SSP
System Security Plan
A&A
Assessment and Authorization
ADP
Automated Data Processing
AES
Advanced Encryption Standard
AFC4A
Air Force C4 Agency
AFI
Air Force Instruction
AFIWC
Air Force Information Warfare Center
AFOSI
Air Force Office of Special Investigation
AFPD
Air Force Policy Directive
AIMS
Automated Infrastructure Management System
AIS
Automated Information Systems
AMIDS
Audit Monitoring and Intrusion Detection System
ANSI
American National Standards Institute
AODR
Authorizing Official Designated Representative
ASD(C31)
Assistant Secretary of Defense for Command, Control, Communication and Intelligence
ASIMS
Automated Security Incident Measuring System
ASSIST
Automated System Security Incident Support Team
ATC
Authorization to Connect
ATD
Authorization Termination Date
ATM
Asynchronous Transfer Mode
ATO
Authority to Operate
ATO
Authorization to Operate
BIOS
Basic Input and Output System
BMA
Business Mission Area
C&A
Certification and Accreditation
C&A WG
Certification and Accreditation Working Group
C2W
Command and Control Warfare
C4
Command, Control, Communications, and Computers
C4ISR
Command, Control, Communications, Computer, Intelligence, Surveilance and Reconnaisssance
CA
Certification Authority
CAAP
Critical Asset Assurance Program
CAL
Category Assurance List
CAP
Connection Approval Program
CCB
Configuration Control Board
CCI
Control Correlation Identifiers
CCI
Control Correlation Identifier
CDS
Cross-Domain Solution
CERT
Computer Emergency Response Team
CERT/CC
CERT/Coordination Center
CFR
Code of Federal Regulations
CIAC
Computer Incident Advisory Capability
CIAO
Critical Infrastructure Assurance office
CIO
Chief Information Officer
CIP
Critical Infrastructure Protection
CIPWG
Critical Infrastructure Protection Working Group
CIRT
Computer Incident Response Team
CISA
C4I Integration Support Activity
CITAC
Computer Investigation and Infrastructure Threat Assessment Center
CJCS
Chairman of the Joint Chiefs of Staff
CJCSI
Chairman, Joints Chiefs of Staff Instruction
CMDS
Computer Misuse Detection System
CMS
COMSEC Management System
CNA
Computer Network Attack
CNDSP
Computer Network Defense Service Provider
CNSS
Committee on National Security Systems
CNSSI
Committee on National Security Systems Instruction
CNSSP
Committee on National Security Systems Policy
COE
Common Operating Environment
COMSEC
Communications Security
CONOPS
Concept of Operations
COTS
Commericial Off-the-Shelf
CSA
Computer Security Act
CSIR
Computer (and Network) Security Incident Response
CSS
Central Security Service
CSSO
Computer Systems Security Officers
CUI
Controlled Unclassified Information
DAA
Designated Approving Authority (DAA)
DARPA
Defense Advanced Research Projects Agency
DASD
Deputy Assistant Secretary of Defense
DASD(DT&E)
Deputy Assistant Secretary of Defense for Developmental Test and Evaluation
DATO
Denial of Authorization To Operate
DCI
Director of Central Intelligence
DCID
Director of Central Intelligence Directive
DCMO
Deputy Chief Management Office
DCPDS
Defense Civilian Personnel Data System
DCSA
Defense Counterintelligence & Security Agency
DES
Digital Encryption Standard
DIA
Defense Intelligence Agency
DIACAP
DoD Information Assurance Certification and Accreditation Process
DIACCS
Defense IA Command and Control System
DIAMOND
Defense Intrusion Analysis & Monitoring Desk
DIAP
Defense Information Assurance Program
DIB
Defense Industrial Base
DIDS
Distributed Intrusions Detection System
DII
Defense Information Infrastructure
DIMA
DoD Portion of the Intelligence Mission Area
DIRNSA
Director, National Security Agency
DISA
Defense Information Systems Agency
DISA
Defense Information Systems Agency
DISN
Defense Information System Network
DITPR
DoD Information Technology Portfolio Repository
DITSCAP
DoD IT Security Certification and Accreditation Process
DITSWG
Defense Information Technology Security Working Group
DMS
Defense Message System
DNI
Director of National Intelligence
DoD
Department of Defense
DoD CIO
DoD Chief Information Officer
DoD ISRMC
DoD Information Security Risk Management Committee
DoDD
Department of Defense Directive
DoDIIS
DoD Intelligence Information System
DODIN
Department of Defense information networks
DoE
Department of Energy
DoN
Department of the Navy
DOT&E
Director, Operational Test and Evaluation
DREN
Defense Research and Engineering Network
DSAWG
Defense IA Security Accreditation Working Group
DSS
Defense Security Service
DT&E
Developmental Test and Evaluation
DTM
Directive-Type Memorandum
E/APL
Evaluated Approved Product
EAL
Evaluation Assurance Level
EFOIA
Electronic Freedom of Information Act
EIEMA
Enterprise Information Environment Mission Area
EITDR
Enterprise Information Technology Database Repository
eMASS
Enterprise Mission Assurance Support Service
EOP
Executive Office of the President
ETA
Education, Training and Awareness
ETAPWG
Education, Training, Awareness and Professionalization Working Group
FAR
Federal Acquisition Regulation
The FAR System governs the "acquisition process" by which of the acquire (i.e., or ) and by with .[1][2][3] The process consists of three phases:[4] Need recognition and acquisition planning; The FAR System regulates the activities of government personnel in carrying out that process. FCI
Federal Contract Information
FIPSPUB
Federal Information Processing Standard Publication
FIRST
Forum of Incident Resonse and Security Teams
FISMA
Federal Information Security Management Act
FIWC
Fleet information Warfare Center
FOIA
Freedom of information Act
FSO
Field Security Office
FTS
Federal Telecommunications Service
GAO
General Accounting Office
GCCS
Global Command and Control System
GCSS
Global Combat Support System
GIG
Global Information Grid
GMITS
Guidelines for the Management of IT Security
GOSC
Global Operations and Security Center
GOTS
Government Off-the-Shelf
GSA
General Services Administration
GSII
Government Services Information Infrastructure
HBSS
Host Based Security System
I&W
Indications and Warning
IA
Information Assurance
IAD
Information Assurance Document
IAG
information Assurance Group
IAM
Information Assurance Manager
IAO
Information Assurance Officer
IAPWG
Information Assurance Policy Working Group
IASE
Information Assurance Support Environment
IATAC
Information Assurance Technology Analysis Center
IATC
Interim Authority to Connect
IATO
Intermin Authority to Operate
IATT
Intermin Authority to Test
IAVA
Information Assurance Vulnerability Alert
IC
Intelligence Community
IEEE
Institute for Electrical and Electronics Engineers
INFOCONs
Information Operations Conditions
INFOSEC
Information Systems Security
INFOSYS
Information Systems
IO
Information Operations
IPMO
INFOSEC Program Management Office
IPR
Internet Protocol Router
IPSec
Internet Protocol Security
IPTF
Infrastructure Protection Task Force
IRC
INFOSEC Research Council
IRM
Information Resource Management
IRS
Incident Reporting Structure
IRT
Incident Response Team
ISO
International Organization for Standardization
ISRMC
Information Security Risk Management Committee
ISSM
Information System Security Manager
ISSO
Information System Security Officer
IT
Information Technology
ITMRA
Information Technology Management Reform Act
IW-D
Information Warfare – Defensive
JCCC
Joint Communications Control Center
JCIDS
Joint Capabilities Integration and Development System
JDIICS
Joint DII Control Systems
JID
Joint Intrusion Detection
JIE
Joint Information Environment
JIEO
Joint Interoperability Engineering Organization
JIWG
Joint IA Operations Working Group
JPO STC
Joint Program Office for Special Technical Countermeasures
JTF-CNO
Joint Task Force – Computer Network Operations
JWICS
Joint Worldwide Intelligence Communications System
JWID
Joint Warrior Interoperability Demonstration
KMI
Key Management Infrastructure
LE/CI
Law Enforcement and Counterintelligence
LEA
Law Enforcement Agency
MCDES
Malicious Code Detection and Eradication System
MLS WG
Multilevel Security Working Group
MOA
Memorandum of Agreement
MOU
Memorandum of Understanding
NACIC
National Counterintelligence Center
NCIS
Naval Criminal Investiative Service
NCSC
National Computer Security Center
NDU
National Defense University
NIAC
National Infrastructure Assurance Council
NID
Network Intrusion Detector
NII
National Information Infrastructure
NIPC
National Infrastructure Protection Center
NIPRNet
Non-Classified Internet Protocol Router Network
NISP
National Industrial Security Program
NIST
National Institute of Standards and Technology
NITB
National INFOSEC Technical baseline
NOC
Network Operating Centers
NOSC
Network Operation Security Center
NS/EP
National Security and Emergency Preparedness
NSA
National Security Agency
NSD
National Security Directive
NSIRC
National Security Incident Response Center
NSOC
National Security Operations Center
NSS
National Security System
NSTAC
National Security Telecommunication Advisory Committee
NSTISSC
National Security Telecommunications and Information Systems Security Committee
NSTISSI
National Security Telecommunications and Information Systems Security Instruction
OASD(C3I)
Office of the Assistant Secretary of Defense (Command, Control, Communications, and Intelligence)
OIG DoD
Office of the Inspector General of the Department of Defense
OMB
Office of Management and Budget
OPSEC
Operations Security
ORNL
Oak Ridge National Laboratory
OSD
Office of the Secretary of Defense
OSD/JS
Office of the Secretary of Defense/Joint Staff
OT&E
Operational Test and Evaluation
OUSD(P)
Office of the Under Secretary of Defense (Policy)
PAO
Principal Authorizing Official
PCCIP
President’s Commission on Critical Infrastructure Protection
PIA
Privacy Impact Assessment
PII
Personally Identifiable Information
PIN
Personal Identification Number
PIT
Platform Information Technology
PKI
Public Key Infrastructure
PM/SM
Program Manager/System Manager
POA&M
Plan of Action and Milestones
POA&M
Plan of Action and Milestones
POM
Program Objective Memorandum
PPP
Program Protection Plan
PPS
Internet Protocol Suite and Associated Ports
PPSM
Ports, Protocols, and Services Management
PPTP
Point-to-Point Tunneling Protocol
RCERTs
Regional Computer Emergency Response Teams
RDT&E
Research, Development, Test and Evaluation
RMF
Risk Management Framework
RMF
Risk Management Framework
ROSC
Regional Operations and Security Center
RT&E
Research, Test, and Evaluation
SAAR
System Authorization Access Request
SABI
Secret and Below Interoperability
SABI WG
Secret and Below Interoperability Working Group
SAP
Special Access Program
SAPCO
SAP Central Office
SAR
Security Assessment Report
SAR
Security Assessment Report
SATAN
Systems Administrators’ Tool for Assessing Networks
SBU
Sensitive-But-Unclassified
SCA
Security Control Assessor
SCAO
SIPRNET Connection Approval Office
SCAP
Security Content Automation Protocol
SCCVI
Secure Configuaration Compliance Validation Initiative
SCG
Security Configuration Guide
SCI
Sensitive Compartment Information
SCRI
Secure Compliance Remediation Intiative
SECDEF
Secretary of Defense
SEI
Software Engineering Institute
SET
Secure Encrypted Transaction
SIO
Special Information Operations
SIPRNet
Secret Internet Protocol Router Network
SISO
Senior Information Security Officer
SITR
Secret Internet Protocol Router Network Information Technology Registry
SLA
Service-Level Agreement
SLCM
System-Level Continuous Monitoring
SNAP
Systems/Networks Approval Process
SPB
Security Policy Board
SRG
Security Requirements Guide
SSAA
Systems Security Authorization Agreement
SSE
System Security Engineering
STIG
Security Technical Implementation Guide
STIGs
Security Technical Implementation Guides
TAG
Technical Advisory Group
THREATCON
Threat Condition
TPM
Trusted Platform Module
TRANSEC
Transmission Security
TRMC
Test Resource Management Center
TSN
Trusted Systems and Networks
U.S.C.
United States Code
UCAO
Unclassified Connection Approval Office
UCDMO
Unified Cross Domain Management Office
UCMJ
Uniform Code of Military Justice
URL
Uniform Resource Locator (Universal Resource Locator)
USD(AT&L)
Under Secretary of Defense for Acquisition, Technology, and Logistics
USD(I)
Under Secretary of Defense for Intelligence
USD(P)
Under Secretary of Defense for Policy
USD(P&R)
Under Secretary of Defense for Personnel and Readiness
USSTRATCOM
United States Strategic Command
VAAP
Vulnerability and Assessment Program
VAS
Vulnerability Assessment System
VPN
Virtual Private Network
WMA
Warfighting Mission Area