
KOA
KOA agent
KOA manager
KOA registration manager
KOAM
KSA
KTS-KEM-KWS-basic
KTS-KEM-KWS-Party_V-confirmation
KTS-OAEP-basic
KTS-OAEP-Party_V-confirmation
L2CAP
Label
Labeled Security Protections
Laboratory Attack (C.F.D.)
LACNIC
LAN
Land Mobile Radio
Lane
Lane(i, j)
Lanmanager
Last Mile Broadband Access
Last Numbers Dialed
Latency
Latin America And The Caribbean Network Information Centre
Latin American And Caribbean Ip Address Regional Registry
Law Enforcement Officer
Lawful Government Purpose
Laws And Regulations
Layer 2 Forwarding
Layer 2 Tunneling Protocol
Layer 2 Vpn
Layer 3 Vpn
Layered Cots Product Solutions
L-bit Hash Function
LCM (a, b)
LCM(a, b)
LDA
LDAP
Learning
Learning Continuum
Learning Objective
Least Common Multiple
Least Privilege
Least Significant Bit
Least Significant Bit(s)
Least Trust
leftmost (V, a)
Legacy BIOS
Legacy Environment
Legacy-Use
len (a)
Length In Bits Of A Non-Negative Integer X
Length in bytes of a non-negative integer, x
Level Of Assurance
Level Of Significance (α)
Lightweight Directory Access Protocol
Likert Scale
Limited Maintenance
Limited User Account
Linear Dependence
Linear Feedback Shift Register
Line-Of-Sight Signal Propagation
Linkable Information
Linked Information
Link-Local (IPv6 Scope)
Liquid Crystal Display
LOA
Loadable Kernel Module
Local Access
Local Area Network
Local Authority
Local Authorization
local COMSEC management software
Local Delivery Agent
Local Element
Local Internet Registry
Local Management Device
Local Registration Authority
Location
Location Information
Locator/ID Separation Protocol
Lock Command
Log Analysis
Log Archival
Log Clearing
Log Management
Log Management Infrastructure
Log Normalization
Log Parsing
Log Preservation
Log Rotation
Logical Access Control System
Logical Backup
Logical Link Control And Adaptation Protocol
Logical Object
Logical Partitioning
Logical Perimeter
Logical Volume
Longitudinal Redundancy Code
Long-Term Credentials
Loop-Back Mode
Low Impact
Low Impact System
Low Probability Of Detection
Low Probability Of Intercept
Low Probability Of Positioning
Lower Layer
Low-Impact System
Low-Power Transmitter
LRA
LUA
MA
MAC
MAC algorithm
MAC Algoritm
MAC Generation
MAC tag
MAC Verification
MAC(MacKey, MacData)
MacData
MacDataU, (or MacDataV)
Machine Controller
Machine Readable Travel Document
MacKey
MacKeyLen
Macro Virus
MacTag
MacTagLen
MacTagV, (MacTagU)
Magnetic Media
Magnetic Remanence
Magnetic Resonance Imaging
Magneto Optical
Mail Exchange
Mail Exchanger
Mail Server
Mail Server Administrator
Mail Transfer Agent
Mail User Agent
Main Mode
Maintenance
Maintenance (NIST SP 800-53 security control family)
Maintenance Key
Major Application
Major Information System
Major IT investment
Malicious Code
Malicious Cyber Activity
Malicious Logic
Malware
MAM
MAN
Managed Environment
Managed Interface
Managed Security Services Provider
Management Client
Management Control
Management Controls
Management Controls (C.F.D.)
Management Countermeasure
Management Frame
Management Information Base
Management Message
Management Network
Management Security Controls (C.F.D.)
Management Server
Management Service
Mandatory Access Control
Mandatory Modification
Man-In-The-Middle
Man-In-The-Middle Attack
Man-In-The-Middle Attack Resistance
Manipulated Variable
Manipulative Communications Deception (C.F.D.)
Manual Cryptosystem
Manual Key Entry
Manual Key Transport
Manual Remote Rekeying
Manufacturing Execution System
MAO
Maple
Market Research
Marking
Mask
Mask Generation Function
Masquerading
Masquerading (WLAN attack)
Master Boot Record
Master Key
Master Scenario Events List
Master Session Key
Master Terminal Unit
Master Terminal Unitalso Master Telemetry Unit
Match/Matching
MATLAB
Maximum Allowable Outage
Maximum Segment Size
Maximum Tolerable Downtime
Maximum Transmission Unit
MBSA
Measured Service
Measurement
Measures
Mechanisms
Media
Media Access Control
Media Access Control (Address)
Media Access Control Address
Media Gateway
Media Gateway Control Protocol
Media Library
Media Protection
Media Protection (NIST SP 800-53 security control family)
Media Sanitization
Medicare Prescription Drug Card Sponsors
Medium Access Control
Megabit Per Second
Megabits Per Second
Megabyte
Megahertz
Memorandum Of Agreement
Memorandum Of Understanding
Memorandum Of Understanding Or Agreement
Memorandum Of Understanding/Agreement
Memory Scavenging
Message
Message Authentication
Message Authentication Code
Message Authentication Code (MAC)
Message Authentication Codemac Algorithm
Message Authentication Key
Message Digest
Message Digest 5
Message Exchange Pattern
Message Indicator
Message Inject
Message Integrity Code
Message Integrity Code Key
Message Modification (WLAN attack)
Message-Digest Algorithm 5
Metaattributes
Metadata
Metadata (bound)
Metadata (compromised)
Metadata (explicit)
Metadata (implicit)
Metadata Element
Metadata Standards Working Group
Metapolicy
Method Layer
Metropolitan Area Network
MFA
Microsoft Baseline Security Analyzer
Microsoft Challenge Handshake Authentication Protocol
Microsoft Challenge-Handshake Authentication Protocol
Microsoft Disk Operating System
Microsoft Knowledge Base
Microsoft Management Console
Middleware
Milliwatt
min (a, b)
Minimalist Cryptography
Minor Application
Minutia Exchange
Mis Training Institute
Misappropriation
Misappropriation (WLAN attack)
Misconfiguration
Misnamed Files
Mission Assurance Category (C.F.D.)
Mission Critical
Mission Support Information
Mission-Critical Element
Mission-Critical Functionality
Misuse Of Controlled Unclassified Information
MOA
Mobile Application Management
Mobile Code Risk Categories
Mobile Data Terminal
Mobile Device Management
Mobile Prefix Advertisement
Mobile Prefix Solicitation
Mobile Software Agent
Mobile Subscriber Integrated Services Digital Network
Mobility Header
Mobility Header (IPv6 extension header)
Mode Of Operation
Moderate Impact
Moderate Impact System
Moderate-Impact
Moderate-Impact System
Modification, Access, And Creation
Modified Condition Decision Coverage
Modular Contracting
Modular Exponential
Modular Exponential Diffie-Hellman Group
Morale, Welfare, And Recreation
Most Significant Bit
Most Significant Bit(s)
MOU/A
MPA
MS-CHAP
MTA
MUA
Multicast
Multicast Addresses
Multicast Listener Discovery
Multicast Listener Discovery Version 1
Multicast Listener Discovery Version 2
Multicast Security
Multi-Exit Discriminator
Multi-Factor
Multifactor Authentication
Multi-Hop Relay Topology
Multi-Level Cross Domain Solution
Multi-Level Security Domain
Multimedia Card
Multi-Media Card
Multimedia Messaging Service
Multiple Factor Authentication
Multiprotocol Label Switching
Multipurpose Internet Mail Extensions
Multi-Rate Padding
Multi-Releasable
Mutual Authentication
NA
NAC
NACI
NAK
Name Server
Naming Authority
NAP
NAPT
NAPT-PT
NARA
NAS
NASPO
NAT
National Agency Check
National Agency Check And Inquiries
National Agency Check With Inquiries
National Agency Check With Written Inquiries
National Archives And Records Administration
National Checklist Program
National Comsec Incident Reporting System
National Crime Information Center
National Criminal History Check
National Cyber Security Division
National Cybersecurity And Communications Integration Center
National Fire Protection Association
National Industrial Security Program Operating Manual
National Information Assurance Partnership
National Information Infrastructure
National Infrastructure Security Coordination Centre
National Institute Of Justice
National Institute Of Standards And Technology
National Institute Of Standards And Technology Interagency Or Internal Report
National Institute Of Standards And Technology Interagency Or Internal Reports
National Institute Of Standards And Technology Interagency Report
National Institute of Standards and Technology Internal Report
National Law Enforcement And Corrections Technology Center.North East
National Scada Testbed
National Security Agency
National Security Emergency Preparedness Telecommunications Services
National Security Information
National Security System
National Security Telecommunications And Information System Security Instruction
National Software Reference Library
National Strategy for Trusted Identities in Cyberspace
National Technical Information Service
National Voluntary Laboratory Accreditation Program
National Vulnerabilities Database
National Vulnerability Database
National Vulnerability Databaseformerly Known As I-Cat
National White Collar Crime Center
Nationwide Public Safety Broadband Network
Native Virtualization
NAT-PT
NAT-T
Natural Language Policy
NBA
NBAD
NDA
Near Field Communication
Near Field Communications
Needs Assessment
Need-To-Know Determination
Neighbor Advertisement
Neighbor Solicitation; Name Server
Neighbor Unreachability Detection
Netbios Extended User Interface
Net-Centric Architecture
Network Access
Network Access Control
Network Access Protection
Network Address And Port Translation
Network Address Port Translator—Protocol Translator
Network Address Translation
Network Address Translation Traversal
Network Address Translation—Protocol Translation
Network Administrator
Network Attached Storage
Network Authorization
Network Basic Input/Output System
Network Behavior Analysis
Network Behavior Analysis System
Network Behavior Anomaly Detection
Network File Sharing
Network Forensic Analysis Tool
Network Information Service
Network Information System
Network Interface Card
Network Layer
Network Layer Security
Network Map
Network Mapping
Network Tap
Network Traffic
Network Vulnerability Scanners
Network-Based Intrusion Detection And PRevention System
Next Header
Next Header (IPv6 Field)
NFAT
NFPA
NIAP
Niche Cross Domain Solution
NIST Fingerprint Image Quality
NIST Interagency Report
NIST Personal Identity Verification Program
Nist Special Publication
NIST-allowed
NIST-approved
Non- Repudiation
Non-Assurance Message
Non-Deterministic Random Bit Generator
Non-Deterministic Random Bit Generatornon-Deterministic Rbgnrbg
Non-Disclosure Agreement
Nondiscretionary Access Control
Non-Discretionary Access Control
Nonfederal Information System
Nonfederal Organization
Non-Line-Of-Sight Signal Propagation
Nonlocal Maintenance
Non-Local Maintenance
Non-Organizational User
Non-Public Personal Information
Non-Repudiation
Nonvalidating DNSSEC-Aware Stub Resolver
Nonvalidating Stub Resolver
Non-Volatile Data
Normalization
Normalize
North American Electric Reliability Council
North American Security Products Organization
Not Acknowledged
NSA
NSA-approved commercial solution
NSA-Approved Cryptography
NSA-approved product
NSS baselines
NT LanManager
Nuclear Command And Control Information Assurance Material
NVLAP
OAEP
OASIS
Object Linking And Embedding
Object Linking And Embedding For Process Controlopc
Object Naming Service
Obligation
Obscured Data
Occupation Safety And Health Administration
OEM Service Release 2
Of Operation (Mode)
Off-Card
Offensive Cyberspace Operations
Office Of E-Health Standards And Services
Office Of Engineering And Technology
Office Of Inspector General
Office Of Management And Budget
Office Of Personnel Management
Office Of The Chief Information Officer
Office Of The Director Of National Intelligence
Office Of The Inspector General
Official Information
Off-Line Attack
OGSA
On-Access Scanning
On-Card
On-Card Biometric Comparison
On-Card Comparison
On-Demand Scanning
On-Demand Self-Service
One-Part Code
One-Time Pad
One-Time Password
One-Time Tape
One-To-Many
One-Way Hash Algorithm
One-Way Transfer Device
Ongoing Assessment
Ongoing Assessment And Authorization
Ongoing Authorization
Online Attack
Online Certificate Status Protocol
Online Guessing Attack
opad
Open Checklist Interactive Language
Open Checklist Interactive Language 2.0
Open Database Connectivity
Open Grid Services Architecture
Open Pretty Good Privacy
Open Shortest Path First
Open Shortest Path First version 2 (for IPv4)
Open Shortest Path First version 3 (for IPv6)
Open Source Security Testing Methodology Manual
Open Source Software
Open Storage
Open Trusted Technology Provider™ Standard
Open Virtualization Format
Open Vulnerability And Assessment Language
Open Vulnerability And Assessment Language 5.8
Open Vulnerability Assessment Language
Open Web Application Security Project
Operating System
Operating System Fingerprinting
Operating System Virtualization
Operation
Operation Card Verifiable
Operational Control
Operational Controls
Operational Countermeasure
Operational Environment
Operational Key
Operational Phaseoperational Use
Operational Resilience
Operational Services
Operational Storage
Operational Test
Operational Use
Operational Waiver
Operations Code
Operations Security
Operator
Optical Disk
Optimal Asymmetric Encryption Padding
Optional Modification
ORA
Orchestration
Ordering Privilege Manager