Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Glossary

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z  |  Symbols

c

Acronym(s):

None

Definition(s):

  The capacity of a sponge function.
Source(s): FIPS 202

  Ciphertext; an integer.
Source(s): NIST SP 800-56B Rev. 1

Synonym(s):

None

See Also:
(t + k)-way combination coverage
64-Bit Intel Itanium Architecture
A Cloud Infrastructure
A MAC tag
a, b, c, …, h
AASC
ABAC
Abstract Syntax Notation 1
Abstract Syntax Notation One
Abstract Syntax Notion One
AC
Acceptable
Acceptable Risk
Acceptance
Access
Access Authentication
Access Authority
Access Control
Access Control (NIST SP 800-53 security control family)
Access Control Entry
Access Control List
Access Control Mechanism
Access Control Rule
Access Control System
Access Cross Domain Solution
Access Level
Access List
Access Point
Access Profile
Access Type
Access-Control Mechanism
Account Management (User)
Accountability
Accounting Legend Code
Accounting Number
Accredit
Accreditation
Accreditation (C.F.D.)
Accreditation Authority
Accreditation Boundary
Accreditation Boundary (C.F.D.)
Accreditation Package (C.F.D.)
Accredited Standards Committee
Accrediting Authority
Accrediting Authority (C.F.D.)
ACE
ACL
ACM
ACO
ACPI
Acquirer
Acquisition
Acquisition, Development, And Installation Controls
ACR
ACS
Activation Data
Activation/Issuance
Active Attack
Active Attack (WLAN attack)
Active Content
Active Cyber Defense
Active Directory
Active Security Testing
Active State
Active Tag
Activities
Activities (assessment)
ACTS Covering Array Generator
Actual Cost Of Work Performed
Actuator
ACWP
Ad Hoc Mode
Ad Hoc Network
Adaptive Frequency Hopping
Additional Authenticated Data
Additional Authentication Data
Add-On Security (C.F.D.)
Address Of Record
Address Resolution Protocol
Adequate Security
Administrative Account
Administrative Incident (COMSEC)
Advanced Configuration And Power Interface
Advanced Encryption Standard
Advanced Encryption Standard (as Specified In FIPS 197)
Advanced Encryption Standard–Counter With Cbc-Mac
Advanced Key Processor
Advanced Persistent Threat
Advanced Persistent Threats
Advanced Technology Attachment
AES-CBC
AES-CCM
AES-Cipher Block Chaining
AES-CMAC(k, M)
AES-Counter Mode
AES-CTR
Affiliated Covered Entities
Africa Network Information Centre
AfriNIC
After Action Report
Agency
Agency CA
AIDC
ALC
Algorithm Security Lifetime
All Source Intelligence
Allocation
All-Source Intelligence
Alternate COMSEC account manager
alternate COMSEC custodian (C.F.D.)
Alternate Facility
Alternate MAC/PHY
Alternating Current
Alternating Current Drive
American Gas Association
American National Standard
American National Standards Institute
American Petroleum Institute
American Registry For Internet Numbers
American Registry Of Internet Numbers
American Society For Testing And Materials
American Standard Code For Information Interchange
An Object
Analysis Approach
Analytic Systems
Announcement Traffic Indication Message
Anomaly-Based Detection
Anti-Forensic
Anycast Addresses
APEC
APNIC
App Security Requirement
App Vetting Process
Applicant
Application
Application Control Programs
Application Firewall
Application Identifier
Application Layer
Application Layer Gateway
Application Level Gateway
Application Program Interface
Application Program Interfaces
Application Programming Interface
Application Property Template
Application Protocol Data Unit
Application Server
Application Session
Application Translation
Application Virtualization
Application Whitelist
Application Whitelisting Technologies
Application-Based Intrusion Detection And Prevention System
Application-Proxy Gateway
Application-Specific Integrated Circuits
Approved Entropy Source
Approved Hash Function
Approved Security Function
Architecture
Archive
Archive (key and/or metadata)
Archive (Noun)
Archive (Verb)
Archive Facility
Artificial Intelligence
ASC
ASCII
Asia Pacific Network Information Centre
Asia-Pacific Economic Cooperation
ASIC's
Assertion Reference
Assessment Approach
Assessment Object
Assessment Objective
Assessment Procedure
Asset Identification
Associated Data
Associated Federal Organizations
Associated Federal-State Organizations
Associated Metadata
Associated Metadataalso Metadata
Association
Association For Automatic Identification And Mobility
Association Function
Association Request
Association Response
Assurance
Assurance Case
Assurance Message
Assurance Of Domain Parameter Validity
Assurance of integrity
Assurance Of Possession
Assurance Of Possession (private key)
Assurance Of Possession Of A Private Key
Assurance Of Private-Key Possession
Assurance Of Public Key Validity
Assurance Of Validity
assurance_level
assurance_time
Assurance-Signature
asymmetric
Asymmetric Cryptographic Algorithm
Asymmetric Cryptography
Asymmetric Key
Asymmetric Key Algorithm
Asymmetric Keys
Asymmetric-Key Algorithm
Asymptotic Analysis
Asymptotic Distribution
Asynchronous Transfer Mode
Attack
Attack Free
Attack Sensing And Warning
Attack Signature
Attacker
Attribute And Authorization Services Committee
Attribute Based Access Control
Attribute Practice Statement
Attribute Protocol
Attribute-Based Access Control
Audit And Accountability
Audit And Accountability (NIST SP 800-53 security control family)
Audit Record
Audit Reduction Tools
Authenticable Entity
Authenticate
Authenticated Cipher Offset
Authenticated Data
Authenticated Decryption
Authenticated Encryption
Authenticated Encryption With Associated Data
Authenticated RFID
Authenticated-Decryption Function
Authenticated-Encryption Function
Authentication
Authentication And Key Management
Authentication Chain
Authentication Code
Authentication Credentials
Authentication Framework
Authentication Header
Authentication Header (IPv6 extension header)
Authentication Header Protocol
Authentication Key
Authentication Mechanism
Authentication Method
Authentication Period
Authentication Protocol
Authentication Protocol Run
Authentication Protocols
Authentication Secret
Authentication Server
Authentication Service
Authentication Tag
Authentication Tagtag
Authentication, Authorization And Accounting
Authentication, Authorization, And Accounting
Authentication, Authorization, And Accounting Key
Authenticator
Authenticity
Authoritative Time Source
Authorization Package
Authorize Processing
Authorized Data Security Association List
Authorizing Official
Authorizing Official Designated Representative
Automated Security Monitoring
Automatic Identification And Data Capture
Automatic Identification Technology
Automatic Remote Rekeying
Awareness, Training, And Education Controls
BAC
Back Channel
Backdoor
Backhaul
Backscatter Channel
Backtracking Resistance
Backup
Backup (key and/or metadata)
Backup (system)
Backup Facility
Base Station Controller
Base Transceiver Station
Baseline Configuration
Baseline Criticality
Baseline Security
Baseline Security Requirement
Baseline Security Requirements
Basic Encode Rules
Basic Encoding Rules
Basic Encoding Rules Tag-Length-Value
Basic Input/Output System
Basic Rate
Basic Service Set
Basic Service Set Identifier
Basic Testing
Basis Vector
Batch Process
BCA
BCD
BCP
BCWP
BCWS
Beacon
Behavior Blockers
Behavioral Outcome
BER-TLV Data Object
Best Current Practice
Better Than Nothing Security
Bi-Directional
Binary Coded Decimal
Binary Sequence
Binding Cache (on HA or CN)
Binding Update Acknowledgement
Biometric
Biometric Data Block
Biometric Information
Biometric Information Template
Biometric Service Provider
Biometrics
Bits Of Security
Bitwise Exclusive-Or
BLACK
Black Box Testing
Black Core
BLACK data
Blacklist
Blacklisting
Blended Attack
Block
Block Cipher
Block Cipher Algorithm
Block Cipher Key
Block Cipher Mode Of Operation
Block Size
Blu-Ray Disc
Body Of Evidence
Boot Device Selection
Border Gateway Protocol
Border Gateway Protocol 4
Boundary Protection
Boundary Protection Device
Bring Your Own Device
Broad Network Access
Broadcast
Brute Force Password Attack
BSC
Budget Cost Of Work Performed
Budgeted Cost Of Work Scheduled
Buffer Overflow Attack
Bulk Encryption
Bump In The Stack
Business Associate
Business Associate Contract
Business Case Analysis
Business Continuity Plan
Business Impact Analysis
Business Impact Assessment
Business Process Markup Language
Business Process Specification Schema
Business Reference Model
C&A
C(ie)
C(ie,js)
C, C0, C1
C.F.D.
C.F.R.
CA
CA Facility
CAC
CAIDA
CAK
Call Back
Call Detail Record
Call Processor
Candidate Checklist
Canister (COMSEC; C.F.D.)
CAP
Capability Maturity Model Integration
Capacity
CAPCO
CAPEC
Capital Planning And Investment Control
Capital Planning Investment Control
Capital Programming
CAPP
CAPTCHA
Capture
Card
Card Application
Card Authentication Key
Card Capability Container
Card Holder Unique Identifier
Card Management
Card Management System
Card Management System To The Card
Card Verifiable Certificate
Cardholder
Cardholder To Card
Cardholder To External System
Cardholder Unique Identifier
Cardiopulmonary Resuscitation
Care Of Address
Care-Of Address
CARL
Carrier-Grade NAT
Cascading (Cross Domain)
Categorization
Category (C.F.D.)
CAVP
CAW
CBC
CBC-MAC
CBEFF
CBSR
CC
CCB
CCC
CCE
CCEP
CCEVS
CCI
CCIPS
CCM
CCMP
CCRB
CCSS
ccTLD
CD
CD File System
CDF
CDFS
CDH
CDMA
CDMA Subscriber Identity Module
CDR
CD-R
CD-Read Only Memory
CD-Rewritable
CD-ROM
CD-RW
CDS
CDS Filtering
CE
Cellular Network Isolation Card
Cellular Telecommunications And Internet Association
Center For Education And Research In Information Assurance And Security
Center For Internet Security
Center For Magnetic Recording Research
Centers For Medicare And Medicaid Services
Centimeter
Central Facility
Central Limit Theorem
Central Management
Central Office Of Record
Central Oversight Authority
Central Processing Unit
Central Service Node
Central Services Node
Centre For The Protection Of National Infrastructure
CEO
CERIAS
CERT
CERT® Coordination Center
CERT®/CC
Certificate
Certificate Authority
Certificate Authority Workstation
Certificate Holder
Certificate Management
Certificate Management Authority
Certificate Management System
Certificate Policy
Certificate- Related Information
Certificate Revocation List
Certificate Status Authority
Certificate Status Server
Certificate User
Certificatecertification Authority
Certificate-Related Information
Certificates
Certificate-Using System
Certification
Certification Agent
Certification Anaylist
Certification And Accreditation
Certification Authority
Certification Authority Revocation List
Certification Authority Software
Certification Authority Workstation (C.F.D.)
Certification Package (C.F.D.)
Certification Path
Certification Practice Statement
Certification Practices Statement
Certification Test And Evaluation
Certification, Accreditation, And Security Assessments (NIST SP 800-53 security control family)
Certified Tempest Technical Authority
Certifier (C.F.D.)
Certify
CF
CFB
CFD
CFI
CFO
CFR
CFRDC
CFTT
CGA
CGE
CGI
CGN
Chain Of Custody
Chain Of Evidence (C.F.D.)
Chain Of Trust
Chained Secure Zone
Chaining
Chain-Of-Trust
Challenge And Reply Authentication
Challenge Handshake Authentication Protocol
Challenge-Handshake Authentication Protocol
Challenge-Response Protocol
Change Control Board
Channel Binding
Channel Scanning
CHAP
Check Word
Checking Disabled
Checksum
Chemical Industry Data Exchange
Chief Executive Officer
Chief Financial Officer
Chief Information Officer
Chief Information Security Officer
Chief Operating Officer
Chief Privacy Officer
Chief Security Officer
Chief Technology Officer
Children‘S Online Privacy Protection Act
Chinese Remainder Theorem
Choreography
CHUID
CHVP
CI
CIAC
CIDR
CIDX
CIFS
CIGRE
CIK
CIMA
CIO
CIP
Cipher
Cipher Block Chaining
Cipher Block Chaining Message Authentication Code
Cipher Block Chaining-Message Authentication Code
Cipher Feedback
Cipher Key
Cipher Text Auto-Key
Cipher Text/Ciphertext
Cipher-based MAC
Cipher-Based Message Authentication Code
Ciphersuite
Ciphersuite Negotiation
Ciphertext
CIPSEA
CIRC
CIRT
CIS
Cisco Global Exploiter
CISO
CKG
CKL
CKMS
CKMS
CKMS (Component)
CKMS (Device)
CKMS design
CKMS designer
CKMS developer
CKMS implementer
CKMS Module
CKMS product
CKMS Profile
CKMS Security Policy
CKMS vendor
Claimant
Claimed Address
Claimed Signatory
Classified Information
Classified Information Spillage (C.F.D.)
Classified National Security Information
Classless Interdomain Routing
Classless Inter-Domain Routing
Clean Word List
Clear
Clear Text
Clearance
Cleartext
CLI
Client
Client (application)
Client (or PKI client)
Client Application
Client Device
Client Node
Client/Server
Clinger-Cohen Act Of 1996
Cloned Tag
Closed Security Environment
Closed Source Operating System
Closed Storage
Closed System
Closeout
Cloud Computing
Cloud Consumer
Cloud Infrastructure
Cloud Provider
CLR
Cluster
cm
CMA
CMAC
CMCS
CMDAUTH
CMDB
CMMI
CMOS
CMRR
CMS
CMTC
CMVP
CN
CNA
CND
CNE
CNIC
CNO
CNSS
CNSSI
CO
CoA
Coalition Partner
Code
Code Analysis
Code Division Multiple Access
Code Group (C.F.D.)
Code Of Federal Regulations
Code Vocabulary (C.F.D.)
Codebook
Codec
Cofactor
Cofactor Diffie-Hellman
COG
Cognizant Security Officer/Authority
COI
Cold Site
Collateral Information
Collection
Collision
Collision Resistance
Column
COM
Comma Separated Values
Command And Control
Command Authority (COMSEC)
Command Line Interface
Command-Line Interface
commercial COMSEC evaluation program
Commercial Off-The-Shelf
Commercial Solutions For Classified
Commercial-Off-The-Shelf
Committee For National Security Systems
Committee On National Security Systems
Committee On National Security Systems Instruction
Commodity Service
Common Access Card
Common Attack Pattern Enumeration & Classification
Common Attack Pattern Enumeration And Classification
Common Biometric Exchange Formats Framework
Common Carrier
Common Configuration Enumeration
Common Configuration Enumeration 5
Common Configuration Scoring System
Common Control
Common Control Provider
Common Criteria
Common Criteria Evaluation And Validation Scheme
Common Criteria Evaluation Assurance Level
Common Fill Device
Common Gateway Interface
Common Internet File System
Common Language Runtime
Common Object Request Broker Architecture
Common Platform Enumeration
Common Platform Enumeration 2.2
Common Secure Configuration
Common Security Control
Common Services Provider
Common User Application Software
Common Vulnerabilities And Exposures
Common Vulnerabilities Scoring System
Common Vulnerability Enumeration
Common Vulnerability Scoring System
Common Vulnerability Scoring System 2.0
Common Weakness Enumeration
Common Weakness Scoring System
communication channel
Communications Cover
Communications Deception (C.F.D.)
Communications Profile
Communications Router
Communications Security
Communications Security Establishment
Communications Security Establishment Of The Government Of Canada
Community Cloud
Community Of Interest
Community Risk
Compact Disc
Compact Disc Read Only Memory
Compact Disc Read/Write
Compact Disc Recordable
Compact Disk
Compact Flash
Comparison
Compartmentalization
Compatible Security Domains
Compensating Security Control
Compensating Security Controls
Competent Security Official
Complementary Error Function
Complementary Metal Oxide Semiconductor
Completely Automated Public Turing Test To Tell Computers And Humans Apart
Compliance
Compliant CKMS
Component
Component Object Model
Component Schema
Component Specification
Component Test
Componentkey Component
Composed Commercial Solution
Compound Key
Comprehensive Test
Comprehensive Testing
Compressed File
Compression Parameter Index
Compromise
Compromise
Compromise (Automated Information Systems)
Compromise (General)
Compromise (noun)
Compromise (verb)
Compromise Recovery
Compromised Key List
Compromised State
Compromising Emanations
COMPUSEC
Computer
Computer Abuse
Computer And Financial Investigations
Computer Crime And Intellectual Property Section
Computer Cryptography
Computer Emergency Readiness Team
Computer Forensics
Computer Forensics Research And Development Center
Computer Forensics Tool Testing
Computer Incident Advisory Capability
Computer Incident Response Capability
Computer Incident Response Center
Computer Incident Response Center or Computer Incident Response Capability
Computer Incident Response Team
Computer Information Security Officer
Computer Matching Agreement
Computer Network Attack
Computer Network Defense
Computer Network Exploitation
Computer Network Operations
Computer Processing Unit
Computer Security
Computer Security (C.F.D.)
Computer Security Division
Computer Security Incident (C.F.D.)
Computer Security Incident Response Capability
Computer Security Incident Response Team
Computer Security Log Management
Computer Security Object (C.F.D.)
Computer Security Objects Register
Computer Security Objects Register (C.F.D.)
Computer Security Objects Registry
Computer Security Policy
Computer Security Resource Center
Computer Security Subsystem (C.F.D.)
Computerized Telephone System
Computing Environment
Computing Security Methods
COMSEC
Comsec Account
Comsec Account Audit
Comsec Account Manager
Comsec Aids
Comsec Assembly (C.F.D.)
Comsec Boundary (C.F.D.)
Comsec Chip Set (C.F.D.)
Comsec Control Program (C.F.D.)
Comsec Custodian (C.F.D.)
Comsec Demilitarization (C.F.D.)
Comsec Element (C.F.D.)
Comsec Emergency
Comsec End-Item
Comsec Equipment
Comsec Facility
Comsec Incident
Comsec Incident Monitoring Activity
Comsec Insecurity
Comsec Manager
Comsec Material
Comsec Material Control System
Comsec Module (C.F.D.)
Comsec Monitoring
Comsec Profile (C.F.D.)
Comsec Service Authority
Comsec Software
Comsec Survey
Comsec System Data (C.F.D.)
Comsec Training
CONAUTH
Concept Of Operation
Concept Of Operations
Condition Coverage
Confidential Information Protection And Statistical Efficiency Act
Confidentiality
Confidentiality
Confidentiality Mode
Configurable
Configuration
Configuration (of a system or device)
Configuration Baseline
Configuration Control
Configuration Control Board
Configuration Control Review Board
Configuration Controlor Configuration Management
Configuration Item
Configuration Management
Configuration Management (NIST SP 800-53 security control family)
Configuration Management Database
Configuration Management Plan
Configuration Settings
Configured Tunnels
Conformance Testing
Connection Signature Resolving Key
CONOP
CONOPS
Consent Banner
Console
Consortia
Consumer
Consumer Device
Consuming Application
Contagion Research Center (fictional)
Container
Contamination
Content Consumer
Content Filtering
Content Generator
Content Producer
Content Signing Certificate
Context Handler
Context Of Use
Contingency Key
Contingency Plan
Contingency Planning
Contingency Planning (NIST SP 800-53 security control family)
Continuity Of Government
Continuity Of Operations
Continuity Of Operations Plan
Continuous Assessment (process)
Continuous Monitoring
Continuous Process
Contract
Contract Administration
Contract Administration Office
Contracting Office
Contracting Officer
Contracting Officer’S Technical Representative
Contracting Officer'S Technical Representative
Control
Control Algorithm
Control Cell
Control Center
Control Correlation Identifier
Control Frame
Control Gate
Control Information
Control Loop
Control Network
Control Server
Control System
Control System Security Center
Controlled Access Area
Controlled Access Program Coordination Office
Controlled Access Protection (C.F.D.)
Controlled Access Protection Profile
Controlled Area
Controlled Cryptographic Item
controlled cryptographic item (CCI) assembly
controlled cryptographic item (CCI) component
controlled cryptographic item (CCI) equipment
Controlled Interface
Controlled Space
Controlled Unclassified Information
controlled unclassified information (CUI) registry
Controlled Variable
Controller
Controlling Authority
Controlling Domain
Conventional BIOS
Conversation
COO
Cookie
COOP
Cooperative Association For Internet Data Analysis
Cooperative Key Generation
Cooperative Remote Rekeying Correctness Proof
Coordination
COPPA
Copy (data)
COR
CORBA
Core Root Of Trust For Measurement
Corrective Action Plan
Correlation
Correspondent Node
Cost
Cost, Benefit, Schedule, And Risk
COTR
COTS
COTS product
Counter
Counter Mode
Counter Mode For A Block Cipher Algorithm
Counter Mode with Cipher Block Chaining Message Authentication Code
Counter Mode with Cipher Block Chaining Message Authentication Protocol
Counter with Cipher Block Chaining-Message Authentication Code
Counterfeit (Goods)
Counterintelligence
Countermeasure
Countermeasures
Counter-Mode/CBC-MAC Protocol
Country-Code Top-Level Domain
Courier
Course Of Action
Course Of Action (risk response)
Court Services And Offender Supervision Agency
Cover
Coverage
Coverage Measurement Tool
Cover-Coding
Covered Entities
Covert Channel
Covert Channel Analysis
Covert Storage Channel
Covert Testing
Covert Timing Channel
CoverTRANSEC
CP
CPE
CPI
CPIC
CPNI
CPO
CPR
CPS
CPU
Cradle
CRC
Credential
Credential Service Provider
Critical Component
Critical Infrastructure
Critical Infrastructure Protection
Critical Infrastructure Sectors
Critical Security Parameter
Critical Security Parameters
Critical Value
Criticality
Criticality Analysis
Criticality Level
CRL
Crl Distribution Point
CRM
Cross Certificate
Cross- Certificate
Cross Certification
Cross Domain
Cross Domain Baseline List
Cross Domain Capabilities
Cross Domain Enabled
Cross Domain Portal
Cross Domain Service
Cross Domain Solution
Cross Domain Solutioncds Filtering
Cross Domain Sunset List
Cross Site Request Forgery
Cross Site Scripting
Cross-Certificate
CRT
CRTM
Cryptanalysis
Cryptanalyze
CRYPTO
Crypto Officer
crypto-algorithm
crypto-ancillary equipment
cryptoequipment
Cryptographic
Cryptographic (Binding)
Cryptographic (Key)
Cryptographic (Module)
Cryptographic Alarm
Cryptographic Algorithm
Cryptographic Algorithm
Cryptographic Algorithm Validation Program
Cryptographic Ancillary Equipment
Cryptographic Binding
Cryptographic Boundary
Cryptographic Boundary
Cryptographic Component
Cryptographic Equipment
Cryptographic Erase
Cryptographic Hash Function
Cryptographic High Value Product
Cryptographic Ignition Key
Cryptographic Incident
Cryptographic Initialization
Cryptographic Key
Cryptographic key component
Cryptographic Key Management System
Cryptographic Key Management System(s)
Cryptographic Keykey
Cryptographic Logic
Cryptographic Material
Cryptographic Message Syntax
Cryptographic Module
Cryptographic Module
Cryptographic Module (compromised)
Cryptographic Module Boundary
Cryptographic Module Security Policy
Cryptographic Module Validation Program
Cryptographic Net
Cryptographic Officer
Cryptographic Operation
Cryptographic Period
Cryptographic Product
Cryptographic Randomization
Cryptographic Security
Cryptographic Service Provider
Cryptographic Solution
Cryptographic Synchronization
Cryptographic System
Cryptographic System Analysis
Cryptographic System Evaluation
Cryptographic System Review
Cryptographic System Survey
Cryptographic Token
Cryptographically Generated Address
Cryptography
Cryptologic
Cryptology
Cryptomaterial
cryptonet
Cryptonet Evaluation Report
Cryptoperiod
cryptosecurity
cryptosystem
CS
CSA
CSD
CSE
CSfC
CSIM
CSIR
CSIRC
CSIRT
CSN
CSO
CSOR
CSOSA
CSP
CSRC
CSRF
CSRK
CSS
CSSC
CSV
CT&E
CTAK
CTC
CTE
CTI
CTIA
CTK
CTO
CTR
CTS
CTTA
CUAS
CUI
CUI categories or subcategories
CUI Executive Agent
CUI program
CUI registry
Cumulative Distribution Function F(X)
Current Year
Custom Environment
Customer
Customer Relationship Management
Customization
Cut
CVC
CVE
CVSS
CWE
CWSS
CY
Cyber Attack
Cyber Incident
Cyber Incident Response Team
Cyber Red Team
Cyber Security
Cybersecurity
Cyberspace
Cyberspace Attack
Cyberspace Capability
Cyberspace Defense
Cyberspace Operations
Cyberspace Superiority
Cycle Time
Cyclic Redundancy Check
Cyclical Redundancy Check
DAC
Daily Use Account
Data Access Object
Data And Information Reference Model
Data Blockblock
Data Collector
Data Encryption Algorithm
Data Encryption Security Association Type Indicator
Data Encryption Standard
Data Encryption Standard Electronic Code Book
Data Execution Prevention
Data Flow Control
Data Governance
Data Key, Data Encrypting Key
Data Modification
Data Object
Data Origin Authentication
Data Protection Key
Data Provenance
Data Recovery Agent
Data Transfer Device (COMSEC)
DC Servo Drive
DCE
DCO
DCOM
DCO-RA
DCS
Deactivated State
Deauthentication
Decapsulation
Decertification
Decibels Referenced To One Milliwatt
Decipher
Decision Or Branch Coverage
decision trigger
Decode
Decrypt
Decryption
Decryption-Verification
Decyphering
Dedicated Line
Dedicated Proxy Server
Deep Packet Inspection
Default Classification
Defense Advanced Research Projects Agency
Defense Discovery Metadata Standard
Defense Information Systems Agency
Defensive Cyberspace Operation Response Action
Defensive Cyberspace Operations
Delegated Accrediting Authority
Delivery-Only Client (C.F.D.)
Delta-Crl
Denial Of Service
Denial Of Service (WLAN attack)
Department Of Health And Human Services
Department Of Homeland Security
Department Of Justice
Deprecated
Deprecated Address
Derived Credential
Derived PIV Application
Derived PIV Credential
Derived PIV Credentialand Associated Token Issuer
DES MAC
DES-ECB
Designated Accrediting Authority
Designated Authorizing Official
Designated Cipher Function
Destroyed Compromised State
Destruction
Detection Error Tradeoff ((characteristic))
Deterministic Algorithm
Deterministic Random Bit Generator
deterministic random number generator
Development, Modernization, And/Or Enhancement
Device
Device Distribution Profile
Device Registration Manager
Device_ID
DHCP
DHCP Unique Identifier
DHCPv4
DHCPv6
Diagnostics
Dictionary Attack Resistance
Differentiated Services
Diffie-Hellman Key Exchange
Digital Encryption Standard
Digital Evidence
Digital Forensics
Digital Identity Management Service
Digital Policy
Digital Policy Management
Digital Subscriber Line
Digital Versatile Disc
Digital Video Disc
Direct Application Access
direct BLACK wireline
Direct Random String
Directory
Directory Service
Disassociation
Disaster Recovery
Disaster Recovery Plan
Disclosure Of Information
Disconnection
Discovery
Discovery Service
Discrete Logarithm Cryptography
Discrete Process
Discretionary Access Control
Disinfect
Disinfecting
Disk-To-Disk Copy
Disk-To-File Copy
Distinguished Encoding Rules
Distributed Component Object Model
Distributed Computing Environment
Distributed Control System
Distributed Control System(s)
Distributed Denial Of Service
Distributed denial-of-service attack
Distributed Energy Technology Laboratory
Distributed Intrusion Detection System
Distributed Network Protocol
Distributed Transaction Coordinator
Disturbance
DLC
DMARC
DNS Security Extensions
DNSSEC
DNSSEC-Aware Name Server
DNSSEC-Aware Recursive Name Server
DNSSEC-Aware Resolver
DNSSEC-Aware Stub Resolver
DOC
Document Type Definition
DoD Discovery Metadata Standard
Domain Controller
Domain Name System Security Extensions
Domain Name System-Application Layer Gateway
Domain-Based Message Authentication, Reporting & Conformance
Dots Per Inch
DPCI
DRBG Mechanism Boundary
Driver Execution Environment
DTC
Dual Control
Dual Stack Transition Mechanism
Dual Use Certificate
Duplicate Address Detection
Duplicate Digital Evidence
Duty Cycle
Dynamic Analysis
Dynamic Authentication
Dynamic Frequency Selection
Dynamic Home Agent Address Discovery
Dynamic Host Configuration Protocol
Dynamic Host Configuration Protocol For Ipv4
Dynamic Host Configuration Protocol For Ipv6
Dynamic Link Library
Dynamic Subsystem
e- authentication
EAP execution
EAPOL-KCK
E-Authentication Assurance Level
Eavesdropping Attack
EC
EC2N
ECB
ECC
ECDH
ECDHE
ECDS
ECDSA
ECM
ECN
E-Commerce
Ecordable
ECP
ECU
EDC
Education
Education
Effective Period
EICAR
Electric Power Research Institute
Electrically Erasable Programmable Read-Only Memory
Electromagnetic Compatibility
Electromagnetic Environmental Effects
Electromagnetic Interference
Electronic Article Surveillance
Electronic Authentication
Electronic Biometric Transmission Specification
Electronic Business (C.F.D.)
Electronic Business Xml
Electronic Code Book
Electronic Codebook
Electronic Credentials
Electronic Data Interchange
Electronic Evidence
Electronic File System
Electronic Fill Device
Electronic Key Entry
Electronic Key Management System
Electronic Mail
Electronic Media
Electronic Messaging Services
electronic PHI
Electronic Product Code
Electronic Product Code Information Services
Electronic Product Codeepc Identifier
Electronic Protected Health Information
Electronic Serial Number
Electronic Signature (C.F.D.)
Electronically Erasable Programmable Read-Only Memory
Electronically Generated Key
Electronically Stored Information
Electronically-Erasable Programmable Read-Only Memory
Element Processes
Elliptic Curve
Elliptic Curve Cryptography
Elliptic Curve Diffie-Hellman
Elliptic Curve Diffie–Hellman
Elliptic Curve Digital Signature Algorithm
Elliptic Curve DSA
Elliptic Curve Group Modulo A Prime
Elliptic Curve over G[2N]
Embedded Computer (C.F.D.)
Embedded IPv4 Unicast
Embedded Universal Integrated Circuit Card
EMC
Emergency Action Plan
Emergency Medical Services
Emergency Medical Technician
Emergency Response Team
Emission Security
EMSEC
Encapsulating Security Payload
Encapsulating Security Payload Header (IPv6 extension header)
Encapsulating Security Payload Protocol
Encapsulating Security Protocol
Encapsulation
Enclave
Enclave Boundary
Encode
Encrypt
Encrypted Diversifier
Encrypted File System
Encrypted Key
Encrypted Network
Encrypting File System
Encryption
Encryption Algorithm
Encryption Certificate
Encryption Control Protocol
Encryption Root
Encyphering
End Cryptographic Unit
End User Device
End User License Agreement
End-Item Accounting
Endpoint Protection Platform
End-Point Protection Platform
End-To-End Encryption
End-To-End Security
Enhanced Data for GSM Evolution
Enhanced Data Rate
Enhanced Interior Gateway Routing Protocol
Enhanced Messaging Service
Enhanced Overlay
Enhancements
Enterprise Architecture
Enterprise Configuration Manager
Enterprise Cross Domain Services
Enterprise Cross Domain Services Provider
Enterprise Privacy Authorization Language
Enterprise Resource Planning
Enterprise Resource Planning System
Enterprise Service
Enterprise-Hosted Cross Domain Solutions
Entity Authentication
Entropy Source
Environment Conditions
Environmental Failure Protection
EPC
EPC Identifier
EPCIS
Ephemeral Diffie-Hellman Key Exchange
Ephemeral Elliptic Curve Diffie-Hellman
Equivalent Process
Equivalent Security Domain Policies
Equivalent Security Domains
Erfc
Error Detection Code
Error-Detection Code
Escape
eUICC
European Article Number
European Institute For Computer Antivirus Research
European Telecommunications Standards Institute
Evaluated Products List (C.F.D.)
Evaluation Assurance Level (C.F.D.)
Event Correlation
Event Reduction
Events Per Second
Exclusive OR
Exclusive-OR
Exclusive-Or operation
Exculpatory Evidence
eXecute in Place
Executive Agency
Exercise
Exercise Briefing
Exercise Director
Expected Output
Explicit Congestion Notification
Exploitable Channel
Extended Data Encryption Standard
Extended Sequence Number
Extended Service Set
Extended Validation Secure Sockets Layer
Extensible Access Control Markup Language
Extensible Authentication Protocol
Extensible Authentication Protocol Flexible Authentication Via Secure Tunneling
Extensible Authentication Protocol Over LAN
Extensible Authentication Protocol Over LAN Key Confirmation Key
Extensible Authentication Protocol Over LAN Key Encryption Key
Extensible Authentication Protocol-Transport Layer Security
Extensible Authentication Protocol-Tunneled Transport Layer Security
Extensible Configuration Checklist Description Format
Extensible Configuration Checklist Description Format 1.1.4
Extensible Firmware Interface
Exterior Border Gateway Protocol
Exterior Gateway Protocol
External Information System or Component
External Information System Service
External Information System Service Provider
External Information Systems Service Provider
External Security Testing
Extraction-Then-Expansion
FACCI
Facilitator
Facilitator Guide
Facility
Facility (mobile device)
Facility (static device)
Fail Secure
Failure Access
Failure Control
Fair Information Practice Principles
False Accept Rate
False Accept Rate ((defined over an authentication transaction))
False Acceptance
False Match Rate ((defined over single comparisons))
False Non-Match Rate ((defined over single comparisons))
False Reject Rate
False Reject Rate ((defined over an authentication transaction))
False Rejection
Family Education Rights Privacy Act
FASC-N
Fast Reconnect
Fast User Switching
Fault Injection Testing
FBCA
FBCA Operational Authority
FCC
FCC ID
FCKMS (Component)
FCKMS (compromised)
FCKMS (Device)
FCKMS architecture
FCKMS documentation
FCKMS functions
FCKMS module
FCKMS personnel
FCKMS Security Domain
FCKMS Security Policy
FCKMS service provider
FCKMS service-providing organization
FCKMS services (protections)
FCKMS service-using organization
FCS
FDCC
FDCE
Federal Acquisition Register
Federal Acquisition Regulation
Federal Agency
Federal Agency Smart Credential Number
Federal Bridge Certificate Authority
Federal Bridge Certification Authority
Federal Bridge Certification Authority Membrane
Federal Communications Commission
Federal Communications Commission Identification Number
Federal Cryptographic Key Management System (FCKMS)
Federal Desktop Core Configuration
Federal Emergency Management Agency
Federal Enterprise Architecture
Federal Enterprise Architecture (FEA Program Management Office)
Federal Enterprise Architecture Security And Privacy Profile
Federal Financial Management Improvement Act
Federal Identity Credentialing Committee
Federal Identity, Credential, And Access Management
Federal Information Processing Standard
Federal Information Processing Standard(s)
Federal Information Processing Standards
Federal Information Processing Standards Publications
Federal Information Processing Standards-Validated Cryptography
Federal Information Processing
Standards

Federal Information Security Management Act
Federal Information Security Management Act Of 2002
Federal Information Security Modernization Act
Federal Information System Controls Audit Manual
Federal Information Systems Security Educator’s Association
Federal Information Technology Security Assessment Framework
Federal Law Enforcement Training Center
Federal Managers Financial Integrity Act
Federal Preparedness Circular
Federal Public Key Infrastructure Policy Authority
Federated Development And Certification Environment
FFC
FICAM
FICC
Field Device
File Allocation Table
File Allocation Unit
File Association
File Encryption
File Encryption Key
File Integrity Checking
File Protection
File Slack
File Transfer Protocol
File Transfer Protocol Secure
Fill Device
Final Checklist
Financial Audit Manual
Finite Field Cryptography
FIPS 140 security level
FIPS Publication
FIPS-validated cryptography
Firefly Credential Manager
Firewall Control Proxy
First Parameter Of A Card Command
Fiscal Year
FISCAM
Fixed Comsec Facility
FLETC
Florida Association Of Computer Crime Investigators
Focused Observation
Focused Testing
Folder Encryption
Forensic And Incident Response Environment
Forensic Copy
Forensic Science
Forensic Specialist
Forensically Clean
Forensics
Form Factor
Formal Access Approval
Formal Policy Model
Formatting Function
Forum Of Incident Response And Security Teams
Forward Channel
Forward Cipher Function
Forward Cipher Functionforward Cipher Operation
Forward Cipher Operation
Forward Cipher Operation/Forward Transformation
FPC
Frame Check Sequence
Frame Control Field
Framework Topic
Free Space
Freedom Of Information Act
French Security Incident Response Team
Frequency Hopping
Frequency Hopping Spread Spectrum
Full Disk Encryption
Full/Depot Maintenance
Functional Exercise
Functional Testing
Functionality Testing
Galois Counter Mode
Galois Message Authentication Code
Galois/Counter Mode
Gaussian Frequency-Shift Keying
GCD (a, b)
GCD(a, b)
GCM
General Accountability Office
General Packet Radio Service
General Record Schedule
General Records Schedule
General Services Administration
Generalized TTL Security Mechanism
Generation-Encryption
Generic Access Profile
Generic Attribute Protocol
Generic Routing Encapsulation
Generic Token Card
Generic Top-Level Domain
Geographic location
Geometric Random Variable
Gigabits Per Second
Global Structure/Global Value
Global System For Mobile Communications
Global Unique Identification Number
GMAC
Government Accountability Office
Government Forum Of Incident Response And Security Teams
Government Paperwork Elimination Act
Government Performance And Results Act
Government Smart Card Interoperability Specification
GPMC
Graceful Restart
Gramm-Leach-Bliley Act
Graphical Identification And Authentication
Graphical User Interface
Greatest Common Divisor
Group Authenticator
Group Key Encryption Key
Group Policy Management Console
Group Policy Object
Group Security
Group Security Research Group
Group Traffic Encryption Key
GSC-IS
GSEC
GTC
Hacker
Hand Receipt
Hand Receipt Holder
Hard Copy Key
Hardware Description Language
Hash Code
Hash Function
Hash Message Authentication Code
Hash-Based Key Derivation Function
Hash-Based Message Authentication Code
Hashed Message Authentication Code
Hashed Next Secure
Hazards Of Electromagnetic Radiation To Fuel
Hazards Of Electromagnetic Radiation To Ordnance
Hazards Of Electromagnetic Radiation To People
HCI
Health Information Portability And Accountability Act
Health Insurance Portability And Accountability Act
Health, Education And Welfare
Healthcare Clearinghouse
Healthcare Provider
Heating, Ventilation, And Air Conditioning
Hierarchical File System
High Assurance Guard
High Assurance Internet Protocol Encryptor
High Assurance Internet Protocol Encryptor Interoperability Specification
High Frequency
High Impact
High Performance Radio Local Area Network
High Technology Crime Investigation Association
High-Impact System
High-Performance File System
Hkey_Local_Machine
HMAC
HMAC-HASH
HMAC-hash(k, M)
HMAC-PRF
Homeland Security Presidential Directive
Host Controller Interface
Host Identity Protocol
Host Protected Area
Host Vulnerability Scanners
Host-Based Intrusion Detection And Prevention System
Host-Based Security
HTCIA
Human Resources
Human-Computer Interaction
Human-Machine Interface
HVAC
Hybrid Cloud
Hybrid Control
Hybrid Security Control
Hypertext Transfer Protocol
Hypertext Transfer Protocol over SSL
HyperText Transfer Protocol over SSL/TLS
Hypertext Transfer Protocol over Transport Layer Security
Hypertext Transfer Protocol Secure
I2C
IA architecture
IA infrastructure
IA product
IAC
IACIS
IACS
IA-enabled information technology product
IA-enabled product
IBAC
IBC
IC
ICAM
ICAMSC
ICANN
ICAO
ICB
ICC
ICCD
ICCID
ICCP
ICF
ICMP
ICMPv4
ICMPv6
ICS
ICS-CERT
ICT
ICT SCRM Control
ICT Supply Chain
ICT Supply Chain Compromise
ICT Supply Chain Infrastructure
ICT Supply Chain Logistics
ICT Supply Chain Risk
ICT Supply Chain Risk Management
ICV
Ideal Random Sequence
Identification
Identification And Authentication
Identification And Authentication (NIST SP 800-53 security control family)
Identity Based Access Control
Identity Certificate
Identity Verification
Identity Web Services Framework
Identity, Credential, And Access Management
Identity, Credential, And Access Management Subcommittee
Identity-Based Access Control
Identity-Based Authentication
Identity-Based Security Policy
IEC
IFC
Igamc
IKEv2 Mobility and Multihoming Protocol
Impact
Impact Level
Impact Value
Impact-Level
Implementation Guidance
Implementation Specification
Implicit Key Authentication
Inadvertent Disclosure
Incident
Incident Handling
Incident Response
Incident Response (NIST SP 800-53 security control family)
Incident Response Plan
Incineration
INCITS
Incomplete Gamma Function
Incremental Testing
Inculpatory Evidence
Independent Basic Service Set
Independent Regulatory Agency
Independent Verification & Validation
Indicator
Individual Accountability
Industrial Automation And Control System
Industrial Automation Open Networking Association
Industrial Control System
Industrial Control System(s)
Industrial Control Systems
Industrial Control Systems - Cyber Emergency Response Team
Industrial Security
Industrial Security Incident Database
Industrial, Scientific, And Medical
Information Access Division
Information And Communication Technology
Information And Communications Technology
Information Assurance
Information Assurance Component
Information Assurance Manager (C.F.D.)
Information Assurance Officer (C.F.D.)
Information Assurance Professional (C.F.D.)
Information Assurance Vulnerability Alert
Information Assurance Vulnerability Bulletin
Information Design Assurance Red Team
Information Flow Control
Information Management Policy
Information Resources
Information Resources Management
Information Security
Information Security Architect
Information Security Architecture
Information Security Continuous Monitoring
Information Security Continuous Monitoring Process
Information Security Continuous Monitoring Program
Information Security Governance
Information Security Marketing
Information Security Metrics
Information Security Officer
Information Security Oversight Office
Information Security Policy
Information Security Program Plan
Information Security Risk
Information Security Testing
Information Sharing And Analysis Center
Information System Component
Information System Component Inventory
Information System Contingency Management Plan
Information System Life Cycle
Information System Resilience
Information System Security Engineer
Information System Security Engineering
Information System Security Manager
Information System Security Officer
Information System Service
Information System-Related Security Risk
Information System-Related Security Risks
Information Systems Security
Information Systems Security Boundary
Information Systems Security Engineer
Information Systems Security Engineering
Information Systems Security Manager
Information Systems Security Officer
Information Systems Security Program Manager
Information Technology
Information Technology Infrastructure Library
Information Technology Investment Management
Information Technology Laboratory
Information Technology Laboratory ((of NIST))
Information Technology Laboratory (NIST)
Information Technology Management Reform Act
Information Technology Product
Information Technology Security Evaluation Criteria
INFOSEC
Infra Red Data Association
Infrastructure As A Service
Infrastructure Mode
Infrastructure Network
Infrastructure-As-A-Service
Inheritance
Initial Counter Block
Initial Privacy Assessment
Initialization Vector
Input Block
Inspectable Space
Inspector General
Institute For Information Infrastructure Protection
Institute Of Electrical And Electronics Engineers
Institute Of Electrical And Electronics Engineers, Inc.
Institute of Electronics and Electrical Engineers
Instructional System Methodology
Integer Factorization Cryptography
Integrated Automated Fingerprint Identification System
integrated CCI component
Integrated Circuit
Integrated Circuit Card
Integrated Circuit Card ID
Integrated Circuit Card Identification
Integrated Circuit Chip
Integrated Circuit(s) Card Device
Integrated Circuit(s) Card Devices
Integrated Digital Enhanced Network
Integrated Drive Electronics
Integrated Services Digital Network
Integrity Check Value
Integrity Check Value (C.F.D.)
Integrity Checkers
Integrity Detection
Integrity Protection
Integrity Verification
Intellectual Property
Intelligence
Intelligence Activities
Intelligence Community
Intelligent Electronic Device
Interagency Advisory Board
Interagency Report
Interconnection Security Agreement
Inter-Control Center Communications Protocol
Interface
Interface Identifier
Interface-Local (IPv6 Scope)
Inter-Integrated Circuit
Interior Gateway Protocol
Interior Gateway Protocol (e.g., Ibgp, Ospf, Rip)
Intermediary Service
Intermediate CA
Intermediate Certification Authority
Internal Border Gateway Protocol
Internal Review Service
Internal Security Controls
Internal Security Testing
International Association Of Computer Investigative Specialists
International Civil Aviation Organization
International Committee For Information Technology Standards
International Council On Large Electric Systems
International Data Encryption Algorithm
International Electrotechnical Commission
International Mobile Subscriber Identity
International Organization For Standardization/International Electrotechnical Commission
International Society Of Automation
International Systems Security Engineering Association
International Telecommunication Union
Internet Architecture Board
Internet Connection Firewall
Internet Connection Sharing
Internet Control Message Protocol
Internet Control Message Protocol for IPv4
Internet Control Message Protocol for IPv6
Internet Corporation For Assigned Names And Numbers
Internet Engineering Task Force
Internet Group Management Protocol
Internet Group Management Protocol Version 3
Internet Information Services
Internet Key Exchange
Internet Key Exchange Protocol
Internet Key Exchange Version 1
Internet Key Exchange Version 2
Internet Message Access Protocol
Internet Protocol
Internet Protocol Next Generation
Internet Protocol Security
Internet Protocol Version 4
Internet Protocol Version 6
Internet Protocol/Intellectual Property
Internet Relay Chat
Internet Research Task Force
Internet Security Association And Key Management Protocol
Internet Service Provider
Internet Storm Center
Internetwork Packet Exchange
Intra-Site Automatic Tunnel Addressing Protocol
Intrusion Detection
Intrusion Detection And Prevention
Intrusion Detection Message Exchange Format
Intrusion Detection System
Intrusion Detection System (host-based)
Intrusion Detection System Load Balancer
Intrusion Detection Systems
Intrusion Detection Systems (network-based)
Inverse Cipher
Inverse Cipher Function
Inverse Cipher Functioninverse Cipher Operation
Inverse Cipher Operation
Inverse Cipher Operation/Inverse Transformation
InvMixColumns()
Invocation Field
Inward-Facing
IP Payload Compression Protocol
IP Security
IPComp
IPsec
IPsec Web Based Interoperability Tester
IPsec-WIT
IRC
Iris Exchange
ISAC
ISC
ISCM
ISCP
Island Of Security
ISO/IEC
Issue-Specific Policies
Issuing Facility
IT Security
IT security architecture
IT security awareness and training program
IT Security Basics
IT Security Body of Knowledge Topics and Concepts
IT security goal
IT security investment
IT Security Literacy
IT security objective
IT security policy
IT security policy (issue specific policy)
IT security policy (program policy)
IT security policy (system specific policy)
IT Security Program
Iterated Block Cipher
Iteration Count
ITSEC
Java Security Manager
Java Virtual Machine
Javascript
Job Function
Joint Application Development
Joint Photographic Experts Group
Joint Test Action Group
KAS1-basic
KAS1-Party_V-confirmation
KAS2-basic
KAS2-bilateral-confirmation
KAS2-Party_U-confirmation
KAS2-Party_V-confirmation
KC
KCK
KDC
KECCAK
KECCAK[c]
KECCAK-f [b]
KECCAK-p[b, nr]
Key And Metadata Management Functions
Key Chords
Key Component
Key Confirmation
Key Confirmation Key
Key Custodian
Key Derivation Function
Key Destruction
Key Distribution Center
Key Encrypting Key
Key Encryption Key
Key Escrow
Key Escrow System
Key Exchange
Key Hierarchy
Key Life Cycle
Key Lifecycle State
Key Management Archive
Key Management Device
Key Management Facility
Key Management Infrastructure
Key Management Policy
Key Management Practices Statement
Key Management Product
Key Management Service
Key Processing Facility
Key Processor
Key Recovery
Key Reference
Key Revocation
Key Specification
Key/Metadata Recovery
Key-Agreement Scheme
Key-Agreement Transaction
Keyblock Cipher Key
Key-Confirmation
Key-Confirmation Provider
Key-Derivation Function
Key-Derivation Procedure
Keyed Hash-Based Message Authentication Code
Keyed-Hash Message Authentication Code
Keyed-Hash Message Authentication Code (as Specified In Fips 198-1.)
Key-Encapsulation Mechanism
Key-Encrypting Key
Key-Encryption Key
Key-Encryption-Key
Key-Establishment Transaction
Key-Management Archive
Key-Recovery Agent
Key-Transport Scheme
Key-Transport Transaction
Key-Wrapping Scheme (Symmetric)
Kill Command
Kilobit Per Second
Kilobits / Second
Kilobits Per Second
KMI operating account
KMI protected channel
KMI-aware device
Knowledge Based Authentication
Knowledge-based authentication
KPC
KTS-KEM-KWS-basic
KTS-KEM-KWS-Party_V-confirmation
KTS-OAEP-basic
KTS-OAEP-Party_V-confirmation
L2CAP
Labeled Security Protections
Laboratory Attack (C.F.D.)
LACNIC
Last Mile Broadband Access
Latency
Latin America And The Caribbean Network Information Centre
Latin American And Caribbean Ip Address Regional Registry
Law Enforcement Officer
Layer 2 Tunneling Protocol
Layered Cots Product Solutions
L-bit Hash Function
LCC
LCD
LCM (a, b)
LCM(a, b)
LCMS
Learning Continuum
Learning Objective
Least Common Multiple
Least Significant Bit
Least Significant Bit(s)
Legacy BIOS
Legacy Environment
Legacy-Use
Level Of Assurance
Level Of Significance (α)
Life Cycle
Life Cycle Cost
Life-Cycle Costs
Lightweight Directory Access Protocol
Likelihood Of Occurrence
Likert Scale
Limited Maintenance
Limited User Account
Line Conditioning
Line Conduction
Linear Dependence
Linear Feedback Shift Register
Link Encryption
Link-Local (IPv6 Scope)
Liquid Crystal Display
Live Entropy Source
LOC
Local Access
Local Area Network
Local Authority
Local Authorization
local COMSEC management software
Local Delivery Agent
Local Element
Local Internet Registry
Local Management Device
Local Registration Authority
Location
Location Information
Locator/ID Separation Protocol
LOCI
Lock Command
Lock Pointer
loc-RIB
Log Archival
Log Clearing
Log Compression
Log Conversion
Log File Integrity Checking
Log Management Infrastructure
Log Reduction
Logic Bomb
Logical Access Control System
Logical Backup
Logical Link Control And Adaptation Protocol
Logical Object
Logical Partitioning
Logical Perimeter
Logical Volume
Longitudinal Redundancy Code
Long-Term Credentials
Loop-Back Mode
Low Frequency
Low Impact
Low Impact System
Low Pin Count
Low Probability Of Detection
Low Probability Of Intercept
Low-Impact System
LPC
LRC
MAC
MAC algorithm
MAC Algoritm
MAC Generation
MAC tag
MAC Verification
MAC(MacKey, MacData)
MacData
MacDataU, (or MacDataV)
Machine Controller
Machine Readable Travel Document
MacKey
MacKeyLen
Macro Virus
MacTag
MacTagLen
MacTagV, (MacTagU)
Magnetic Media
Magnetic Remanence
Magnetic Resonance Imaging
Magneto Optical
Mail Exchange
Mail Exchanger
Maintenance
Maintenance (NIST SP 800-53 security control family)
Maintenance Key
Major Application
Malicious Code
Malicious Cyber Activity
Malicious Logic
Managed Interface
Managed Security Services Provider
Management Client
Management Control
Management Controls
Management Controls (C.F.D.)
Management Countermeasure
Management Security Controls (C.F.D.)
Management Service
Mandatory Access Control
Mandatory Modification
Man-In-The-Middle Attack
Man-In-The-Middle Attack Resistance
Manipulative Communications Deception (C.F.D.)
Manual Cryptosystem
Manufacturing Execution System
Market Research
Mask Generation Function
Master Boot Record
Master Scenario Events List
Match/Matching
MCDC
Measured Service
Mechanisms
Media Access Control
Media Access Control (Address)
Media Access Control Address
Media Gateway Control Protocol
Media Protection
Media Protection (NIST SP 800-53 security control family)
Medicare Prescription Drug Card Sponsors
Medium Access Control
Megabit Per Second
Megabits Per Second
Memory Scavenging
Message Authentication
Message Authentication Code
Message Authentication Code (MAC)
Message Authentication Codemac Algorithm
Message Authentication Key
Message Exchange Pattern
Message Indicator
Message Inject
Message Integrity Code
Message Integrity Code Key
Message Modification (WLAN attack)
Metapolicy
Metrics
MGC
MIC
MIC Key
Microcode
Microsoft
Microsoft Baseline Security Analyzer
Microsoft Challenge Handshake Authentication Protocol
Microsoft Challenge-Handshake Authentication Protocol
Microsoft Disk Operating System
Microsoft Knowledge Base
Microsoft Management Console
Microsoft Point To Point Encryption
Microsoft Point-To-Point Encryption
Minimalist Cryptography
Minimum Level Of Protection
Minor Application
Minutia Exchange
Misconfiguration
Mission Assurance Category (C.F.D.)
Mission Critical
Mission-Critical Element
Mission-Critical Functionality
Misuse Of Controlled Unclassified Information
MixColumns()
Mixed Life-Cycle Investment
MMC
Mobile Application Management
Mobile Code
Mobile Code Risk Categories
Mobile Code Technologies
Mobile Device
Mobile Device Management
Mobile Devices
Mobile Prefix Solicitation
Mobile Subscriber
Mobile Subscriber Integrated Services Digital Network
Mobile Switching Center
Moderate Impact
Moderate Impact System
Moderate-Impact
Moderate-Impact System
Modification, Access, And Creation
Modified Condition Decision Coverage
Modular Contracting
Morale, Welfare, And Recreation
Most Significant Bit
Most Significant Bit(s)
Motion Control Network
MSC
MS-CHAP
MSCUID
MSEC
Multicast
Multicast Addresses
Multicast Listener Discovery
Multicast Listener Discovery Version 1
Multicast Listener Discovery Version 2
Multicast Security
Multi-Exit Discriminator
Multi-Factor
Multifactor Authentication
Multi-Level Cross Domain Solution
Multilevel Device
Multilevel Security
Multi-Level Security
Multi-Level Security Domain
Multimedia Card
Multi-Media Card
Multimedia Messaging Service
Multiple Factor Authentication
Multiple Input, Multiple Output Technology
Multiple Security Levels
Multiprotocol Label Switching
Multi-Source Discovery Protocol
Mutual Authentication
NAC
NACI
National Agency Check
National Agency Check And Inquiries
National Agency Check With Inquiries
National Agency Check With Written Inquiries
National Archives And Records Administration
National Checklist Program
National Comsec Incident Reporting System
National Crime Information Center
National Criminal History Check
National Cyber Security Division
National Cybersecurity And Communications Integration Center
National Fire Protection Association
National Industrial Security Program Operating Manual
National Information Assurance Partnership
National Information Infrastructure
National Infrastructure Security Coordination Centre
National Institute Of Justice
National Institute Of Standards And Technology
National Institute Of Standards And Technology Interagency Or Internal Report
National Institute Of Standards And Technology Interagency Or Internal Reports
National Institute Of Standards And Technology Interagency Report
National Institute of Standards and Technology Internal Report
National Law Enforcement And Corrections Technology Center.North East
National Scada Testbed
National Security Agency
National Security Emergency Preparedness Telecommunications Services
National Security Information
National Security System
National Security Telecommunications And Information System Security Instruction
National Software Reference Library
National Strategy for Trusted Identities in Cyberspace
National Technical Information Service
National Voluntary Laboratory Accreditation Program
National Vulnerability Databaseformerly Known As I-Cat
National White Collar Crime Center
Nationwide Public Safety Broadband Network
Natural Language Policy
NC
NCCIC
NCCIM
NCES
NCHC
NCIC
NCIRS
NCP
NCSD
Near Field Communication
Near Field Communications
Neighbor Discovery
Neighbor Solicitation; Name Server
Neighbor Unreachability Detection
NERC
Netbios Extended User Interface
NetBIOS over TCP/IP
Net-Centric Architecture
Netcentric Enterprise Services
Network Access
Network Access Control
Network Access Protection
Network Address Port Translator—Protocol Translator
Network Address Translation—Protocol Translation
Network Attached Storage
Network Basic Input/Output System
Network Behavior Anomaly Detection
Network Discovery
Network Forensic Analysis Tool
Network Information Service
Network Interface Card
Network Intrusion Detection System
Network Layer Security
Network Protection Device
Network Resilience
Network Time Protocol
Network Time Protocol for IPv6
Network Traffic
Network Vulnerability Scanners
Network-Based Intrusion Detection And PRevention System
New Technologies Inc.
New Technology File System
Next Secure
NFC
NIC
Niche Cross Domain Solution
NISCC
NIST Interagency Report
NIST Personal Identity Verification Program
Nist Special Publication
NLECTC-NE
No Execute
Non-Assurance Message
Nonce
Non-Component
Non-Computing Security Methods
Non-Deterministic Random Bit Generator
Non-Deterministic Random Bit Generatornon-Deterministic Rbgnrbg
Non-deterministic RBG
Non-Disclosure Agreement
Nondiscretionary Access Control
Non-Discretionary Access Control
Nonlocal Maintenance
Non-Local Maintenance
Non-Public Personal Information
Nonvalidating DNSSEC-Aware Stub Resolver
North American Electric Reliability Council
North American Security Products Organization
Not Acknowledged
NSA-approved commercial solution
NSA-Approved Cryptography
NSA-approved product
NSEC
NSEC3
NSTIC
Nuclear Command And Control Information Assurance Material
NW3C
Object
Object Identifier
Object Linking And Embedding
Object Linking And Embedding For Process Controlopc
Object Naming Service
Object Reuse
Obscured Data
OCC
Occupation Safety And Health Administration
OCI
OCIL
OCIO
OCO
OCSP
Octet
Octet Length
Octet String
ODBC
OECD
OEM Service Release 2
Off-Card
Offensive Cyberspace Operations
Office Of E-Health Standards And Services
Office Of Engineering And Technology
Office Of Inspector General
Office Of Management And Budget
Office Of Personnel Management
Office Of The Chief Information Officer
Office Of The Director Of National Intelligence
Office Of The Inspector General
Official Information
Off-Line Attack
Off-Line Cryptosystem
Ole For Process Control
On-Access Scanning
On-Card
On-Card Biometric Comparison
On-Card Comparison
On-Demand Scanning
On-Demand Self-Service
One-Part Code
One-Time Cryptosystem
One-Way Transfer Device
Online Attack
Online Certificate Status Protocol
Online Cryptosystem
Online Guessing Attack
OPC
OPCODE
Open Checklist Interactive Language
Open Checklist Interactive Language 2.0
Open Database Connectivity
Open Grid Services Architecture
Open Pretty Good Privacy
Open Source Security Testing Methodology Manual
Open Source Software
Open Systems Interconnection
Open Trusted Technology Provider™ Standard
Open Web Application Security Project
Operation Card Verifiable
Operational Control
Operational Controls
Operational Countermeasure
Operational Resilience
Operational Services
Operations Code
Operations Security
OPSEC
Optical Disk
Optimal Asymmetric Encryption Padding
Optional Modification
Orchestration
Organisation For Economic Co-Operation And Development
Organization For Advancement Of Structured Information Standards
Organization For Economic Co-Operation And Development
Organization For The Advancement Of Structured Information Standards
Organization Identity Management Official
Organizational Conflict Of Interest
Organizational Information Security Continuous Monitoring
Origin Authentication
Original Equipment Manufacturer
Orthogonal Frequency-Division Multiplexing
OSCP
Output Block
Output Feed Back
Output Feedback
Outward-Facing
Overt Channel
Overwrite Procedure (C.F.D.)
PAC
Packet
Packet Filter
Packet Filter Firewalls
Packet Filtering
Packet Fragmentation And Reassembly
Packet Number
Packet Sniffer
PACS
Page Check
Pairwise Master Key Security Association
Paperwork Reduction Act
Paring Code
Participant Guide
Passive Attack
Passive Attack (WLAN attack)
Passive Security Testing
Password Authentication Protocol
Password Cracking
Password Protected
Password Unblocking Key
Password-Based Key Derivation Function
Patch
Patch Management
Payment Card Industry
Payment Card Industry Data Security Standard
PBAC
PC
PC/SC
PCI
PCI DSS
PCIE
PCII
PCL
PCM
PCMCIA
Pcmcia Security Tokens
PCP
Peer Entity Authentication
Peer Entity Authentication Service
Peer/Authenticator Layer
Per-Call Key
Perfect Forward Secrecy
Performance Reference Model
Performance-Based
Period Of Protection
Periods Processing
Peripheral Component Interconnect
Permalock
Per-Message Secret Number
Persistent Cookie
Personal Accountability
Personal Computer
Personal Computer / Smart Card
Personal Computer Memory Card International Association
Personal Computer/Smart Card
Personal Firewall Appliance
Personal Identification Number
Personal Identification Verification
Personal Identity Verification
Personal Identity Verification Authorization
Personal Identity Verification Authorizing Official
Personal Identity Verification Card
Personal Identity Verification-Interoperable
Personal Information Management Applications
Personal Protective Equipment
Personnel Security (NIST SP 800-53 security control family)
Personnel-Security Compromise
Physical Access Control System
Physical And Environmental
Physical And Environmental Protection (NIST SP 800-53 security control family)
Physical Destruction
Physical Layer
Physical Network Interface Card
Physical Partitioning
Physical Protection
Physical Safeguards
Physical Security
Physically Isolated Network
Physically Protected Space
Physical-Security Compromise
Piconet
Pii Confidentiality Impact Level
PIM Applications
Pin Unblocking Key
Piv Assurance Level
Piv Card
PIV Card Issuer
Piv Credential
Pixels Per Inch
PKC
PKCS
PKI-CAK
PKI-Card Authentication Key
PKI-PIV Authentication Key
Plan Coordinator
Plan Of Action & Milestones
Plan Of Action And Milestones
Plan Of Actions And Milestones
Plans Of Action And Milestones
Platform Architecture Layer
Platform As A Service
Platform-As-A-Service
PLC
pNIC
POC
Point Of Attachment
Point Of Contact
Point Of Presence
Point-To-Point Protocol
Point-To-Point Tunneling Protocol
Policy
Policy Administration Point
Policy Based Access Control
Policy Decision Point
Policy Enforcement Point
Policy Information Point
Policy Management Authority
Policy Mapping
Port Scan
Port Scanner
Port Scanning
Portable Electronic Device
Portable Network Graphics
Portable Storage Device
Positive Control Material
Possession And Control Of A Token
Post Office Protocol
Post Office Protocol 3
Potential Impact
Practice Statement
Pre-Activation State
Pre-Boot Authentication
Preboot Execution Environment
Precursor
Prediction Resistance
Predisposing Condition
Preimage Resistance
President’s Council On Integrity And Efficiency
Pretty Good Privacy
Primary Facility
Primary Services Node
Principal Accrediting Authority (C.F.D.)
Principal Authorizing Official
Principal CA
Principle
Privacy
Privacy Act Statement
Privacy Capability
Privacy Control Assessment
Privacy Control Assessor
Privacy Control Enhancements
Privacy Control Inheritance
Privacy Enhanced Mail
Privacy Impact Assessment
Privacy Key Management
Privacy Key Management Protocol Version 1
Privacy Key Management Protocol Version 2
Privacy Plan
Privacy Requirements
Privacy Threshold Analysis
Private Branch Exchange
Private Cloud
Private Credentials
Private-Key-Possession Assurance Message
Privilege Attribute Certificate
Privilege Certificate Manager
Privileged Account
Privileged Accounts
Privileged Command
Privileged Process
Proactive Cyber Defense
Probabilistic Signature Scheme
Probability Density Function
Probability Of Occurrence
Process
Process Controller
Process Hijacking
Procurement
Producer
Product Compliant List
Product Source Node
Prognostics and Health Management
Program Policy
Program Review For Information Security Management Assistance
Programmable Logic Controller
Promiscuous Mode
Proscribed Information
Protect Data
Protected Access
Protected Access Credential
Protected Ciphersuite Negotiation
Protected Communication
Protected Critical Infrastructure Information
Protected Distribution System
Protected Extensible Authentication Protocol
Protected Health Information
Protected Mode
Protected Session
Protection Philosophy
Protection Profile
Protection Suite
Protective Distribution System
Protective Packaging
Protective Technologies
Protocol
Protocol Adaptation Layer
Protocol Analyzer
Protocol And Parameters Selection
Protocol Independent Multicast
Protocol Independent Multicast—Sparse Mode
Provenance
Pseudorandom Function
Pseudo-Random Function
Public Cloud
Public Credentials
Public Domain Software
Public Information
Public Internet Registry
Public Key
Public Key Certificate
Public Key Cryptographic Algorithm
Public Key Cryptographic Algorithm (asymmetric)
Public Key Cryptographic Standards
Public Key Cryptography
Public Key Cryptography Standard
Public Key Enabling
Public Key Infrastructure
Public Key Infrastructure for X.509 Certificates
Public Key/Public Signature Verification Key
Public Law
Public Reviewer
Public Seed
Publication
Public-Key
Public-Key Algorithm
Public-Key Certificate
Public-Key Cryptographic Algorithm
Public-Key Cryptography
Public-Key Cryptography Standards
Public-Key Infrastructure
Public-Key Validation
QA/QC
Quad-A DNS Resource Record
Quality Assurance
Quality Assurance/Quality Control
Quality Of Protection
Quality Of Service
Quick Mode
Quick Response
RAdAC
Radio Frequency
Radio Frequency Identification
Radio Frequency Jamming
Radio-Frequency Identification
Radionuclide Transportation Agency (fictional)
Random Access Memory
Random Binary Sequence
Randomness Extraction
Randomness Source
Rapid Application Development
Rapid Elasticity
RBAC
RC
RC4
RCE
RCFL
Rcon[]
RCP
Real Time Reaction
Real-Time Location System
Reassociation Request
Reassociation Response
Received Signal Strength Indication
Receiver
Receiver Address
Recipient
Recipient-Usage Period
Reciprocal Agreement
Reciprocity
Recommendation
Reconstitute
Record
Records
Records Management
Recover (General)
Recover (key and/or metadata)
Recover Data
Recovery Point Objective
Recovery Procedures
Recovery Time Objective
Red Optical Fiber Line
Red Team Exercise
Red Team/Blue Team Approach
RED/BLACK concept
Redundant Control Server
Reference Monitor
Regenerative Cyber Defense
Regional Computer Forensics Laboratory
Registered Application Provider Identifier
Release Candidate
Remanence
Remote Access
Remote Access Point
Remote Access Server
Remote Assistance
Remote Authentication Dial In User Service
Remote Authentication Dial-In User Server
Remote Authentication Dial-In User Service
Remote Copy Protocol
Remote Desktop Access
Remote Desktop Protocol
Remote Diagnostics
Remote Diagnostics/ Maintenance
Remote Installation Service
Remote Maintenance
Remote Procedure Call
Remote System Control
Removable Cover
Removable Media Device
REN-ISAC
Replay Attacks
Reproducibility
Request For Comment
Request For Comments
Research And Development
Research And Education Networking Information Sharing And Analysis Center
Réseaux Ip Européens Network Coordination Centre
Residual Information Protection
Resilience
Resource
Resource Pooling
Resource Record
Resource Record Signature
Resource Reservation Protocol
Resource Starvation
Restricted
Restricted Data
Result Content
Return On Security Investment
Reverse Channel
Review Techniques
Revocation
Revoke A Certificate
RFC
RIPE NCC
Risk Adaptable Access Control
Risk Adaptiveadaptable Access Control
Risk Executive (Function)
Risk Factor
Risk Tolerance
Risk-Adaptable Access Control
Risk-Adaptive Access Control
Rivest Cipher 4
Rivest, Shamir, Adleman Cryptographic Algorithm