Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Glossary

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z  |  Symbols
OAEP
OASIS
Object
Object Identifier
Object Linking And Embedding
Object Linking And Embedding For Process Controlopc
Object Naming Service
Object Reuse
Obligation
Obscured Data
OCC
Occupation Safety And Health Administration
OCI
OCIL
OCIO
OCO
OCSP
Octet
Octet Length
Octet String
ODBC
ODNI
OECD
OEM
OEM Service Release 2
OESS
OET
Of Operation (Mode)
OFB
OFDM
Off-Card
Offensive Cyberspace Operations
Office Of E-Health Standards And Services
Office Of Engineering And Technology
Office Of Inspector General
Office Of Management And Budget
Office Of Personnel Management
Office Of The Chief Information Officer
Office Of The Director Of National Intelligence
Office Of The Inspector General
Official Information
Off-Line Attack
Off-Line Cryptosystem
Offline Test
Off-The-Shelf
OGSA
OID
OIG
OIMO
OLE
Ole For Process Control
OMB
On-Access Scanning
On-Card
On-Card Biometric Comparison
On-Card Comparison
On-Demand Scanning
On-Demand Self-Service
One-Part Code
One-Time Cryptosystem
One-Time Pad
One-Time Password
One-Time Tape
One-To-Many
One-To-One
One-Way Hash Algorithm
One-Way Transfer Device
Ongoing Assessment
Ongoing Assessment And Authorization
Ongoing Authorization
Online Attack
Online Certificate Status Protocol
Online Cryptosystem
Online Guessing Attack
ONS
OOB
opad
OPC
OPCODE
Open Checklist Interactive Language
Open Checklist Interactive Language 2.0
Open Database Connectivity
Open Files
Open Grid Services Architecture
Open Pretty Good Privacy
Open Shortest Path First
Open Shortest Path First version 2 (for IPv4)
Open Shortest Path First version 3 (for IPv6)
Open Source Security Testing Methodology Manual
Open Source Software
Open Storage
Open System
Open Systems Interconnection
Open Trusted Technology Providerâ„¢ Standard
Open Virtualization Format
Open Vulnerability And Assessment Language
Open Vulnerability And Assessment Language 5.8
Open Vulnerability Assessment Language
Open Web Application Security Project
OpenPGP
Operating System
Operating System Fingerprinting
Operating System Virtualization
Operation
Operation Card Verifiable
Operational Control
Operational Controls
Operational Countermeasure
Operational Environment
Operational Key
Operational Phaseoperational Use
Operational Resilience
Operational Services
Operational Storage
Operational Test
Operational Use
Operational Waiver
Operations Code
Operations Security
Operator
OPM
OPSEC
Optical Disk
Optimal Asymmetric Encryption Padding
Option Rom
Optional Modification
or Tier 0
ORA
Orchestration
Ordering Privilege Manager
Organisation For Economic Co-Operation And Development
Organization
Organization For Advancement Of Structured Information Standards
Organization For Economic Co-Operation And Development
Organization For The Advancement Of Structured Information Standards
Organization Identity Management Official
Organizational Conflict Of Interest
Organizational Information Security Continuous Monitoring
Organizational Registration Authority
Organizational Unit
Organizational User
Organizational Users
Organizationally Unique Identifier
Origin Authentication
Original Equipment Manufacturer
Originator-Usage Period
Orthogonal Frequency-Division Multiplexing
OS
OSCP
OSHA
OSI
OSPF
OSPFv2
OSPFv3
OSR2
OSS
OSSTMM
OTAD
OTAR
OTAT
OtherInfo
OTP
OTS
OTT
O-TTPS
OU
OUI
Out Of Band
Out-Of-Band
Output Block
Output Data
Output Feed Back
Output Feedback
Outside Threat
Outside(r) Threat
Outsider Threat
Outward-Facing
OVAL
Over The Air Rekeying
Overlay
Overt Channel
Overt Testing
Over-The-Air Key Distribution
Over-The-Air Key Transfer
Over-The-Air Rekeying
Overwrite
Overwrite Procedure (C.F.D.)
OVF
OWASP
OWL-S
Owner