Skip to content
Acronyms
Share
Explore

DoD Cyber Acronyms

Acronyms and Glossary for DoD Cyber terms and acronyms
Acronyms
0
Acronym
Full Name
URL to explanation
Associated Compliance Framework(s)
Definition
1
eMASS
2
SSP
System Security Plan
3
A&A
Assessment and Authorization
4
ADP
Automated Data Processing
5
AES
Advanced Encryption Standard
6
AFC4A
Air Force C4 Agency
7
AFI
Air Force Instruction
8
AFIWC
Air Force Information Warfare Center
9
AFOSI
Air Force Office of Special Investigation
10
AFPD
Air Force Policy Directive
11
AIMS
Automated Infrastructure Management System
12
AIS
Automated Information Systems
13
AMIDS
Audit Monitoring and Intrusion Detection System
14
ANSI
American National Standards Institute
15
AO
Authorizing Official
RMF
16
AO
Authorizing Official
17
AODR
Authorizing Official Designated Representative
18
ASD(C31)
Assistant Secretary of Defense for Command, Control, Communication and Intelligence
19
ASIMS
Automated Security Incident Measuring System
20
ASSIST
Automated System Security Incident Support Team
21
ATC
Authorization to Connect
22
ATD
Authorization Termination Date
23
ATM
Asynchronous Transfer Mode
24
ATO
Authority to Operate
RMF
25
ATO
Authorization to Operate
26
BIOS
Basic Input and Output System
27
BMA
Business Mission Area
28
C&A
Certification and Accreditation
29
C&A WG
Certification and Accreditation Working Group
30
C2
Command and Control
31
C2W
Command and Control Warfare
32
C4
Command, Control, Communications, and Computers
33
C4ISR
Command, Control, Communications, Computer, Intelligence, Surveilance and Reconnaisssance
34
CA
Certification Authority
35
CAAP
Critical Asset Assurance Program
36
CAC
Common Access Card
37
CAC
Common Access Card
38
CAL
Category Assurance List
39
CAP
Connection Approval Program
40
CC
Common Criteria
41
CCA
Clinger-Cohen Act
42
CCB
Configuration Control Board
43
CCI
Control Correlation Identifiers
RMF
44
CCI
Control Correlation Identifier
45
CD
Cross Domain
46
CDS
Cross-Domain Solution
47
CERT
Computer Emergency Response Team
48
CERT/CC
CERT/Coordination Center
49
CFR
Code of Federal Regulations
50
CI
Counterintelligence
51
CIAC
Computer Incident Advisory Capability
52
CIAO
Critical Infrastructure Assurance office
53
CIO
Chief Information Officer
54
CIP
Critical Infrastructure Protection
55
CIPWG
Critical Infrastructure Protection Working Group
56
CIRT
Computer Incident Response Team
57
CISA
C4I Integration Support Activity
58
CITAC
Computer Investigation and Infrastructure Threat Assessment Center
59
CJCS
Chairman of the Joint Chiefs of Staff
60
CJCSI
Chairman, Joints Chiefs of Staff Instruction
61
CMDS
Computer Misuse Detection System
62
CMS
COMSEC Management System
63
CNA
Computer Network Attack
64
CNDSP
Computer Network Defense Service Provider
65
CNSS
Committee on National Security Systems
66
CNSSI
Committee on National Security Systems Instruction
67
CNSSP
Committee on National Security Systems Policy
68
COE
Common Operating Environment
69
COMSEC
Communications Security
70
CONOPS
Concept of Operations
71
COTS
Commericial Off-the-Shelf
72
CSA
Computer Security Act
73
CSIR
Computer (and Network) Security Incident Response
74
CSS
Central Security Service
75
CSSO
Computer Systems Security Officers
76
CUI
Controlled Unclassified Information
77
DAA
Designated Approving Authority (DAA)
78
DAAPM
79
DARPA
Defense Advanced Research Projects Agency
80
DASD
Deputy Assistant Secretary of Defense
81
DASD(DT&E)
Deputy Assistant Secretary of Defense for Developmental Test and Evaluation
82
DATO
Denial of Authorization To Operate
83
DCI
Director of Central Intelligence
84
DCID
Director of Central Intelligence Directive
85
DCMO
Deputy Chief Management Office
86
DCPDS
Defense Civilian Personnel Data System
87
DCSA
Defense Counterintelligence & Security Agency
88
DES
Digital Encryption Standard
89
DIA
Defense Intelligence Agency
90
DIACAP
DoD Information Assurance Certification and Accreditation Process
91
DIACCS
Defense IA Command and Control System
92
DIAMOND
Defense Intrusion Analysis & Monitoring Desk
93
DIAP
Defense Information Assurance Program
94
DIB
Defense Industrial Base
95
DIDS
Distributed Intrusions Detection System
96
DII
Defense Information Infrastructure
97
DIMA
DoD Portion of the Intelligence Mission Area
98
DIRNSA
Director, National Security Agency
99
DISA
Defense Information Systems Agency
100
DISA
Defense Information Systems Agency
101
DISN
Defense Information System Network
102
DITPR
DoD Information Technology Portfolio Repository
103
DITSCAP
DoD IT Security Certification and Accreditation Process
104
DITSWG
Defense Information Technology Security Working Group
105
DMC
Defense MegaCenter
106
DMS
Defense Message System
107
DNI
Director of National Intelligence
108
DNS
Domain Name Servers
109
DoD
Department of Defense
110
DoD CIO
DoD Chief Information Officer
111
DoD ISRMC
DoD Information Security Risk Management Committee
112
DoDD
Department of Defense Directive
113
DoDI
DoD Instruction
114
DoDIIS
DoD Intelligence Information System
115
DODIN
Department of Defense information networks
116
DoDM
DoD Manual
117
DoE
Department of Energy
118
DoN
Department of the Navy
119
DOT&E
Director, Operational Test and Evaluation
120
DREN
Defense Research and Engineering Network
121
DSAWG
Defense IA Security Accreditation Working Group
122
DSS
Defense Security Service
123
DT&E
Developmental Test and Evaluation
124
DTM
Directive-Type Memorandum
125
E/APL
Evaluated Approved Product
126
EAL
Evaluation Assurance Level
127
EFOIA
Electronic Freedom of Information Act
128
EIEMA
Enterprise Information Environment Mission Area
129
EITDR
Enterprise Information Technology Database Repository
130
eMASS
Enterprise Mission Assurance Support Service
131
EOP
Executive Office of the President
132
ETA
Education, Training and Awareness
133
ETAPWG
Education, Training, Awareness and Professionalization Working Group
134
FAR
Federal Acquisition Regulation
The FAR System governs the "acquisition process" by which of the acquire (i.e., or ) and by with .[1][2][3] The process consists of three phases:[4]
Need recognition and acquisition planning;
Contract formation; and
Contract administration.
The FAR System regulates the activities of government personnel in carrying out that process.
135
FCI
Federal Contract Information
136
FIPSPUB
Federal Information Processing Standard Publication
137
FIRST
Forum of Incident Resonse and Security Teams
138
FISMA
Federal Information Security Management Act
139
FIWC
Fleet information Warfare Center
140
FN
Foreign National
141
FOIA
Freedom of information Act
142
FSO
Field Security Office
143
FTS
Federal Telecommunications Service
144
GAO
General Accounting Office
145
GCCS
Global Command and Control System
146
GCSS
Global Combat Support System
147
GIG
Global Information Grid
148
GMITS
Guidelines for the Management of IT Security
149
GOSC
Global Operations and Security Center
150
GOTS
Government Off-the-Shelf
151
GSA
General Services Administration
152
GSII
Government Services Information Infrastructure
153
HBSS
Host Based Security System
154
I&W
Indications and Warning
155
IA
Information Assurance
156
IAD
Information Assurance Document
157
IAG
information Assurance Group
158
IAM
Information Assurance Manager
159
IAO
Information Assurance Officer
160
IAPWG
Information Assurance Policy Working Group
161
IASE
Information Assurance Support Environment
162
IATAC
Information Assurance Technology Analysis Center
163
IATC
Interim Authority to Connect
164
IATO
Intermin Authority to Operate
165
IATT
Intermin Authority to Test
166
IAVA
Information Assurance Vulnerability Alert
167
IC
Intelligence Community
168
IEEE
Institute for Electrical and Electronics Engineers
169
INFOCONs
Information Operations Conditions
170
INFOSEC
Information Systems Security
171
INFOSYS
Information Systems
172
IO
Information Operations
173
IP
Internet Protocol
174
IPMO
INFOSEC Program Management Office
175
IPR
Internet Protocol Router
176
IPSec
Internet Protocol Security
177
IPTF
Infrastructure Protection Task Force
178
IRC
INFOSEC Research Council
179
IRM
Information Resource Management
180
IRS
Incident Reporting Structure
181
IRT
Incident Response Team
182
IS
Information System
183
ISO
International Organization for Standardization
184
ISRMC
Information Security Risk Management Committee
185
ISSM
Information System Security Manager
186
ISSO
Information System Security Officer
187
ISSP
188
IT
Information Technology
189
ITMRA
Information Technology Management Reform Act
190
IW
Information Warfare
191
IW-D
Information Warfare – Defensive
192
JCCC
Joint Communications Control Center
193
JCIDS
Joint Capabilities Integration and Development System
194
JDIICS
Joint DII Control Systems
195
JID
Joint Intrusion Detection
196
JIE
Joint Information Environment
197
JIEO
Joint Interoperability Engineering Organization
198
JIWG
Joint IA Operations Working Group
199
JPO STC
Joint Program Office for Special Technical Countermeasures
200
JTF-CNO
Joint Task Force – Computer Network Operations
201
JWICS
Joint Worldwide Intelligence Communications System
202
JWID
Joint Warrior Interoperability Demonstration
203
KMI
Key Management Infrastructure
204
KS
Knowledge Service
205
LE
Law Enforcement
206
LE/CI
Law Enforcement and Counterintelligence
207
LEA
Law Enforcement Agency
208
MA
Mission Area
209
MCDES
Malicious Code Detection and Eradication System
210
MLS WG
Multilevel Security Working Group
211
MOA
Memorandum of Agreement
212
MOU
Memorandum of Understanding
213
NA
Not Applicable
214
NACIC
National Counterintelligence Center
215
NC
Non-Compliant
216
NCIS
Naval Criminal Investiative Service
217
NCSC
National Computer Security Center
218
NDU
National Defense University
219
NIAC
National Infrastructure Assurance Council
220
NID
Network Intrusion Detector
221
NII
National Information Infrastructure
222
NIPC
National Infrastructure Protection Center
223
NIPRNet
Non-Classified Internet Protocol Router Network
224
NISP
225
NISP
National Industrial Security Program
226
NIST
227
NIST
National Institute of Standards and Technology
228
NITB
National INFOSEC Technical baseline
229
NOC
Network Operating Centers
230
NOSC
Network Operation Security Center
231
NS/EP
National Security and Emergency Preparedness
232
NSA
National Security Agency
233
NSD
National Security Directive
234
NSIRC
National Security Incident Response Center
235
NSOC
National Security Operations Center
236
NSS
National Security System
237
NSTAC
National Security Telecommunication Advisory Committee
238
NSTISSC
National Security Telecommunications and Information Systems Security Committee
239
NSTISSI
National Security Telecommunications and Information Systems Security Instruction
240
NSU
Non-Standard Usage
241
OASD(C3I)
Office of the Assistant Secretary of Defense (Command, Control, Communications, and Intelligence)
242
OIG DoD
Office of the Inspector General of the Department of Defense
243
OMB
Office of Management and Budget
244
OPSEC
Operations Security
245
ORNL
Oak Ridge National Laboratory
246
OSD
Office of the Secretary of Defense
247
OSD/JS
Office of the Secretary of Defense/Joint Staff
248
OT&E
Operational Test and Evaluation
249
OUSD(P)
Office of the Under Secretary of Defense (Policy)
250
PAO
Principal Authorizing Official
251
PCCIP
President’s Commission on Critical Infrastructure Protection
252
PGP
Pretty Good Privacy
253
PIA
Privacy Impact Assessment
254
PII
Personally Identifiable Information
255
PIN
Personal Identification Number
256
PIT
Platform Information Technology
257
PKI
Public Key Infrastructure
258
PM
Program Manager
259
PM/SM
Program Manager/System Manager
260
POA&M
Plan of Action and Milestones
261
POA&M
Plan of Action and Milestones
262
POM
Program Objective Memorandum
263
PPP
Program Protection Plan
264
PPS
Internet Protocol Suite and Associated Ports
265
PPSM
Ports, Protocols, and Services Management
266
PPTP
Point-to-Point Tunneling Protocol
267
RCERTs
Regional Computer Emergency Response Teams
268
RDT&E
Research, Development, Test and Evaluation
269
RMF
Risk Management Framework
RMF
270
RMF
Risk Management Framework
271
ROSC
Regional Operations and Security Center
272
RT&E
Research, Test, and Evaluation
273
SAAR
System Authorization Access Request
274
SABI
Secret and Below Interoperability
275
SABI WG
Secret and Below Interoperability Working Group
276
SAP
Special Access Program
277
SAPCO
SAP Central Office
278
SAR
Security Assessment Report
279
SAR
Security Assessment Report
280
SATAN
Systems Administrators’ Tool for Assessing Networks
281
SBU
Sensitive-But-Unclassified
282
SCA
Security Control Assessor
283
SCAO
SIPRNET Connection Approval Office
284
SCAP
Security Content Automation Protocol
285
SCCVI
Secure Configuaration Compliance Validation Initiative
286
SCG
Security Configuration Guide
287
SCI
Sensitive Compartment Information
288
SCRI
Secure Compliance Remediation Intiative
289
SECDEF
Secretary of Defense
290
SEI
Software Engineering Institute
291
SET
Secure Encrypted Transaction
292
SIO
Special Information Operations
293
SIPRNet
Secret Internet Protocol Router Network
294
SISO
Senior Information Security Officer
295
SITR
Secret Internet Protocol Router Network Information Technology Registry
296
SLA
Service-Level Agreement
297
SLCM
System-Level Continuous Monitoring
298
SM
System Manager
299
SNAP
Systems/Networks Approval Process
300
SP
Special Publication
301
SPB
Security Policy Board
302
SRG
Security Requirements Guide
303
SSAA
Systems Security Authorization Agreement
304
SSE
System Security Engineering
305
STIG
Security Technical Implementation Guide
CCRI
RMF
306
STIGs
Security Technical Implementation Guides
307
T&E
Test and Evaluation
308
TAG
Technical Advisory Group
309
THREATCON
Threat Condition
310
TPM
Trusted Platform Module
311
TRANSEC
Transmission Security
312
TRMC
Test Resource Management Center
313
TSN
Trusted Systems and Networks
314
U.S.C.
United States Code
315
UC
Unified Capabilities
316
UCAO
Unclassified Connection Approval Office
317
UCDMO
Unified Cross Domain Management Office
318
UCMJ
Uniform Code of Military Justice
319
UR
User Representative
320
URL
Uniform Resource Locator (Universal Resource Locator)
321
USD(AT&L)
Under Secretary of Defense for Acquisition, Technology, and Logistics
322
USD(I)
Under Secretary of Defense for Intelligence
323
USD(P)
Under Secretary of Defense for Policy
324
USD(P&R)
Under Secretary of Defense for Personnel and Readiness
325
USSTRATCOM
United States Strategic Command
326
VAAP
Vulnerability and Assessment Program
327
VAS
Vulnerability Assessment System
328
VPN
Virtual Private Network
329
WMA
Warfighting Mission Area
There are no rows in this table
329
Count

/

Want to print your doc?
This is not the way.
Try clicking the ⋯ next to your doc name or using a keyboard shortcut (
CtrlP
) instead.