Link Search Menu Expand Document

Acronyms and Abbreviations

Selected acronyms and abbreviations used in this paper are defined below.

  
ACAccess Control
AESAdvanced Encryption Standard
AOAuthorizing Official
APTAdvanced Persistent Threat
ATAwareness and Training
AUAudit and Accountability
BYODBring Your Own Device
CASecurity Assessment and Authorization
CAPCross Agency Priority
CCCommon Criteria
CEOChief Executive Officer
CIOChief Information Officer
CISOChief Information Security Officer
CKMSCryptographic Key Management System
CMConfiguration Management
CMVPCryptographic Module Validation Program
CNSSICommittee on National Security Systems Instruction
COOPContinuity of Operations Plan
COTSCommercial Off The Shelf
CPContingency Planning
CSPCloud Service Provider
CSRCComputer Security Resource Center
CUIControlled Unclassified Information
DHSDepartment of Homeland Security
DRPDisaster Recovery Plan
FIPSFederal Information Processing Standard
FIRMRFederal Resource Management Regulation
FIRSTForum for Incident Response Teams
FISMA 2002Federal Information Security Management Act
FISMA 2014Federal Information Security Modernization Act
FOIAFreedom of Information Act
HTTPHypertext Transfer Protocol
IAIdentification and Authentication
ICSIndustrial Control System
ICTInformation and Communications Technology
IDSIntrusion Detection System
IPIndividual Privacy
IRIncident Response
IRMInformation Resource Management
ISACInformation Sharing and Analysis Center
ISCMInformation Security Continuous Monitoring
ISOInternational Organization for Standardization
ITInformation Technology
ITLInformation Technology Laboratory
MAMaintenance
MACMessage Authentication Code
MPMedia Protection
NARANational Archives and Records Administration
NISTNational Institute of Standards and Technology
NVDNational Vulnerability Database
OMBOffice of Management and Budget
P.L.Public Law
PAPersonal Authorization
PBXPrivate Branch Exchange
PEPhysical and Environmental Protection
PGPPretty Good Privacy
PIIPersonally Identifiable Information
PINPersonal Identification Number
PKIPublic Key Infrastructure
PLPlanning
PMProject Management
PSPersonnel Security
RARisk Assessment
RAIDRedundant Array of Independent Disks
RMFRisk Management Framework
S/MIMESecure/Multipurpose Internal Mail Extension
SASystems and Services Acquisition
SAISOSenior Agency Information Security Officer
SAOPSenior Agency Official for Privacy
SCSystem and Communications Protection
SCPSystem Contingency Plan
SISystem and Information Protection
SPSpecial Publication
SSESystem Security Engineer
SSOSystem Security Officer
SSPSystem Security Plan
TCBTrusted Computing Base