Information Security Abbrevations
Below is a list of commonly used abbrevations. These are not unique just to penetration testing or information security; We have included those associated with anything related to a penetration test project.
INFORMATION SECURITY ABBREVATIONS
built by @yeahhub for YeahHub.Below is a list of commonly used abbrevations. These are not unique just to penetration testing or information security; We have included those associated with anything related to a penetration test project.
AAA | Authentication, Authorization, and Accounting |
AC | Actual Cost |
ACDF | Access Control Decision Function |
ACI | Access Control Information |
ACL | Access Control List |
ACWP | Actual Cost of Work Performed |
AD | Active Directory/Activity Description |
ADM | Arrow Diagramming Method |
AES | Advanced Encryption Standard |
AF | Actual Finish Date |
ADRP | Army's DISN Router Program |
ADSL | Asymmetric Digital Subscriber Line |
AFIWC | Air Force Information Warfare Center |
AH | Authentication Header |
AIS | Automated Information System |
API | Application Program Interface |
ASCII | American Standard Code for Information Interchange |
ANS1 | Abstract Syntax Notation |
ARP | Address Resolution Protocol |
AS | Actual Start Date |
ATM | Asynchronous Transfer Mode |
AV | Antivirus |
BAC | Budget at Completion |
BAPI | Biometrics Application Program Interface |
BCA | Bridge Certificate Authority |
BCWP | Budgeted Cost of Work Performed |
BCWS | Budgeted Cost of Work Scheduled |
BIOS | Basic Input/Output System |
BN | Backbone Network |
BOM | Bill of Materials |
BOOTP | Boot Protocol |
BSD | Berkley Software Design |
C&A | Certification and Accreditation |
C/AII | Corporate/Agency Information Infrastructure |
C2 | Command and Control |
C4I | Command, Control, Communications, Computer, and Intelligence |
CA | Certification Authority/Control Account |
CALEA | Communications Assistance for Law Enforcement Act |
CAN | Campus Area Network |
CAP | Control Account Plan |
CAPI | Cryptographic Application Programming Interface |
CAT | Common Authentication Technology |
CAW | Certificate Authority Workstation |
CC | Common Criteria |
CCB | Change Control Board |
CCE | Common Configuration Enumeration |
CCI | Controlled Cryptographic Item |
CDMA | Code Division Multiple Access |
CDR | Critical Design Review |
CDSA | Common Data Security Architecture |
CERT | Computer Emergency Response Team |
CFD | Common Fill Devices |
CGE | Cisco Global Exploiter |
CGI | Common Gateway Interface |
CH | Correspondence Host |
CI | Cryptographic Interface/Configuration Item |
CIO | Chief Information Officer |
CIAC | Computer Incident Advisory Capability |
CIDF | Common Instruction Detection Framework |
CIK | Crypto-Ignition Key |
CIRT | Computer Incident Response Team |
CISO | Chief Information Security Officer |
CKL | Compromised Key List |
CM | Configuration Management |
CMA | Certificate Management Authority |
CMI | Certificate Management Infrastructure |
CMIP | Common Management Information Protocol |
CMP | Certificate Management Protocols |
CMS | Certificate Management Systems |
CMUA | Certificate Management User Agent |
COA | Course of Action |
COE | Common Operating Environment |
COMSEC | Communications Security |
CONOPS | Concept of Operations |
COQ | Cost of Quality |
CORBA | Common Object Request Broker Architecture |
COTS | Commercial-Off-The-Shelf |
CP | Certificate Policy/Critical Path |
CPF | Cost Plus Fee |
CPI | Cost Performance Index |
CPM | Critical Path Method |
CPS | Certification Practice Statement |
CRL | Certificate Revocation List |
CSA | Computer Security Act |
CSP | Cryptographic Service Provider |
CSRA | Critical Security Requirement Areas |
CSSM | Common Security Services Manager |
CTO | Chief Technology Officer |
CV | Compliance Validation/Cost Variance |
CVE | Common Vulnerability and Exposures |
CVI | Compliance Validation Inspection |
CVSD | Continuously Variable Slope Detection |
CVSS | Common Vulnerability Scoring System |
CWBS | Contract Work Breakdown Structure |
CWE | Common Weakness Enumeration |
DAA | Designated Approving Authority |
DAC | Discretionary Access Control |
DAP | Directory Access Protocol |
DD | Data Date |
DER | Distinguished Encoding Rules |
DES | Data Encryption Standard |
DHCP | Dynamic Host Control Protocol |
DIT | Directory Information Tree |
DMS | Defense Messaging System |
DMZ | Demilitarized Zone |
DN | Distinguished Name |
DNS | Domain Name Server |
DNSSEC | Domain Name System Security |
DOS | Denial of Service |
DSA | Directory Service Agents |
DU | Duration |
EAC | Estimate at Completion |
EAL | Evaluation Assurance Level |
ECAs | External Certificate Authorities |
EF | Early Finish Date |
EKMS | Electronic Key Management System |
EMV | Expected Monetary Value |
ESM | Encapsulating Security Management |
ES | Early Start Date |
ESP | Encapsulating Security Payload |
ETC | Estimate to Complete |
EUT | End User Terminal |
EV | Expected Value/Earned Value |
FedCIRC | Federal Computer Incident Response Center |
FF | Finish-to-Finish/Free Float |
FFP | Firm-Fixed-Price |
FIPS | Federal Information Processing Standards |
FIRST | Forum of Incident Response and Security Team |
FISMA | Federal Information Processing Standards |
FMEA | Failure Mode and Effect Analysis |
FPIF | Fixed-Price-Incentive-Fee |
FrSIRT | French Security Incident Response Team |
FS | Finish-to-Start |
FSRS | Functional Security Requirements for Specification |
FTP | File Transfer Protocol |
FW | Firewall |
GSAKMP | Group Service Association Key Management Protocol |
GUI | Graphical User Interface |
GULS | General Upper Layer Security |
HAG | High Assurance Guard |
HF | High Frequency |
HTML | Hyper Text Markup Language |
HTTP | Hyper Text Transfer Protocol |
I&A | Identification and Authentication |
IA | Information Assurance |
IAM | INFOSEC Assessment Methodology |
IATF | Information Assurance Technical Framework |
IBAC | Identity Based Access Control |
IC | Intelligence Community |
ICMP | Internet Control Message Protocol |
ICRLA | Indirect Certificate Revocation List Authority |
ID | Identifier |
IDPS | Intrusion Detection and Prevention System |
IDS | Intrusion Detection System |
IDUP | Independent Data Unit Protection |
IEEE | Institute of Electrical and Electronics Engineers |
IEM | INFOSEC Evaluation Methodology |
IETF | Internet Engineering Task Force |
IFB | Invitation for Bid |
IIS | Internet Information Server |
IKE | Internet Key Exchange |
ILS | Integrated Logistics Support |
IMAP | Internet Mail Access Protocol |
INE | Inline Network Encryptor |
INFOSEC | Information Security |
IP | Internet Protocol |
IPN | Information Protection Network |
IPS | Intrusion Prevention System |
IPSec | Internet Protocol Security |
IPX | Internet Packet Exchange |
IR | Infrared |
IS | Information Systems |
ISAKMP | Internet Security Association and Key Management Protocol |
ISDN | Integrated Services Digital Network |
ISO | International Organization for Standardization |
ISSAF | Information System Security Assessment Framework |
ISSO | Information Systems Security Organization |
IT | Information Technology |
ITL | Information Technology Laboratory |
IW | Information Warfare |
KMI | Key Management Infrastructure |
LAN | Local Area Network |
LDAP | Lightweight Directory Access Protocol |
LDM/KP | Local Management Device/Key Processor |
LF | Late Finish Date |
LOE | Level of Effort |
LPD | Low Probability of Detection |
LPI | Low Probability of Intercept |
LRA | Local Registration Authority |
LS | Late Start Date |
MAC | Mandatory Access Control |
MAN | Metropolitan Area Network |
MD5 | Message Digest 5 |
MILS | Multiple, Independent Security Levels |
MIME | Multipurpose Internet Mail Extension |
MSN | Mission Needs Statement |
MoE | Measure of Effectiveness |
MSP | Message Security Protocol |
MTA | Message Transfer Protocol |
MTS | Message Transfer System |
NAT | Network Address Translation |
NES | Network Encryption System |
NIC | Network Interface Card |
NIS | Network Information System |
NIPC | National Infrastructure Protection Center |
NIST | National Institute of Standards and Technology |
NOS | Network Operating System |
NSA | Network Security Agency |
NSF | Network Security Framework |
NVD | National Vulnerability Database |
OBS | Organizational Breakdown Structure |
OD | Original Duration |
OIG | Office of Inspector General |
OMB | Office of Management and Budget |
OPSEC | Operational Security |
ORD | Operational Requirements Documents |
OS | Operating System |
OSI | Open Systems Interconnection |
OSSTMM | Open Source Security Testing Methodology Manual |
OWASP | Open Web Application Security Project |
P2P | Peer-to-Peer |
PAA | Policy Approving Authority |
PBX | Private Branch Exchange |
PC | Percent Complete |
PCA | Policy Creation Authority |
PCI | Protocol Control Information |
PDA | Personal Digital Assistant |
PDM | Precedence Diagramming Method |
PERL | Practical Extraction and Reporting Language |
PF | Planned Finish Date |
PGP | Pretty Good Privacy |
PII | Personally Identifiable Information |
PIN | Personal Identification Number |
PKCS | Public Key Cryptographic Standards |
PKI | Public Key Infrastructure |
PM | Project Manager/Project Management |
PMA | Policy Management Authority |
PMBOK | Project Management Body of Knowledge |
PMIS | Project Management Information System |
PMO | Project Management Office |
PMP | Project Management Professional |
PPP | Point-to-Point Protocol |
PS | Planned Start Date |
PSTN | Public Switched Telephone Network |
PSWBS | Project Summary Work Breakdown Structure |
PV | Planned Value |
QA | Quality Assurance |
QC | Quality Control |
QOS | Quality of Service |
RADIUS | Remote Access Dial In User Service |
RAM | Responsibility Assignment Matrix |
RBAC | Rule Based Access Control |
RBR | Rule-Based Reasoning |
RBS | Resource Breakdown Structure/Risk Breakdown Structure |
RD | Remaining Duration |
RFC | Request for Comment |
RFP | Request for Proposal |
RFQ | Request for Quotation |
ROE | Rules of Engagement |
RTM | Requirements Traceability Matrix |
S/MIME | Secure/Multipurpose Internet Mail Extension |
SCADA | Supervisory Control and Data Acquisition |
SCAP | Security Content Automation Protocol |
SDD | Secure Data Device |
SDE | Secure Data Exchange |
SDLC | System Development Life Cycle |
SET | Secure Electronic Transaction |
SF | Scheduled Finish Date/Start to Finish |
SFTP | Secure File Transfer Protocol |
SHA | Secure Hashing Algorithm |
SID | System Identfication |
SIP | Session Initiation Protocol |
SKM | Symmetric Key Management |
SLA | Service Level Agreements |
SMB | Server Message Block |
SME | Subject Matter Expert |
SMI | Security Management Infrastructure |
SMIB | Security Management Information Base |
SMTP | Simple Mail Transfer Protocol |
SNMP | Simple Network Management Protocol |
SOW | Statement of Work |
SPG | Security Program Group |
SPI | Schedule Performance Index |
SS | Scheduled Start Date/Start to Start |
SSA | System Security Administrator |
SSAA | System Security Authorization Agreement |
SSH | Secure Shell |
SSID | Service Set Identifier |
SSL | Secure Sockets Layer |
SSN | Social Security Number |
STE | Security Test and Evaluation |
SV | Schedule Variance |
SWOT | Strengths, Weaknesses, Opportunities, and Threats |
TC | Target Completion Date |
TCB | Trusted Computing Base |
TCP | Transmission Control Protocol |
TCP/IP | Transmission Control Protocol/Internet Protocol |
TDMA | Time Division Multiple Access |
TF | Target Finish Date/Total Float |
TFTP | Trivial File Transfer Protocol |
TLS | Transport Layer Security |
TM | Time and Material |
TOE | Target of Evaluation |
TPEP | Trust Product Evaluation Program |
TQM | Total Quality Management |
TS | Target Start Date |
TTP | Trusted Third Party |
UDP | User Datagram Protocol |
URL | Uniform Resource Locator |
USB | Universal Serial Bus |
VE | Value Engineering |
VM | Virtual Machine |
VoIP | Voice over Internet Protocol |
VPN | Virtual Private Network |
WAN | Wide Area Network |
WBS | Work Breakdown Structure |
WEP | Wired Equivalent Privacy |
WIDPS | Wireless Intrusion Detection and Prevention System |
WIFI | Wireless Fidelity |
WLAN | Wireless Local Area Network |
WPA | Wi-Fi Protected Access |
WVE | Wireless Vulnerabilities and Exploits |
XML | Extensible Markup Language |