John Hopkins on Thu, 8 Dec 2011 12:05:42 +0100 (CET)


[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

<nettime> COMMAND, CONTROL, COMMUNICATIONS, AND COMPUTER (C4) SYSTEMS SECURITY GLOSSARY



ACL Access Control List
ADM Advanced Development Model
ADP Automated Data Processing
ADPE Automated Data Processing Equipment
AE Application Entity
AFSSI Air Force Systems Security Instruction
AFSSM Air Force Systems Security Memorandum
AIG Address Indicator Group
AIRK Area Interswitch Rekeying Key
AIS Automated Information System
AISS Automated Information System Security
AJ Anti-Jamming
AK Automatic Remote Rekeying
AKDC Automatic Key Distribution Center
AKD/RCU Automatic Key Distribution/Rekeying Control Unit
AKM Automated Key Management Center
ALC Accounting Legend Code
AMS 1. Auto-Manual System
2. Autonomous Message Switch
ANDVT Advanced Narrowband Digital Voice Terminal
ANSI American National Standards Institute
AOSS Automated Office Support System
APC Adaptive Predictive Coding
APL Assessed Products List
APU Auxiliary Power Unit
ARES Automated Risk Evaluation System
ARPANET Advanced Research Projects Agency Network
ASCII American Standard Code for Information Interchange
ASPJ Advanced Self-Protection Jammer
ASU Approval for Service Use
ATAM Automated Threat Assessment Methodology
AUTODIN Automatic Digital Network
AUTOSEVOCOM Automatic Secure Voice Communications (Network)
AUTOVON Automatic Voice Network
AV Auxiliary Vector
AVP Authorized Vendor Program
BCSSO Base Computer System Security Officer
BPS Bits Per Second
C3 Command, Control, and Communications
C3I Command, Control, Communications, and Intelligence
C4 Command, Control, Communications, and Computer
CA 1. Controlling Authority
2. Crypto-Analysis
3. COMSEC Account
4. Command Authority
CCB Configuration Control Board
CCEP Commercial COMSEC Endorsement Program
CCI Controlled Cryptographic Item
CCO 1. Circuit Control Officer
2. Configuration Control Officer
CDR Critical Design Review
CDRL Contract Data Requirements List
CDS Cryptographic Device Services
CEOI Communications-Electronics Operating Instruction
CEPR Compromising Emanation Performance Requirement
CERT Computer Emergency Response Team
CFD Common Fill Device
CI Configuration Item
CIAC Computer Incident Assessment Capability
CIK Crypto-Ignition Key
CIP Crypto-Ignition Plug
CIRK Common Interswitch Rekeying Key
CK Compartment Key
CKG Cooperative Key Generation
CKL Compromised Key List
CLMD COMSEC Local Management Device
CM Configuration Management
CMCS COMSEC Material Control System
CMP Configuration Management Plan
CMS C4 Systems Security Management System
CNCS Cryptonet Control Station
CNK Cryptonet Key
CNLZ COMSEC No-Lone Zone
COMPUSEC Computer Security
COMSEC Communications Security
COOP Continuity Of Operations Plan
COR Central Office of Record
COTS Commercial Off-The-Shelf
CPC Computer Program Component
CPCI Computer Program Configuration Item
CPS COMSEC Parent Switch
CPU Central Processing Unit
CRC Cyclic Redundancy Check
CRIB Card Reader Insert Board
CRO COMSEC Responsible Officer
CRLCMP Computer Resources Life Cycle Management Plan
CRP COMSEC Resources Program (Budget)
CRWG Computer Resources Working Group
Crypt/Crypto Cryptographic-Related
CSA Cognizant Security Authority
CSC Computer Software Component
CSCI Computer Software Configuration Item
CSE Communications Security Element
CSETWG Computer Security Education and Training Working Group
CSM Computer System Manager
CSO C4 Systems Officer
CSPP Communications-Computer Systems Program Plan
CSRD Communications-Computer Systems Requirements Document
CSS 1. COMSEC Subordinate Switch
2. Constant Surveillance Service (courier)
3. Continuous Signature Service (courier)
CSSO 1. Computer System Security Officer
2. Contractor Special Security Officer
CSSP Computer Security Support Program
CSTVRP Computer Security Technical Vulnerability Reporting Program
CSWG Computer Security Working Group
CTAK Cipher Text Auto-Key
CTTA Certified TEMPEST Technical Authority
CUP COMSEC Utility Program
CVA Clandestine Vulnerability Analysis
CVRP C4 System Security Vulnerability Reporting Program
DAA Designated Approving Authority
DAC Discretionary Access Control
DAMA Demand Assigned Multiple Access
DBMS Data Base Management System
DCP Decision Coordinating Paper
DCS 1. Defense Communications System
2. Defense Courier Service
DCSP Design Controlled Spare Part
DDN Defense Data Network
DDS Dual Driver Service (courier)
DES Data Encryption Standard
DIB Directory Information Base
DID Data Item Description
DLED Dedicated Loop Encryption Device
DMA Direct Memory Access
DoD TCSEC Department of Defense Trusted Computer System Evaluation Criteria
DPL Degausser Products List (a section in the Information Systems Security Products
and Services Catalogue)
DSN Defense Switched Network
DSVT Digital Subscriber Voice Terminal
DTD Data Transfer Device
DT&E Developmental Test and Evaluation
DTLS Descriptive Top-Level Specification
DTS Diplomatic Telecommunications Service
DUA Directory User Agent
D&V Demonstration and Validation
EAM Emergency Action Message
ECCM Electronic Counter-Countermeasures
ECM Electronic Countermeasures
ECPL Endorsed Cryptographic Products List (a section in the Information Systems Security Products
and Services Catalogue)
EDAC Error Detection and Correction
EDESPL Endorsed Data Encryption Standard Products List
EDM Engineering Development Model
EEPROM Electrically Erasable Programmable Read-Only Memory
EFD Electronic Fill Device
EFTO Encrypt for Transmission Only
EGADS Electronic Generation, Accounting, and Distribution System
EKMS Electronic Key Management System
ELINT Electronic Intelligence
ELSEC Electronic Security
E-Mail Electronic Mail
E Model Engineering Development Model
EMSEC Emissions Security
EPL Evaluated Products List (a section in the Information Systems Security Products
and Services Catalogue)
EPROM Erasable Programmable Read Only Memory
ERTZ Equipment Radiation TEMPEST Zone
ETL Endorsed Tools List
ETPL Endorsed TEMPEST Products List
EUCI Endorsed for Unclassified Cryptographic Information
EV Enforcement Vector
FCA 1. Functional Configuration Audit
2. Formal Cryptographic Access
FDIU Fill Device Interface Unit
FDM Formal Development Methodology
FIPS Federal Information Processing Standard
FIPS PUB Federal Information Processing Standard Publication
FOCI Foreign Owned, Controlled, or Influenced
FOT&E Follow-On Operational Test and Evaluation
FOUO For Official Use Only
FQR Formal Qualification Review
FQT Formal Qualification Testing
FSD Full Scale Development
FSRS Functional Security Requirements Specification
FSTS Federal Secure Telephone Service
FTAM File Transfer Access Management
FTLS Formal Top-Level Specification
FTS Federal Telecommunications System
GPS Global Positioning System
GTS Global Telecommunications Service
GWEN Ground Wave Emergency Network
HDM Hierarchical Development Methodology
HOL High Order Language
HSM Human Safety Mandatory Modification
HUS Hardened Unique Storage
HUSK Hardened Unique Storage Key
IBAC Identity Based Access Control
ICU Interface Control Unit
IDS Intrusion Detection System
IEMATS Improved Emergency Message Automated Transmission System
IFF Identification, Friend or Foe
IFFN Identification, Friend, Foe, or Neutral
IIRK Interarea Interswitch Rekeying Key
ILS Integrated Logistics Support
I/O Input/Output
IOT&E Initial Operational Test and Evaluation
IP Internet Protocol
IPM Interpersonal Messaging
IPSO Internet Protocol Security Option
IRK Interswitch Rekeying Key
IS Information System
ISDN Integrated Services Digital Network
ISO International Standards Organization
ISS Information Systems Security
ISSO Information Systems Security Officer
ITAR International Traffic in Arms Regulation
IV&V Independent Verification and Validation
JMSNS Justification for Major System New Start
JTIDS Joint Tactical Information Distribution System
KAK Key-Auto-Key
KEK Key Encryption Key
KG Key Generator
KMASE Key Management Application Service Element
KMC Key Management Center
KMID Key Management Identification Number
KMODC Key Material Ordering and Distribution Center
KMP Key Management Protocol
KMPDU Key Management Protocol Data Unit
KMS Key Management System
KMSA Key Management System Agent
KMUA Key Management User Agent
KP Key Processor
KPK Key Production Key
KSOS Kernelized Secure Operating System
KVG Key Variable Generator
LAN Local Area Network
LEAD Low-Cost Encryption/Authentication Device
LKG Loop Key Generator
LMD Local Management Device
LME Layer Management Entry
LMI Layer Management Interface
LOCK Logical Co-Processing Kernel
LPC Linear Predictive Coding
LPD Low Probability of Detection
LPI Low Probability of Intercept
LRIP Limited Rate Initial Preproduction
LSI Large Scale Integration
MAC 1. Mandatory Access Control
2. Message Authentication Code
MAN Mandatory Modification
MATSYM Material Symbol
MCCB Modification/Configuration Control Board
MCCR Mission Critical Computer Resources
MCSSM MAJCOM Computer Systems Security Manager
MCTL Military Critical Technologies List
MDC 1. Manipulation Detection Code
2. Message Distribution Center
MEECN Minimum Essential Emergency Communications Network
MEP Management Engineering Plan
MER Minimum Essential Requirements
MHS Message Handling System
MI Message Indicator
MIB Management Information Base
MIJI Meaconing, Intrusion, Jamming, and Interference
MIL-STD Military Standard
MINTERM Miniature Terminal
MIPR Military Interdepartmental Purchase Request
MLS Multilevel Security
MOA Memorandum of Agreement
MOE Measure of Effectiveness
MOP Measure of Performance
MOU Memorandum of Understanding
MRK Manual Remote Rekeying
MRT Miniature Receiver Terminal
MSE Mobile Subscriber Equipment
MTT Methodologies, Tools, and Techniques
NACAM National COMSEC Advisory Memorandum
NACSEM National COMSEC Emanations Memorandum
NACSI National COMSEC Instruction
NACSIM National COMSEC Information Memorandum
NAK Negative Acknowledge
NATO North Atlantic Treaty Organization
NCCD National Command and Control Document
NCS 1. National Communications System
2. National Cryptologic School
3. Net Control Station
NCSC National Computer Security Center
NETS Nationwide Emergency Telecommunications Service
NISAC 1. National Information Security Assessment Center
2. National Industrial Security Advisory Committee
NIST National Institute for Standards and Technology
NKSR Non-Kernel Security-Related (software)
NSA National Security Agency
NSAD Network Security Architecture and Design
NSD National Security Directive
NSDD National Security Decision Directive
NSEP National Security Emergency Preparedness
NSM Network Security Manager
NSO Network Security Officer
NSP Network Security Plan
NSTAC National Security Telecommunications Advisory Committee
NSTISSAM National Security Telecommunications and Information Systems Security
Advisory/Information Memorandum
NSTISSC National Security Telecommunications and Information Systems Security Committee NSTISSD National Security Telecommunications and Information Systems Security Directive NSTISSI National Security Telecommunications and Information Systems Security Instruction
NSTISSP National Security Telecommunications and Information Systems Security Policy
NTCB Network Trusted Computing Base
NTIA National Telecommunications and Information Administration
NTISSAM National Telecommunications and Information Systems Security Advisory/
Information Memorandum
NTISSC National Telecommunications and Information Systems Security Committee
NTISSD National Telecommunications and Information Systems Security Directive
NTISSI National Telecommunications and Information Systems Security Instruction
NTISSP National Telecommunications and Information Systems Security Policy
O&M Operations and Maintenance
OADR Originating Agency's Determination Required
OMB CIR Office of Management and Budget Circular
OPCODE Operations Code
OPSEC Operations Security
OPT Optional Modification
ORD Operational Requirements Document
OT&E Operational Test and Evaluation
OTAD Over-the-Air Key Distribution
OTAR Over-the-Air Rekeying
OTAT Over-the-Air Key Transfer
OTP One-Time Pad
OTT One-Time Tape
PA Privacy Act
PAA Peer Access Approval
PAE Peer Access Enforcement
PAL Permissive Action Link
PC Personal Computer
PCA Physical Configuration Audit
PCS Physical Control Space
PCZ 1. Protected Communications Zone
2. Physical Control Zone
P&D Production and Deployment
PDL Program Design Language
PDR Preliminary Design Review
PDS 1. Practice Dangerous to Security
2. Protected Distribution System
PDU Protocol Data Unit
PERC Product Evaluation Resource Center
PES Positive Enable System
PKA Public Key Algorithm
PKC Public Key Cryptography
PKSD Programmable Key Storage Device
PL Public Law
PLSDU Physical Layer Service Data Unit
P Model Preproduction Model
PM 1. Program Manager
2. Preventative Maintenance
PMD Program Management Directive
PMO Program Management Office
PMP Program Management Plan
PNEK Post-Nuclear Event Key
POM Program Objective Memorandum
PPL Preferred Products List (a section in the Information Systems Security Products
and Services Catalogue)
PRBAC Partition Rule Base Access Control
PROM Programmable Read-Only Memory
PROPIN Proprietary Information
PSDU Physical Layer Service Data Unit
PSL Protected Services List
PTT Push-to-Talk
PWA Printed Wiring Assembly
PWDS Protected Wireline Distribution System
QOT&E Qualification Operational Test and Evaluation
QT&E Qualification Test and Evaluation
RAC Repair Action
RACE Rapid Automatic Cryptographic Equipment
RAM Random Access Memory
RCCI Regional Computer Crime Investigator
R&D Research and Development
RFP Request For Proposal
ROM Read-Only Memory
RQT Reliability Qualification Tests
SAISS Subcommittee on Automated Information Systems Security (of the NTISSC)
SAMS Semi-Automatic Message Switch
SAO Special Access Office
SAP 1. System Acquisition Plan
2. Special Access Program
SARK SAVILLE Advanced Remote Keying
SCI Sensitive Compartmented Information
SCIF Sensitive Compartmented Information Facility
SCOMP Secure Communications Processor
SCP System Concept Paper
SDNRIU Secure Digital Net Radio Interface Unit
SDNS Secure Data Network System
SDR System Design Review
SFA Security Fault Analysis
SI Special Intelligence
SIGSEC Signals Security
SISS Subcommittee on Information Systems Security (of the NSTISSC)
SMM Special Mission Mandatory Modification
SMO Special Mission Optional Modification
SMU Secure Mobile Unit
SON Statement of Operational Need
SOW Statement of Work
SPK Single Point Key(ing)
SPO System Program Office
SPS Scratch Pad Store
SRR System Requirements Review
SSO Special Security Officer
SSR Software Specification Review
ST&E Security Test and Evaluation
STAR System Threat Assessment Report
STD Standard
STS Subcommittee on Telecommunications Security (of the NTISSC)
STU Secure Telephone Unit
TA Traffic Analysis
TACTED Tactical Trunk Encryption Device
TACTERM Tactical Terminal
TAG TEMPEST Advisory Group
TAISS Telecommunications and Automated Information Systems Security
TASO Terminal Area Security Officer
TCB Trusted Computing Base
TCD Time Compliance Data
TCSEC (DoD) Trusted Computer System Evaluation Criteria
TD Transfer Device
TDBI Trusted Data Base Interpretation (of the TCSEC)
T&E Test and Evaluation
TED Trunk Encryption Device
TEI Trusted Evaluated Interpretation (of the TCSEC)
TEK Traffic Encryption Key
TEMP Test and Evaluation Master Plan
TEMPEST Compromising Emanations
TEP TEMPEST Endorsement Program
TFM Trusted Facility Manual
TFS Traffic Flow Security
TLS Top-Level Specification
TNI Trusted Network Interpretation (of the TCSEC)
TNIEG Trusted Network Interpretation Environment Guideline
TPC Two-Person Control
TPI Two-Person Integrity
TPWG Test Planning Working Group
TRANSEC Transmission Security
TRB Technical Review Board
TRI-TAC Tri-Service Tactical Communications System
TRR Test Readiness Review
TSCM Technical Surveillance Countermeasure
TSEC Telecommunications Security
TSK Transmission Security Key
UA User Agent
UIRK Unique Interswitch Rekeying Key
UIS User Interface System
UK Unique Key
UPP User Partnership Program
USDE Undesired Signal Data Emanations
USER ID User Identification
VDT Video Display Terminal
V Model Advanced Development Model
VST VINSON Subscriber Terminal
VTT VINSON Trunk Terminal
WAN Wide Area Network
WWMCCS Worldwide Military Command and Control System
XDM/X Model Experimental Development Model/Exploratory Development Model


#  distributed via <nettime>: no commercial use without permission
#  <nettime>  is a moderated mailing list for net criticism,
#  collaborative text filtering and cultural politics of the nets
#  more info: http://mx.kein.org/mailman/listinfo/nettime-l
#  archive: http://www.nettime.org contact: nettime@kein.org