AC
|
Access Control
|
AES
|
Advanced Encryption Standards
|
AO
|
Authorizing Official
|
ARB
|
Acquisition Review Board
|
AT
|
Awareness and Training
|
ATO
|
Authority to Operate
|
AU
|
Audit and Accountability
|
BI
|
Background Investigation
|
BIA
|
Business Impact Assessment
|
BLSR
|
Baseline Security Requirements
|
CA
|
Certificate Authority
|
CA
|
Certification, Accreditation, and Security Assessments
|
CCB
|
Change Control Board
|
CFO
|
Chief Financial Officer
|
CI
|
Counter-Intelligence
|
C-I-A
|
Confidentiality, Integrity, and Availability
|
CIO
|
Chief Information Officer
|
CISID
|
Chief, Internal Security and Investigations Division
|
CISO
|
Chief Information Security Officer
|
CM
|
Configuration Management
|
CMG
|
Core Management Group
|
CMP
|
Configuration Management Plan
|
CONOPS
|
Concept of Operations
|
COOP
|
Continuity of Operations Planning
|
COOP
|
Continuity of Operations Plan
|
COTS
|
Commercial off the Shelf
|
CP
|
Certificate Policy
|
CP
|
Contingency Plan
|
CP
|
Contingency Planning
|
CPIC
|
Capital Planning and Investment Control
|
CPS
|
Certificate Practices Statement
|
CRE
|
Computer-Readable Extract
|
CRL
|
Certificate Revocation List
|
CSIRC
|
Computer Security Incident Response Center
|
CUI
|
Control Unclassified Information
|
DES
|
Digital Encryption Standards
|
DHS
|
Department of Homeland Security
|
DNSSE
|
Domain Name System Security Extensions
|
DoD
|
Department of Defense
|
DoS
|
Department of State
|
DoT
|
Department of Treasury
|
EA
|
Enterprise Architecture
|
EAB
|
Enterprise Architecture Board
|
EO
|
Executive Order
|
EOC
|
Enterprise Operations Center
|
FBCA
|
Federal Bridge Certification Authority
|
FDCC
|
Federal Desktop Core Configuration
|
FICAM
|
Federal Identity, Credentialing, and Access Management
|
FIPS
|
Federal Information Processing Standard
|
FISMA
|
Federal Information Security Management Act
|
FOUO
|
For Official Use Only
|
FPKI PA
|
Federal PKI Policy Authority
|
FTP
|
File Transfer Protocol
|
FYHSP
|
Future Years Homeland Security Program
|
GSA
|
General Services Administration
|
GSS
|
General Support System
|
HIPAA
|
Health Insurance Portability and Accountability Act
|
HSAR
|
Homeland Security Acquisition Regulations
|
HSPD
|
Homeland Security Presidential Directive
|
HVAC
|
Heating, Ventilation and Air Conditioning
|
IA
|
Identification and Authentication
|
IA
|
Information Assurance
|
IATO
|
Interim Authority to Operate
|
ICAM
|
Identity, Credentialing, and Access Management
|
IDS
|
Intrusion Detection System
|
IOD
|
Object identifier
|
IR
|
Infrared Response
|
IR
|
Incident Response
|
IRB
|
Investment Review Board
|
ISA
|
Interconnection Security Agreement
|
ISO
|
Information Security Office
|
ISSO
|
Information System Security Officer
|
ISVM
|
Information System Vulnerability Management
|
IT
|
Information Technology
|
JWICS
|
Joint Worldwide Intelligence Communications System
|
LAN
|
Local Area Network
|
LE
|
Law Enforcement
|
LMR
|
Land Mobile Radio
|
MA
|
Maintenance
|
MA
|
Major Application
|
MBI
|
Minimum Background Investigation
|
MBI
|
Minimum Background Investigation
|
MD
|
Management Directive
|
MD
|
Management Directive
|
MMS
|
Multimedia Messaging Service
|
MMS
|
Multimedia Messaging Service
|
MP
|
Media Protection
|
MP
|
Media Protection
|
NIAP
|
National Information Assurance Partnership
|
NIAP
|
National Information Assurance Partnership
|
NIST
|
National Institute of Standards and Technology
|
NOC
|
Network Operations Center
|
NSA
|
National Security Agency
|
OCIO
|
Office of the Chief Information Officer
|
OIG
|
Office of Inspector General
|
OIS
|
Office of Information Security
|
OMB
|
Office of Management and Budget
|
OPA
|
Office of Public Affairs
|
OPM
|
Office of Personnel Management
|
OTAR
|
Over-The-Air-Rekeying
|
PA
|
Policy Authority
|
PBX
|
Private Branch Exchange
|
PCS
|
Personal Communications Services
|
PDA
|
Personal Digital Assistant
|
PE
|
Physical and Environmental Protection
|
PED
|
Portable Electronic Device
|
PEP
|
Policy Enforcement Point
|
PHI
|
Protected Health Information
|
PIA
|
Privacy Impact Assessment
|
PII
|
Personally Identifiable Information
|
PIN
|
Personal Identity Number
|
PIRT
|
Privacy Incident Response Team
|
PIV
|
Personal Identity Verification
|
PKI
|
Public Key Infrastructure
|
PKI PA
|
PKI Policy Authority
|
PKI PM
|
PKI Management Authority
|
PL
|
Planning
|
PM
|
Program Manager
|
PM
|
Program Manager
|
PNS
|
Protected Network Services
|
POA&M
|
Plan of Action and Milestones
|
POC
|
Point of Contact
|
PPOC
|
Privacy Point of Contact
|
PS
|
Personnel Security
|
PSTN
|
Public Switched Telephone Network
|
PTA
|
Privacy Threshold Analysis
|
RA
|
Risk Assessment
|
RA
|
Registration Authority
|
RDP
|
Remote Desktop Protocol
|
RF
|
Radio Frequency
|
RFI
|
Radio Frequency Identification
|
RMS
|
Risk Management System
|
SA
|
System and Services Acquisition
|
SA
|
Security Architecture
|
SAISO
|
Senior Agency Information Security Officer
|
SAN
|
Subject Alternative Name
|
SAOP
|
Senior Agency Official for Privacy
|
SAR
|
Security Assessment Report
|
SC
|
System and Communications Protection
|
SCDN
|
Homeland Secure Data Network
|
SCI
|
Sensitive Compartmented Information
|
SCO
|
Chief Security Officer
|
SELC
|
Systems Engineering Life Cycle
|
SI
|
System and Information Integrity
|
SLA
|
Service Level Agreement
|
SMS
|
Short Message Service
|
SOC
|
Security Operations Center
|
SOP
|
Standard Operating Procedure
|
SORN
|
System of Records Notice
|
SP
|
Security Plan
|
SP
|
Special Publication
|
SSH
|
Secure Shell
|
SSL
|
Secure Socket Layer
|
SSP
|
Shared Service Provider
|
TAF
|
TrustedAgent FISMA
|
TFPAP
|
Trust Framework Provider Adoption Process
|
TIC
|
Trusted Internet Connections
|
TOS
|
Terms of Service
|
TRM
|
Technical Reference Model
|
TS
|
Top Secret
|
US-CERT
|
United States Computer Emergency Readiness Team
|
USGCB
|
U.S. Government Configuration Baseline
|
VA
|
Vulnerability Assessment
|
VAT
|
Vulnerability Assessment Team
|
VoIP
|
Voice over Internet Protocol
|
VPN
|
Virtual Private Network
|
WLAN
|
Wireless Local Area Network
|
WPAN
|
Wireless Personal Area Network
|
WWAN
|
Wireless Wide Area Network
|