‘System and Network Security Acronyms terageney Report 7881 and Abbreviations er 209 Karen Scarfone Victoria Thompson ‘Computer Security Divison Information Techpoloey Laboratory [Nati
Trang 1ist interagency Report 7884
National institute of
Stondords and Technology
US Deportment of Commerce
Trang 2‘System and Network Security Acronyms
terageney Report 7881 and Abbreviations
er 209
Karen Scarfone Victoria Thompson
‘Computer Security Divison Information Techpoloey Laboratory [Natio Insite of Stands and Technolgy Gaithersburg, MD 20899-9931
Trang 3Reports on Computer Systems Technology The Information Technology Laboratory (TL) atthe National fstiate of Standards and Technoloxy (NIST) promotes the US, economy and public welfare by paving technical leadership forthe tion's
‘measurement una stands infrastructure ITI develops tess test thas referenced, prot a
‘Sincept iplementations, ad toca analysis o aemace the development an pvodict use of Jaformation technology TL s responsibilities ielade the development of tenia pss,
lninidito, and management starsat ae guidelines for theeostefTectve scary and pb ay of
*emelite unetsfielnfovnatip in Federal eompater systems, This Interagenes Report disensses ITL'S
‘Rseath, guidance and outeach eons in computer security ad its eallaboratve acts with indus,
‘government, and academic organizations
[Nato fst of Standards nd Technology Interagency Report 2581 SE pes (Sep 20095
Natal nite of Saar al Teshastogy no ited i ngÌyTh the
‘hits, materials or ep! nr©veeuly th ex seller fe porns
Trang 4Sreteu aio NEtwoNKSECURTY chon AND ABARAT Acknowledgments
‘The autors, Karen Scarfone ofthe National Institue of Standards and Technology (NIST) and Victoria
“Thompson of Booz Allen Hamilton wish o thank thir colleagues who reviewed drafts ofthis repo, particularly Liz Lennon and Tim Grance of NIST, Thanks also g to individual sp orsanizaion: that Submited sugzestions,panicularly Tim Kramer, Mark Secof,Janine Pai, the US Deparment of Energy and the US, Department of State The authors also thank thir collegues who crested acronyn arn! abbreviation iss fo thie publications that were subsequently use as soares of information To hs not
‘Trademark Information All ames are registred trademarks o trademarks of thee respective companies,
Trang 6Introduction
“This report contains a ist of selected asonyas and abbreviations for syst and network secuft terms
‘vith their veneraly accepted or preted defiations Kis intended ss «sours fr federal asenciss stad tet ucts af ydem and ntyorh secudly pghicgione
“The capitalization, sping, an definitions of acronyms and abbreviations frequently vary among publications fis easy to understand why this happens While some aeronyns and abbreviations (e.g WWW) ve onc univeralyroenanized! a undesced definition within the domtin of system and sotwork sory, olhers (eg, 1A, MAC) have nlite valid ditions depending pon the conte in
‘hich they ae sed, Some acronyms beat he reserlance to thee dentons, sch as Mies of (Operation Validation System forthe Triple DES Algorithm (TMOVS), Other use unexpected
“aptalization or speling (, Electonke Business using eXtensible Markup Language (€bXMLI and (Organisation for Eoononie Co-operation an! Development (OECD, Asa ret cronyns,
abbreviations and thse definitions may be inaccunsely or inconsistently defined by authors, perpetuating
‘rors ad confusing of misleading readers
‘his epot s meant to help reduce these ems an confusion by providing the generally accep ot prefered definitions of a so requemily used acronyms and abbreviations The list docs not nel all, Sssem and network swat teen, tor ita compen of every atonym an seston Foard i stem and network security dncuments published by NIST Reales sould peer o each documents Uist
St acroayans abd abreviations typically found in a append) For definisons applicable ta that
‘Technical terms are nt capitalized unless they ars proper nouns Names of pepe, places apd ups and he ties of protocol, tana, a algortns sre eansidered prope bans For Example ceitication a cerediation (C&A) sno eaialzed, but Advanced Enerypion Standard TABS) is capInlal
18 Collective nouns ae not eaitalzed fez wide are neswork [WAND,
H8 Nhon «wo or more dsfinitions of te same serio abbreiston ar given, the aceon oF sbrevaton is talisiz! and repeated! for cach definition, Dtnions are ts alphabetically
Trang 72 — Acronym and Abbreviatlon LISL
‘Tis section consists of a is of selected ystom and network sec acronyms and abbreviations, along
‘vith hii generally accepted fits, When there ate supe dint for single erm tae
‘seronymt or abeviation s aliczed an each deFincon is Usted separately
Numeric
TWRTT ‘one ies aio transhisdontacbonloay
3DES “TRpe DạS Eacrypioa Siaaa!
3 Sd Generation
3GPP 5rd Generation Partersip Project
3GPP3 3nd Generation Panaerstip Projet 2
A
4 wre resource econ ype
^A ADAG atte athens
AAA aulsetcaion, authorization, and accounting
AAAK, tademicdlon auhiniygien, an ryoantine key
AAD aional heated data
SAR ser ssion report
AAS ‘Mapiveattenna system
ABAC ute ase acess cont
acl aoces conta Hist
ACM Associaton for Computing Machinery
aco aythemicated eipher offset
AD Active Diets
AD sathenate data
ADs senate data seam
AES Avancal Eneyplion Stadt
AES.CBC Avancod Enerypiion Stand Cipher Blok Chaining
AES-CTR ‘Advanced Encryplio Standa-Counter Made
AFH adap fegueney hopping
A-GPS assisted global positioning system
alt Authentication cadet
AIDC “3womsdie eniiston and data capeure
AM, Associ to Am deifeafon atl Mobility
AIT automate Meniestion technology
AIAN ‘Asymvtonous Fvaeript an! XML
aK aaRofzadinn key
AKID abotzaion ky dsnifer
AKM dutencaion and key management
ALG “pplication lager patewoy
ANSI American National Sana Instioe
APL ‘pplication programming intertce
Trang 8Adsnce Research Pree Agency snthenaton server
-3whewicdlon service
‘Aut Spyvare Coalition
‘ewe Stata Committee X9
‘American Sandan Cot foe Inforaion Interchange aires space laos endomizasion
autonomous system mame Abstract Syntax Ngtaion aetive server pages Advanced Technology Atatanent
‘Announcement Traffic Indieation Message ssynchronis teasfer mde
fukomato teller mace
‘Amis Information Exchange Nowork
——
business to business besteunent practice busines conto plan Border Gateway Prvool Border Gateway Praceol + Burspintie-ADI
‘osm impact analysis Biometie Application Programming Ineace hsjcintl/ouputsj den,
Banpin-be-Sack Business Process Modeling Langusg Business Process Specification Schema busines ecovery (resumption) plan base sation
base ston contler Tinh Star nition British Seely Indotry Association
os security practice base service set
base sevice set identifi fer shas-nothing-setity ise tinssiver sation binging update
Biting update acknowledgement
Trang 9‘Cooperative Assotaon for ntmet Dats Analysis CConipletly Automsted Public Turing Test to Tell Computers an Humans Apa CConspater Ansvinus Reseateh Organiation
(Ceypograptic Algorithm Validation Progcam (Cipher Block Chaining
Cipher Block Chaining Message Authentication Code Common Biometric Exchange FileFormat
Goninon Criteria Common Configuration Enumeration Common ChteriaEvalation and Validation Scheme 'Conguter Crime and Imelistual Popany Sexiet complementary code keying
(Counter Mose with CRC MAC Counter Mode with CBC- MAC Prtosol Common Criteria Recognition Arngement (Corsmon Configuration Scoring System
‘unit ce top level rain shocking dished
umpc ise compact die fle system
‘se vision maple access
‘ompact is recordable compact dise read only memory cung duc rewrite
hie exeentive officer
‘Genter tor Easton and Resets in Infomation Assurance and Security
‘computer emergency response texm (CERT: Coonlination Cemter ConpuetFash®
(Gonpter Fraud and Abuse Act (Cipher Feedback
‘compar an financial investigations Code of Feds Repalations
‘omar Forensics to Testing
“APAogrpBjedly generated adlresas Common Gateway lesa
Challnge-Handshake Authentication Praco!
colder nigue Meter (Glasses Inter Domain Routing (Common tert File System
‘hit information office
“iia infant potetion Cita Iteasiactre Poston Commitee
Trang 10
'Coidenialldlornaloa Đntstien and Statistical Esficiney Act computer ineident esponsecapahilly
‘ompuer incident sponse center
‘CERIAS Ineident Response Dutahose
‘computer indent esponse tan Genter to vee Seeurity
‘hie information ecu otfcer
‘common log format
‘command line interface
‘common language runine CCenicate Management Authority Gpher- based Mtl Authenieaton Cole Gonmon Malware Enumeration
complementary metal oxie semicondactr Centers for Meiere and Medicaid Services CCespographie Message Syntax
(Gornmon Misuse Seong System
CMYP Cryptographic Modtle Validation Program
ov ‘eommon name
NSS Commitee National Security Systems
€NSSI Gomitee on National Seurty S3stetrs Inston
codec snderidsoer
cor ‘hatit oF interest
com CCoroponent Objet Mods
coor ‘ont of operations
COPPA Children t Onine Privacy Protection Act
CORBA® Gorman Objet Request Broker Archies
cors sonnets ofthese
œ safifole poley
œ ‘omtngeney plan
CPem “Coromon Piafom Enumeration
crt ‘mpression parameter index
CENI (Gente for the Protection of National Infastruture
crs cerfcation pructce statement
cru ental prcessine ait
CRAM shallenge response autheiation mechanism
CRC le nelunliev check
cK ‘etic revocation ist
sia {Cyber Security Industries Aiance
sinc ‘mputer security inident esponse capability
CSIRT ‘computer Security ieident sponse team
cso ‘hie security officer
csp ‘Credentials Service Provider
sR ccetifcate signing request
sre Computer Security Resonree Center
CSRDA, “Re Seeunty Reseah and Devclopnent Aelof 2013
Trang 11‘outer mode eneryption Common Vulnerabilities sd Exposures Gorman Valserability Seong System (Common Weakness Enumeration
estnation adress
‘esignated agerediing authority
‘Sesignated approving authority tsretionary aoses contol picate address detection DARPA Avent Markup Larousse Digital Advanced Mobile Phone Service Data Aewess Objet
Defense Advanced Research Prajects Agency devils referenced toon mila
Satabase management system
‘Soman conte Disinhured Compating Environment Distibiied Component Objet Moet clsited etl system
eparinen of Defense Meta Specification distiuted denial of service
Data Encryption Algorithm Data Exevation Prevention Daa Encryption Sundiel Disb File System dynamic frequency seketion Diffie Heine
Dynamic Home Agent Address Discovery Dynamie Host Configuration Protocol Dymaaie Host Configuration Protocol for Interne Procol 6
US Department of Honcland Security Digital Westy Management Service
US Defense Information Systems Agoney signa link brary
vst memory aeons sented 20
‘stnguished name
‘domain sane Distributed Network Protocol
‘domi name system Domain Name System Blacklist Donn Name System Security Extensions
US Department of Commerce
US Depastmeat of Defense
6
Trang 12lifeenil power analysis
‘va meowery agent ial ights management ddaysterrocovery plan Delegation Signor sdstnhution sytem tiferemiste services eld Digital Signaure Algorithm iit sserier tine Directory Services Markup Language delivery Stausnosfiction
‘dynam separation of day Digital Signature Standacd Dua Stick Transition Mechanism Disibated Transaction Coordinator Document Type Defiiion
Served est requirement DHCP unique kdeniier digital video se
etre Business using eXtensible Markup Langa Epi Curve over OLIN
etre Codebook (ane) Flite Curve Cyptograpy Flite Curve Diffie Hetlnin Elie Curve Digital Signature gorithm Enterprise Configuration Manager
Encryption Cont Protocol [lett Commanicalins Privacy Aet Enhanced Data rates for GSM Evol
—
Trang 13Encrypting File System Baten ateway Protocol extension healer
European Institute for Computer Andviris Research Enhanced Interior Gateway Rowing Procol EAP Inegsty Key
ketene Pedet Code Information Services leon protected health information vents persecond
‘nierprse source plaming
‘terpise security management sytem [tered Simple Mal Transfer Pool sleefonieseial mmber
Eneapalaing Socity Payload Even Service Set
European Telecommunicatons Standaeds Insite European Union|
Fer Bridge Cenifcaion Authority Feral Bureau of lvestgaion Fer Bea of Investpaion Criminal Istice Information Services Division Fetal Comnmanieations Canussion|
Fetal Consasieations Commission Msnifestion nanisr Final cheeks fist
Fens! PKI Common Pliey Framework Fair Credit Reporting Act
frame check sequence Food and Drug Aminiseaton Feral Desking Core Configuration Fodersed Deselopment and Ceriication Ensigonment
Trang 14Federal Financial Managereat Improvement Act Frequency hopping sped sets
Forwanting information base Fer Identity Credentialing Commies Feral Information Processing Stns Forum of tacit Response and Security Teams Federal Information System: Comols Audit Mangal Feder Information Security Management Act of 2002 Federal Information Sssems Security Educators’ Association Fetal Law Fforement Taig Center
fae mate te Fuhrer Mantin-Shanie false non match rate rset of Information Aet Fens Preparedness Ciular Fra Public Key Infrastractre deta Public Ke lnfiastnictie Architecture Feral Plc Ke laestnitare Plies Athos Tully qualified domain name
false rejection rate Feld scewty office Federal Trade Commision Federat Trade Commission Act Fie Transfer Pratca!
Fast User Switching fiscal year
Gta Information Grid _raphialiemifiction and astbenieaton
‘Gov Key Enerpion Key
‘Gear Lzach Bley Act [Geoup Maser Key GNU Privy Gast sovernmnt off the shelf necl public license {Group Policy Management Console Group Policy Object
_seeral packet ado service
“lobal positing system
Trang 15
‘Gina Standards One
US, Gener Services Administration Gal System foe Mobile Comsanicatons Genetic Token Card
roup tafe encryption key _toup erporal ey
tegen top level domain (Generalized TTL Secerty Mechanism _taphical user inerface
Nghilbihg home agent high assurance guard host comuole orice Trans of electromagnetic radiation to fast azar ofeletomagnesi radiation to ordnance oan of electomagnsi radiation to personne high Frequency
Hierarchical Fle System
US Depantnint of Heal and Hunan Sersices bon idfumalon
Host Mentity Protocol Health Insurance Posabiity and Accountability Act, igh performance ad local area stor
HKEY Local Machine Health Level Seven
me 1
Fuman-machine nero ost potted we High Performance File System human sources
Homeland Sccurity Advanced Reseach Projects Agency Homeland Sse Presulental Directive
High Toctnoogy Crime Investigation Association sper Test Caching Protaco!,
Hypeneut Markup Language Hapenteat Transer Proce) Sovute Hypertext Transfer Procol hen
0
Trang 16Inter contol Center Communications Protocol Internet Connoction Firewall,
Internet Conia! Message Protocol Internet Cache Procol
industrial cone sss Tnternet Connection Sharing International Computer Secuity Assocation ineenly che valae
1eniieaiun Information Design Assurance Red Teutn integrated development envio
Teterata Drive Elecronics m¬¬`
Tntegrtel Dịial Enhancel Nersork entity Federasion Framework Tnyrsion Detection Message Fxchange Format ident management system
inusion desecion and prevention system iniasion detection system
[enity Sericelntclace Spocifistons entity Web Serviees Framework entity We Services Frtnework Dat Services Temple Internet Explorer
Inveratonsl Elecstechnesl Commission intligen electonie dedee
IEEE Standards Asseiation Interet Security Steering Group Internet Engineering ask Force Internet Ensinwerine Tank Force Best Current Practice Tnteret Engnsering Task Fore Request for Commens