Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Glossary

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z  |  Symbols
n
NA
NAC
NACI
NAK
Name Server
Naming Authority
NAP
NAPT
NAPT-PT
NARA
NAS
NASPO
NAT
National Agency Check
National Agency Check And Inquiries
National Agency Check With Inquiries
National Agency Check With Written Inquiries
National Archives And Records Administration
National Checklist Program
National Comsec Incident Reporting System
National Crime Information Center
National Criminal History Check
National Cyber Security Division
National Cybersecurity And Communications Integration Center
National Fire Protection Association
National Industrial Security Program Operating Manual
National Information Assurance Partnership
National Information Infrastructure
National Infrastructure Security Coordination Centre
National Institute Of Justice
National Institute Of Standards And Technology
National Institute Of Standards And Technology Interagency Or Internal Report
National Institute Of Standards And Technology Interagency Or Internal Reports
National Institute Of Standards And Technology Interagency Report
National Institute of Standards and Technology Internal Report
National Law Enforcement And Corrections Technology Center.North East
National Scada Testbed
National Security Agency
National Security Emergency Preparedness Telecommunications Services
National Security Information
National Security System
National Security Telecommunications And Information System Security Instruction
National Software Reference Library
National Strategy for Trusted Identities in Cyberspace
National Technical Information Service
National Voluntary Laboratory Accreditation Program
National Vulnerabilities Database
National Vulnerability Database
National Vulnerability Databaseformerly Known As I-Cat
National White Collar Crime Center
Nationwide Public Safety Broadband Network
Native Virtualization
NAT-PT
NAT-T
Natural Language Policy
Nb
NBA
NBAD
nBits
NC
NCCIC
NCCIM
NCES
NCHC
NCIC
NCIRS
NCP
NCSD
ND
NDA
Near Field Communication
Near Field Communications
Needs Assessment
Need-To-Know
Need-To-Know Determination
Neighbor Advertisement
Neighbor Discovery
Neighbor Solicitation; Name Server
Neighbor Unreachability Detection
Neighbors
NERC
NetBEUI
NetBIOS
Netbios Extended User Interface
NetBIOS over TCP/IP
NetBT
Net-Centric Architecture
Netcentric Enterprise Services
Network
Network Access
Network Access Control
Network Access Protection
Network Address And Port Translation
Network Address Port Translator—Protocol Translator
Network Address Translation
Network Address Translation Traversal
Network Address Translation—Protocol Translation
Network Administrator
Network Attached Storage
Network Authorization
Network Basic Input/Output System
Network Behavior Analysis
Network Behavior Analysis System
Network Behavior Anomaly Detection
Network Defense
Network Discovery
Network Extension
Network File Sharing
Network File System
Network Forensic Analysis Tool
Network Information Service
Network Information System
Network Interface Card
Network Intrusion Detection System
Network Layer
Network Layer Security
Network Map
Network Mapping
Network of Things
Network Protection Device
Network Resilience
Network Sniffing
Network Tap
Network Time Protocol
Network Time Protocol for IPv6
Network Traffic
Network Vulnerability Scanners
Network-Based Intrusion Detection And PRevention System
New Technologies Inc.
New Technology File System
Next Header
Next Header (IPv6 Field)
Next Secure
NFAT
NFC
NFIQ
NFO
NFPA
NFS
NH
NIAP
NIC
Niche Cross Domain Solution
NII
NIJ
NIS
NISCC
NISPOM
NIST
NIST Fingerprint Image Quality
NIST Interagency Report
NIST IR
NIST Personal Identity Verification Program
Nist Special Publication
NIST-allowed
NIST-approved
NISTIR
Nk
NLECTC-NE
nLen
NLOS
NLP
NLZ
No Execute
Node
No-Lone Zone
Non- Repudiation
Non-Assurance Message
Nonce
Non-Component
Non-Computing Security Methods
Non-Deterministic Random Bit Generator
Non-Deterministic Random Bit Generatornon-Deterministic Rbgnrbg
Non-deterministic RBG
Non-Disclosure Agreement
Nondiscretionary Access Control
Non-Discretionary Access Control
Nonfederal Information System
Nonfederal Organization
Non-Line-Of-Sight
Non-Line-Of-Sight Signal Propagation
Nonlocal Maintenance
Non-Local Maintenance
Non-Organizational User
Non-Person Entity
Non-Public Personal Information
Non-Repudiation
Nonvalidating DNSSEC-Aware Stub Resolver
Nonvalidating Stub Resolver
Non-Volatile Data
Normalization
Normalize
North American Electric Reliability Council
North American Security Products Organization
NoT
Not Acknowledged
NPD
NPE
NPIVP
NPPI
NPSBN
nr
NRBG
NS
NSA
NSA-approved commercial solution
NSA-Approved Cryptography
NSA-approved product
NSEC
NSEC3
NSI
NSRL
NSS
NSS baselines
NSTB
NSTIC
NSTISSI
NT File System
NT LanManager
NTFS
NTI
NTIS
NTLM
NTP
NTPv6
Nuclear Command And Control Information Assurance Material
NUD
Null
NV
NVD
NVLAP
NW3C
NX