Get the ePub FREE this month when you buy a paperback that's in Amazon Matchbook!

We print U.S. govt pubs so you don't have to.

Cyber Acronyms - I thru R

Definitions can be found in the "Cyber Dictionary: & NIST Acronyms" available on Amazon.com

  

I

IaaS  Infrastructure as a Service

I&A  Identification and Authentication

I&W  Indications and Warning

I/O  input/output, information operations

I3P  Institute for Information Infrastructure Protection

IA  Information Assurance 

IA-64  64-bit Intel Itanium architecture 

IaaS Infrastructure-as-a Service

IAB  Internet Architecture Board, Interagency Advisory Board

IAC Information Assurance Component 

IACE Information Assurance Collaborative Environment

IACE-S Information Assurance Collaborative Environment-SIPRNet

IACIS®  International Association of Computer Investigative Specialists

IACS  Industrial Automation and Control Systems

IAD Information Assurance Directorate

IAFC International Association of Fire Chiefs

IAFIS  Integrated Automated Fingerprint Identification System 

IAIP  Information Analysis and Infrastructure Protection

IAM  Information Assurance Manager, Information Assessment Methodology 

IANA  Internet Assigned Number Authority 

IAO  Information Assurance Officer 

IASAE Information Assurance System Architects and Engineer

IASE Information Assurance Support Environment

IAT Information Assurance Technical

IATAC  Information Assurance Technology Analysis Center

IATF Information Assurance Technical Framework

IATO  Interim Approval to Operate, Interim Authorization to Operate 

IATT  Interim Approval to Test 

IAVA  Information Assurance Vulnerability Alert

IAVB Information Assurance Vulnerability Bulletin

IAVM Information Assurance Vulnerability Management

IB Implementation Baseline

IBAC  Identity Based Access Control

IBC Iterated Block Cipher 

IbC Internet-based Capabilities

IBE  Identity-Based Encryption

IBGP  Internal Border Gateway Protocol 

IBMJSSE  IBM Java Secure Sockets Extension

IBSS  Interdependent Basic Service Set

IC Intelligence Community, incident commander

IC3  Internet Crime Complaint Center

ICAMP  Incident Cost Analysis and Modeling Project

ICAMSC  Identity, Credential, and Access Management Subcommittee

ICANN  Internet Corporation for Assigned Names and Numbers 

ICC  Integrated Circuit Card

ICCC  Internet Crime Complaint Center

ICCD Integrated Circuit Card Device

ICCID  Integrated Circuit Card Identification

ICCP  Inter-control Center Communications Protocol

ICD  Intelligence Community Directive

ICF  Internet Connection Firewall

ICMC  International Cryptographic Module Conference

ICMP  Internet Control Message Protocol

ICMPv4  Internet Control Message Protocol for IPv4

ICMPv6  Internet Control Message Protocol for IPv6 

ICP  Internet Caching Protocol

ICS  Industrial Control System 

ICSA  International Computer Security Association

ICSEA   International Conference on Software Engineering Advances

ICST  International Conference on Software Testing, Verification and Validation

ICSTW  International Conference on Software Testing, Verification and Validation Workshops

ICT Information and Communications Technology

ICV  Integrity Check Value

ID  Identifier

ID-10-T  Hackerspeak “IDIOT”

IDA  Institute for Defense Analyses

IdAM  Identity and Access Management

IDART™  Information Design Assurance Red Team

IDE  Integrated Drive Electronics, integrated development environment

IDEA  International Data Encryption Algorithm

IDEF  Identity Ecosystem Framework

iDEN  Integrated Digital Enhanced Network

IDESG Identity Ecosystem Steering Group

ID-FF  Identity Federation Framework

IDLS  Instructional Development Learning Systems

IDMEF  Intrusion Detection Message Exchange Format

IDMS  Identity Management System

IdP Identity Provider

IdP STS Identity Provider Security Token Service

IDP  Internet Death Penalty 

IDPS  Intrusion Detection and Prevention System 

IDS  Intrusion Detection Systems 

ID-SIS  Identity Service Interface Specifications

ID-WSF  IDentity Web Service Framework

ID-WSF DST  Identity Web Services Framework Data Services Template

IE  Internet Explorer

IEC International Electrotechnical Commission

IED  Intelligent Electronic Device 

IEEE  Institute of Electrical and Electronics Engineers

IEEE-SA  IEEE Standards Association

iEMS  RADiFlow ICS/SCADA router configuration management software

IESG  Internet Engineering Steering Group

IETF  Internet Engineering Task Force 

IETF BCP  Internet Engineering Task Force Best Current Practice

IETF RFC  Internet Engineering Task Force Request for Comments

IFAC International Federation of Accountants

iFACTS  Interim Future Area Control Tools Support

IFIP  International Federation for Information Processing

IFTTT  If This Then That

IG  Implementation Guidance

igamc Incomplete Gamma Function

IGMP  Internet Group Management Protocol

IGMPv3  Internet Group Management Protocol version 3

IGP  Interior Gateway Protocol

IHE Integrating the Healthcare Enterprise

IHS  Indian Health Service

IIC  Industrial Internet Consortium

IICSWG Interagency International Cybersecurity Standardization Working Group

IID  Independent and Identically Distributed

IIHI  Individually Identifiable Health Information

IIoT  Industrial Internet of Things 

IIP  Internet Infrastructure Protection

IIS  Internet Information Server

IK  Integrity Key

IKE  Internet Key Exchange

ILCM Integrated Life Cycle Management

ILK Intermediate Link Key

ILTK Intermediate Long Term Key

IM  Instant Messaging; Identity Manager

IMF Impossible Missions Force

IMAP  Internet Message Access Protocol 

IMDS Integrated Maintenance Data System

IMEI  International Mobile Station Equipment Identity 

IMETI International Multi-Conference on Engineering and Technology Innovation

IMR  Integrity Measurement Register 

IMS  IP Multimedia Subsystem

IMSI  International Mobile Subscriber Identity

IMT  Information Management Technology

IN  Internet

INCITS  InterNational Committee for Information Technology Standards

INCOSE International Council on Systems Engineering

INFOCON Information Condition

INFORMS  Institute for Operations Research and the Management Sciences

INFOSEC  Information Systems Security 

INK Inner Key

INL Idaho National Laboratory

I-NOSC Integrated NOSC

Intel TXT Intel Trusted Execution Technology

Intel VT Intel Virtualization Technology

INWT Intermediate Network Warfare Training

IO  Information Operations 

I/O  Input/Output

IoC Inversion of Control

IOC Indicators of Compromise

IODEF   Incident Object Description Format

IoHT Internet of (Hackable) Things 

iOS  iPhone Operating System

IOS  Internetwork Operating System 

IoT  Internet of Things 

IOU  Investor-Owned Utilities

IP  Internet Protocol, Information Protection

IPA  initial privacy assessment, Information Protection Alerts

IPAWS Integrated Public Alert and Warning System

IPB  intelligence preparation of the battlefield (DOD)

IPC Industrial Personal Computer

IPComp  IP Payload Compression Protocol

IPD  Initial Public Draft

IPDC  Internet Protocol Device Control

IPN Installation Processing Node

IPng  Internet Protocol Next Generation

IPP Independent Power Producer

IPR Intellectual Property Rights

IPS  Intrusion Prevention System(s) 

IPsec  Internet Protocol Security 

IPsec-WIT  IPsec Web Based Interoperability Tester 

IPT  Integrated Process Teams

IPv4  Internet Protocol version 4 

IPv6  Internet Protocol version 6 

IPX  Internet Packet Exchange

IQF Individual Qualification Folder

IQT Initial Qualification Training

IR Incident Response, Identity Root, Interagency Report, infrared

IRB  Institutional Review Board

IRC  Internet Relay Chat, information-related capabilities (DOD)

IrDA®  Infra-Red Data Association

IREX Iris Exchange

IRK Identity Resolving Key

IRM  Information Resources Management 

IRQ  Interrupt Request Line

IRS  Internal Revenue Service, Incident Reporting System

IRTF  Internet Research Task Force 

ISA  Interconnection Security Agreement, International Society of Automation 

ISAC  Information Sharing and Analysis Center

ISACA   Information Systems Audit and Control Association

ISAKMP  Internet Security Association and Key Management Protocol

ISAO Information Sharing and Analysis Organization

ISAP  Information Security Automation Program

ISAPI  Internet Server Application Programming Interface

ISATAP  Intra-site Automatic Tunnel Addressing Protocol

ISC Information System Component

ISC2 International Information Systems Security Certification Consortium

ISCM Information Security Continuous Monitoring 

ISCM-TN Information Security Continuous Monitoring Target Network

ISCP  Information System Contingency Plan 

iSCSI   Internet Small Computer System Interface 

ISD Instructional System Design, Instructional System Development

ISDN Integrated Services Digital Network

ISE  Information Sharing Environment, Identity Services Engine

ISF  Information Security Forum

ISID  Industrial Security Incident Database

iSIM Industrial Service Management Tool

ISIMC Information Security and Identity Management Committee

IS-IS  Intermediate System to Intermediate System

ISSLOB Information Systems Security Line of Business

ISM   Industrial, Scientific, and Medical

ISMS Information Security Management System

ISN Installation Services Node

ISO International Organization for Standardization, Independent System Operator, ISO—Information System Owner

ISOO Information Security Oversight Office

ISORC International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing

ISP  Internet Service Provider 

ISPAB   Information Security and Privacy Advisory Board

ISR  intelligence, surveillance, & reconnaissance (DOD)

ISS  Internet Security Systems

ISSE  Information Systems Security Engineer 

ISSEA  International Systems Security Engineering Association 

ISSM  Information Systems Security Manager 

ISSO  Information System Security Officer 

ISSPM   Information Systems Security Program Manager

ISU Information System User

ISV  Independent Software Vendor

IT  Information Technology

ITAA  Information Technology Association of America 

ITAM Information Technology Asset Management

ITCC Information Technology Commodity Council

ITF  Interrogator Talks First

ITGEB IT Governance Executive Board

ITGI IT Governance Institute

ITIL Information Technology Infrastructure Library

ITL  Information Technology Laboratory

ITS Intrusion Tolerant Systems, Information Transport System

ITS JPO  Intelligent Transportation System Joint Program Office

ITSM Information Technology Service Management

ITU  International Telecommunications Union 

ITU-T  International Telecommunications Union – Telecommunications Sector 

ITU-TSS  International Telecommunications Union – Telecommunications System

IUT  Implementation Under Test

IV  Initialization Vector 

IVR Interactive Voice Response

IV&V  Independent Verification & Validation 

IVA  Independent Validation Authority 

IVAs  Intelligent Virtual Assistants 

IW Information Warfare

IW/IO Information Warfare/Information Operations

IWCE  International Wireless Communications Expo

IWCT  International Workshop on Combinatorial Testing

IWG  Interagency Working Group 

IXP  Internet Exchange Point  

  

J

J2EE  Java 2 Platform, Enterprise Edition

JAD Joint Application Development

Java  EE Java Platform, Enterprise Edition

JAXR  Java API for XML Registries

JCC  Joint Cyberspace Center

JFC  joint force commander (DOD)

JFFS2 Journaling Flash File System, Version 2

JFT Joint Force Training

JID Jabber IDs

JIE Joint Enterprise Environment (DISA)

JIMS Joint Incident Management System

JIT  just-in-time

JITC Joint Interoperability Test Command

JNI Java Native Interface

JOSE JSON Object Signing and Encryption

JP Joint Publication (DOD)

JPAS Joint Personnel Adjudication System

JPEG Joint Photographic Experts Group

JQS Job Qualification Standard

JRE  Java Runtime Environment

JSM  Java Security Manager

JSSE  Java Secure Socket Extension

JSON JavaScript Object Notation

JSP  Java Server Page

JTAG  Joint Test Action Group

JTC1 Joint Technical Committee 1

JTF Joint Task Force

JTFTI  Joint Task Force Transformation Initiative

JVM  Java Virtual Machine

JWICS Joint Worldwide Intelligence Communications System

JWT JSON Web Token

  

K

KAK  Key-Auto-Key

KB  Kilobyte 

Kbps  Kilobit per second

KBA  Knowledge-Based Authentication 

KBKDF  Key-Based Key Derivation functions

KBP  Knowledge-Based Proofing 

KBV  Knowledge-Based Verification 

KDC  Key Distribution Center 

KDF Key Derivation Function

KDM Knowledge Discovery Metamodel

KEK  Key-Encryption-Key 

KG Key Generator

KGD  Key Generation and Distribution

kHz  Kilohertz 

KINK  Kerberized Internet Negotiation of Keys

KMAC   Keccak Message Authentication Code

KMI  Key Management Infrastructure 

KMIP  Key Management Interoperability Protocol 

KOA  KMI Operating Account 

KPC  KMI Protected Channel 

KSA Knowledge, Skills, and Abilities

KSG Key Stream Generator

KSK  key signing key

Krack  Key Reinstallation AttaCK

KVM Kernel-Based Virtual Machine; Keyboard, video, and mouse

  

L

L2CAP  Logical Link Control and Adaptation Protocol

L2F  Layer 2 Forwarding

L2TP  Layer 2 Tunneling Protocol

L2VPN  Layer 2 VPN

L3VPN  Layer 3 VPN

LACNIC  Latin American and Caribbean IP Address Regional Registry

LACS  Logical Access Control System

L.A.W.S.  Lethal Autonomous Weapons Systems 

LAN  Local Area Network 

LB  Lower Bound 

LCC  Life-Cycle Cost

LCD  Liquid Crystal Display

LCP Link Control Protocol

LDA  Local Delivery Agent

LDAP  Lightweight Directory Access Protocol 

LDAPS  Lightweight Directory Access Protocol (Secure)

LE  Low Energy, Law Enforcement

LED  Light Emitting Diode

Leet  Hackers alternative alphabet. Also written as 133t or l337

LEL  Lower Explosive Limit 

LEO  Law Enforcement Officer

LEP List of Effective Pages

LF  Low Frequency

LFE Large Force Exercise

LFSR Linear Feedback Shift Register

LFW  Labeled Faces in the Wild 

Li-Fi  Wireless data streaming using LED lights to transmit information 

LIR  Local Internet Registry

LIS Low-Impact System

LISP  Locator/ID Separation Protocol

LKM Loadable Kernel Module

LLA link-local addressing

LLP Link Layer Protocol

LM  LAN Manager

LMD/KP  Local Management Device/Key Processor

LMP  Link Manager Protocol

LMR  Land Mobile Radio 

LMS Load Management System

LND  Last Numbers Dialed 

LOA Level of Assurance

LoC Lines of Code

LOC  Location

LOPA  Layer of Protection Analysis 

LoRa Alliance  Long Range Alliance

LOS Line-of-Sight 

LP Learning Point

LPAR  Logical Partition 

LPSV  Low Pressure Safety Valve 

LRA  Local Registration Authority 

LRC  Longitudinal Redundancy Code

LRS  Longest Repeated Substring

LSAP  Link Service Access Point 

LSB  Least Significant Bit

LSI Large-Scale Integration

LSM Loadable Software Module

LTC Load Tap Changer

LTE  Long Term Evolution

LTK Long-Term Key

LTS Long-Term Support

LUA  limited user account

LVPSV  Low and Vacuum Pressure Safety Valve 

LWM2M DM Lightweight M2M Device Management

LXC Linux Container  

  

M

m  Meter

M2  Direct communication between devices 

M2M  Machine-to-Machine

M3AAWG Messaging Malware Mobile Anti-Abuse Working Group 

MA Maintenance

MAA  Measurement Assessment Authority

MaaS  Malware-as-a-Service 

MAC  Mandatory Access Control; Message Authentication Code; Mission Assurance Category; Media Access Control; Modification, Access, and Creation 

MACsec  Media Access Control Security

MaDIoT  Manipulation of Demand Internet of Things

MAE1 Mutual Aid Engine

MAEC™ Malware Attribute Enumeration and Characterization (TM The MITRE Corporation)

MAF  multi-mode authentication framework

MAG Microsoft Azure Government

MAM  Mobile Application Management

MAN  Metropolitan Area Network 

MANET  Mobile Ad-hoc Network

MAO  Maximum Allowable Outage

MAPS  Mail Abuse Prevention System

MAV Micro Aerial Vehicle

MB  Megabyte

MBAS Mutual Box Alarm System

MBD model-based design

Mbps  Megabits Per Second

MBR  Master Boot Record

MBSA  Microsoft Baseline Security Analyzer

MCPTT  Mission Critical Push-To-Talk

MD  Message Digest

MD5  Message Digest 5

MDC Mission Data Card

MDCX  Modify Connection

MDDS   Medical Device Data Systems 

MDM Mobile Device Management

MDMP  military decision-making process (DOD)

MDMS  Meter Data Management System

MDS  Mobile Device Security

MDT  Mobile Data Terminal

ME  Mobile Equipment

MED  Multi-Exit Discriminator 

MEF  Mission Essential Functions

MEID  Mobile Equipment Identifier

MEK  Media Encryption Key 

MEL  Master Equipment List

MEMS microelectromechanical system

MEP  message exchange pattern

MES  manufacturing execution system

MET Mission Essential Tasks

MFA Multi-Factor Authentication

MFD Multi-Function Device

MFQ  Master Question File

MFUA  Mission/Functional Unique Application

MGC  Management Client 

MGCP   Media Gateway Control Protocol  

MGN  Medical-Grade Network 

MHz  Megahertz

MIB  Management Information Base

MIC  Message Integrity Check, Message Integrity Code, mandatory integrity control

MICT Management Internal Control Toolset

MID  Mobile Internet Devices

MIKEY  Multimedia Internet KEYing

MILDEC  Military Deception

MILE  Managed Incident Lightweight Exchange

MilPDS Military Personnel Data System

MIME  Multipurpose Internet Mail Extensions

MIMO   Multiple Input, Multiple Output

min minute

MIN  mobile identification number

Mini SD  mini secure digital

MINEX Minutia Exchange

MIP  Modules-In-Process

MIPv4   Mobile IPv4

MIPv6   Mobile IPv6

MIS Moderate-Impact System

MISREP Mission Report

MISTI  MIS Training Institute

MIT Massachusetts Institute of Technology

MitB  Man-in-the-Browser Attack 

MitM  Man-in-the-Middle Attack 

MK Master Key

ML MetaLangauge

MLD  Multicast Listener Discovery

MLDv1  Multicast Listener Discovery version 1

MLDv2  Multicast Listener Discovery version 2

MLE Measured Launch Environment

MLS  Multiple Levels of Security; Multilevel Security 

MMC  Multi-Media Card, Microsoft Management Console

MMCmobile  MultiMediaCard Mobile

MME  Mobility Management Entity

MMO Monitoring Management Operator

MMS  Multimedia Messaging Service

MMT  Multi-Block Message Test

MN  Mobile Node

MNO  Mobile Network Operator

MO  Magneto Optical

MOA  memorandum of agreement

MOB Managed Object Browser

MOBIKE  IKEv2 Mobility and Multihoming Protocol

MODP   Modular Exponential Diffie-Hellman Group

MOU/A  Memorandum of Understanding/Agreement 

MOSS  MIME Object Security Services

MOVS  Modes of Operation Validation System

MP Media Protection, Metapolicy

MPA  Mobile Prefix Advertisement

MPCN Manpower Position Control Number

MPC Mission Planning Cell

MPEG   Moving Picture Experts Group

MPES Manpower Programming and Execution System

MPPE  Microsoft Point-to-Point Encryption

MPLS Multiprotocol Label Switching

MPS  Mobile Prefix Solicitation

MPT Mission Planning Team

MPTO  Methods and Procedures Technical Order

MQT Mission Qualification Training

MQTT   Message Queueing Telemetry Transport

MQV  Menezes-Qu-Vanstone algorithm

MR Mission Ready

MRI  Magnetic Resonance Imaging 

MRT  Machine Readable Table

MRTD   Machine Readable Travel Document

MS  Mobile Subscriber, Microsoft

MSA Mail Submission Agent

MSB  Most Significant Bit

MSC  Mobile Switching Center

MSCUID Legacy Identifier Government Smart Card Interoperability Specifications

MS-CHAP  Microsoft Challenge-Handshake Authentication Protocol

MS-DOS  Microsoft Disk Operating System

MSDP  Multi-source Discovery Protocol

MSK Master Session Key

MSEC  Multicast Security

MSEL  Master Scenario Events List

MSIL  Microsoft Intermediate Language

MSISDN  Mobile Subscriber Integrated Services Digital Network

MSK  Master Session Key

MSKB  Microsoft Knowledge Base

MSL  Multiple Security Levels, Master Station Log

MSN Mission Qualification

MS SQL  Microsoft Structured Query Language

MSS  Maximum Segment Size

MSSP  Managed Security Services Provider

MST Minimum Spanning Tree

MSWG  Metadata Standards Working Group

MT  Metamorphic Testing

MTA  Mail Transfer Agent, Mission-task-asset

MTBF Mean Time Between Failure

MTC Mobile Threat Catalogue

MTD  Maximum Tolerable Downtime, Moving Target Defense

MTF Medical Treatment Facilities

MTIPS  Managed Trusted Internet Protocol Services

MTM  Mobile Trusted Module

MTO Maintenance Tasking Order

MTP  Mobile Threat Protection

MTTF Mean Time To Failure

MTU  Maximum Transmission Unit, master telemetry unit, master terminal unit

MUA  Mail User Agent

MUD  Manufacturers Usage Description 

MUD File  Manufacturers Usage Description File 

MVNO  Mobile Virtual Network Operator

mW Milliwatt

MW Megawatt

MWR  Morale, Welfare, and Recreation

MX  Mail Exchanger

  

N

N/A Not Applicable

NA  Neighbor Advertisement

NAC  Network Access Control, National Agency Check

NACI National Agency Check with Inquiries 

NAK Not acknowledged

NaN Not a Number

NAN Neighborhood Area Network

NANOG  North American Network Operators Group

NAP  Network Access Protection, Network Access Point

NAPT  Network Address and Port Translation

NARA   National Archives and Records Administration

NAS  Network-Attached Storage, Non-Access Stratum

NASA  National Aeronautics and Space Administration

NASPI   North American Synchrophasor Initiative

NASPO North American Security Products Organization

NAT  Network Address Translation 

NATS National Air Traffic Service

NAT-PT  network address translation—protocol translation

NAT-T   Network Address Translation Traversal

NAVWAR  Navigation Warfare

NBA  Network Behavior Analysis

NBAD  Network Behavior Anomaly Detection

N-BMC  Non-Basic Mission Capable

NC Non-component, Nonce, Non-current

NCC FSWG NIST Cloud Computing Forensic Science Working Group

NCCIC National Cybersecurity and Communications Integration Center

NCCoE  National Cybersecurity Center of Excellence

NCEP  National Cybersecurity Excellence Partner

NCES  NetCentric Enterprise Services

NCHC   National Criminal History Check

NCIC  National Crime Information Center

NCP National Checklist Program

NCRIC  Northern California Regional Intelligence Center

NCSD  National Cyber Security Division

NCSI  NIST National Center for Standards and Certification Information

ND  Neighbor Discovery

NDA  Non-Disclosure Agreement

NDAC  nondiscretionary access control

NDE  Non-Destructive Examination

NDI Non-Developmental Item

NDM naturalistic decision making

NDS/IP  Network Domain Security / Internet Protocol

NDT  Non-Destructive Testing

NE Network Environment

NEA Non-Enterprise Activated

NEF  National Essential Functions

NeHC National eHealth Collaborative

NEMSIS National EMS Information System

NENA National Emergency Number Association

NERC North American Electric Reliability Corporation

NESAG  Network Equipment Security Assurance Group

NetBEUI  NetBIOS Extended User Interface

NetBIOS  Network Basic Input/Output System

NetBT  NetBIOS over TCP/IP

NetD Network Defense

NetOps Network Operations

NFAT  Network Forensic Analysis Tool

NFC  Near Field Communication

NFIQ NIST Fingerprint Image Quality

NFIRS National Fire Incident Reporting System

NFO Nonfederal Organization

N-FORS National Fire Operations Reporting System

NFPA  National Fire Protection Association

NFS  network file system, Network File Sharing

NFV  Network Function Virtualization

NG9-1-1 Next generation 9-1-1

NGAC Next Generation Access Control

NGAC-FA Next Generation Access Control Functional Architecture

NGAC-GOADS  Next Generation Access Control Generic Operations and Abstract Data Structures

NGAC-IRPADS  Next Generation Access Control- Implementation Requirements, Protocols and API Definitions

NGO Non-Government Organization

NH  Next Header, Next Hop

NHIN Nationwide Health Information Network

NHTSA National Highway Traffic Safety Administration

NIAC  National Infrastructure Advisory Council

NIAP  National Information Assurance Partnership

NIC  Network Interface Card

NICC  National Infrastructure Coordinating Center

NICE National Initiative for Cybersecurity Education

NICTA  National ICT Australia

NIEF  National Identity Exchange Federation

NIEM  National Information Exchange Model

NIH  National Institutes of Health

NIJ  National Institute of Justice

NIMS National Incident Management System

NIP National Intelligence Program

NIPC  National Infrastructure Protection Center

NIPP  National Infrastructure Protection Plan

NIPRNet Non-classified Internet Protocol Router Network

NIS  Network Information Service

NISAC  National Infrastructure Simulation and Analysis Center

NISCC  National Infrastructure Security Co-ordination Centre

NISPOM National Industrial Security Program Operating Manual

NIST  National Institute of Standards and Technology

NISTIR  National Institute of Standards and Technology Interagency or Internal Report

NIST SP National Institute of Standards and Technology Special Publication

NIT Network Investigative Technique

NITRD  Networking and Information Technology Research and Development

NLCC  National Leadership Command Capability

NLECTC-NE  National Law Enforcement and Corrections Technology Center–North East

NLOS  Non-Line-of-Sight

NLP  Natural Language Policy

NLT No Later Than

NLZ  No-Lone Zone 

NM Network Management 

NMAP Networked Messaging Application Protocol

NMR  Non-Mission Ready

NOAA   National Oceanic and Atmospheric Administration

NOFORN Not Releasable to Foreign Nationals 

NOPP Notice of Privacy Practices

NOS Network Operations Squadron

NOSC Network Operations & Security Center

NOSS Network Operations and Security Squadron

NoT  Network of Things

NPD  Network Protection Device

NPE Non-Person Entity

NPIVP   NIST Personal Identity Verification Program

NPO  National Program Office

NPPI  Non-Public Personal Information

NPSBN  Nationwide Public Safety Broadband Network

NPSTC National Public Safety Telecommunications Council

NRBG   Non-deterministic Random Bit Generator 

NRECA National Rural Electric Cooperative Association 

NS  Neighbor Solicitation; Name Server

NSA  National Security Agency

NSAPI  Netscape Server Application Programming Interface

NSC  National Security Council 

NSC’s Cyber  National Security Council’s Cyber Interagency Policy Committee

IPC

NSCI  National Strategic Computing Initiative

NSD Network Server Daemon

NSEC  Next Secure

NSEC3  Hashed Next Secure

NS/EP  National Security and Emergency Preparedness

NSEPTS National Security Emergency Preparedness Telecommunications Services

NSF National Science Foundation

NSI  National Security Information 

NSPD  National Security Presidential Directive

NSRL  National Software Reference Library

NSS  Network Security Services

NSTB  National SCADA Test Bed

NSTAC  National Security Telecommunications Advisory Committee

NSTIC   National Strategy for Trusted Identities in Cyberspace

NSTISSC  National Security Telecommunications and Information Systems Security Committee

NSTISSI National Security Telecommunications and Information System Security Instruction

NSTISSP National Security Telecommunications and Information Systems Security Policy

NTFS  New Technology File System

NTFY Notify

NTI  New Technologies Inc.

NTIA  National Telecommunications and Information Administration

NTLM  NT LAN Manager

NTP  Network Time Protocol, Notice to Proceed

NTPv6   Network Time Protocol for IPv6

NTTAA National Technology Transfer and Advancement Act

NUD  Neighbor Unreachability Detection

NVD  National Vulnerability Database 

NVLAP  National Voluntary Laboratory Accreditation Program

NVM Non-Volatile Memory

NW3C   National White Collar Crime Center

NX  no execute 

NYU  New York University

  

O

OAL  Original Equipment Manufacture Adaptation Layer

OAEP Optimal Asymmetric Encryption Padding

OAGi  Open Applications Group

OAGIS  Open Applications Group Integration Specification

OAM  Operational and Access Management

OASISTM Organization for the Advancement of Structured Information Standards

OAuth  Open Authorization

OBDD Ordered Binary Decision Diagram 

ObjSoD  Object-based Separation of Duties

OCC  On-Card biometric Comparison, Open Cloud Consortium, Office of the Comptroller of the Currency

OCCI  Open Cloud Computing Interface

OCF  Open Connectivity Foundation

OCIL  Open Checklist Interactive Language 

OCIO  Office of the Chief Information Officer

OCO  offensive cyberspace operations (DOD)

OCONUS Outside the Continental U.S.

OCSP  Online Certificate Status Protocol

ODBC   Open Database Connectivity

ODF  Open Document Format

ODNI Office of the Director of National Intelligence

OE Operating Environment

OECD  Organization for Economic Cooperation and Development

OEM  Original Equipment Manufacturer

OEP  Occupant Emergency Plan

OESS  Office of E-Health Standards and Services

OET  Office of Engineering and Technology

OFB  Output Feedback

OFDM   Orthogonal Frequency Division Multiplexing

OG Operations Group

OGC  Open Geospatial Consortium

OG/CC Operations Group Commander

OGF  Open Grid Forum

OGIS Office of Government Information Services

OGSA  Open Grid Services Architecture

OGV Operations Group Standardization/Evaluation

OHA  Open Handset Alliance

OID  Object Identifier

OIDC  OpenID Connect

OIG  Office of Inspector General

OIMO Organization Identity Management Official

OIS  Office of Information Security

OISM  Office of Information Systems Management

OJE On-the-Job Evaluation

OJT  On-the-Job Training

OLA Operating-Level Agreement

OLE  object linking and embedding

OMA Open Mobile Alliance

OMB Office of Management and Budget

OMG  Object Management Group, “Oh, My God”

OMS Outage Management System

ONC Office of the National Coordinator

ONS  Object Naming Service

OOB Out of Band

OOK  On-Off Keying 

OOXML  Office Open XML

OPC  OLE for Process Control, optical particle counters

OPE  operational preparation of the environment

OpenFog RA  OpenFog Reference Architecture

OpenPGP  Open Pretty Good Privacy

OpenVPN  Open-source software application that implements virtual private network

OPEX  Operating Experience

OPM  Office of Personnel Management

OPNET  Optimized Network Engineering Tools

OPORD Operation Order

OPR  Office of Primary Responsibility

OPSEC  Operations Security 

OpSoD   Operational Separation of Duties

ORA  Organizational Registration Authority 

ORB  Open Relay Blacklist, Operational Review Board

ORCON Originator Controlled

OS  Operating System 

OSCAL  Open Security Controls Assessment Language

OSCI  Operating System Command Injection 

OSCP  Online Certificate Status Protocol

OSD Office of the Secretary of Defense

OSHA  Occupation Safety and Health Administration

OSI  Open Systems Interconnect

OSPF  Open Shortest Path First

OSPFv2  Open Shortest Path First version 2 (for IPv4)

OSPFv3  Open Shortest Path First version 3 (for IPv6)

OSS  open source software

OSSTMM  Open Source Security Testing Methodology Manual

OSR2  OEM Service Release 2

OSVDB  Open Source Vulnerability Database

OTA  Over the Air, Open Travel Alliance

OTAR  Over-The-Air Rekeying

OTP One-Time Password

OTSP Office of Science and Technology Policy

O-TTPS Open Trusted Technology Provider™ Standard

OU  organizational unit

OUI   Organizationally Unique Identifier 

OVAL   Open Vulnerability and Assessment Language 

OVF  Open Virtualization Format

OWA Outlook Web Access

OWASP  Open Web Application Security Project

OWL  Web Ontology Language

OWL-S  Web Ontology Language for Services

OZ Operations Zone

P

P1  First parameter of a card command

P2  Second parameter of a card command

P2P  peer-to-peer

P3P  Platform for Privacy Preferences Project

PAA  Policy Approving Authority, Principal Accrediting Authority 

PaaS Platform as a Service

PAC  Privilege Attribute Certificate, Protected Access Credential

PACS Physical Access Control System

PAD  Presentation Attack Detection 

PA-DSS Payment Application Data Security Standard

PAM  Privileged Account Management 

PAN  Personal Area Network; Primary Account Number

PAN CVC2  Card Validation Code 2 (MasterCard payment cards)

PANA Protocol for carrying Authentication for Network Access

PAOS  Reverse HTTP Binding for SOAP

PAP  Password Authentication Protocol, Priority Action Plan, policy access point

PAS  publicly available specification

PAT  Port Address Translation 

PBA  Pre-Boot Authentication

PBAC  Policy-Based Access Control 

PBCC  Packet Binary Convolutional Coding

PBE  Pre-Boot Environment

PBED Planning, Briefing, Execution, and Debriefing

PBNM Policy Based Network Management

PBX Private Branch Exchange

PC  Pressure Controller 

PCA  Policy Certification Authority 

PCAP Packet Capture 

PCC Personnel Category Code

PCI  Payment Card Industry, PIV Card Issuer, Peripheral Component Interconnect

PCIe Peripheral Component Interconnect Express

PCI-DSS  Payment Card Industry Data Security Standard

PCLOB  Privacy and Civil Liberties Oversight Board

PCMCIA  Personal Computer Memory Card International Association

PCN  process control network

PCP IP  Payload Compression Protocol

PCR  Endpoint Configuration Register, Platform Configuration Register

PCRF  Policy and Charging Rules Function

PC/SC  Personal Computer/Smart Card

PCS  Process Control System

PCSF  Process Control System Forum

PCSRF  Process Control Security Requirements Forum

PD  Policy Directive, Position Description

PDA  Personal Digital Assistant

PDCP  Packet Data Convergence Protocol

pdd  Palm data dump/duplicate disk

PDD  Presidential Decision Directive

PDF Portable Document Format, Probability Density Function

PDN  Packet Data Network

PDP  Policy Decision Point

PDS  Protected Distribution System, Personal Data Store

PE Physical and Environmental Security, Protocol Encryption 

PEAP  Protected Extensible Authentication Protocol

PEC Program Element Code

PED  PIN entry device; Portable Electronic Device 

PEM  Privacy Enhanced Mail

PEP  Policy Enforcement Point, Privacy Engineering Program

PERMIS  PrivilEge and Role Management Infrastructure Standards

PEV Plug-In Electric Vehicle

PFF  Palm File Format

PFS  Perfect Forward Secrecy

PGP Pretty Good Privacy

PGP/OpenPGP Pretty Good Privacy

P-GW  Packet Gateway

PHASER Physiological Health Assessment System for Emergency Responders

PHB  Pointy-Haired Boss 

PHEV Plug-In Hybrid Electric Vehicle

PHI Personal Health Information, Protected Health Information

PHM  Prognostics and Health Management

PHP  PHP Hypertext Preprocessor

PHR Personal Health Record

PHY  Physical Layer, Physical Access

PI  Pandemic Influenza

PI2 Potentially Identifiable Personal Information

PIA  Privacy Impact Assessment 

PICS  Protocol Implementation Conformance Statement 

PICS™  Platform for Internet Content Selection

PID  Proportional Integral Derivative

PII   Personally Identifiable Information 

PIM  Personal Information Management

PIMR  Privacy Integrity Measurement Register

PIM-SM  Protocol Independent Multicast—Sparse Mode

PIN  Personal Identification Number

PIP  Policy Information Point

PIR  Public Internet Registry 

PIT  Platform Information Technology 

PIV  Personal Identity Verification 

PIV-I  PIV-Interoperable

PIV Card  Personal Identity Verification Card 

PIV RA  Personal Identity Verification Registrar 

PIX  Proprietary Identifier Extension

PKCS  Public Key Cryptography Standard

PKE  Public Key Enabling 

PKI  Public Key Infrastructure 

PKI-AUTH  Authentication with the PIV Authentication Certificate Credential

PKI-CAK  Authentication with the Card Authentication Certificate Credential

PKIX  Public Key Infrastructure X.509

PKM  Privacy Key Management

PKMv1  Privacy Key Management Protocol version 1

PKMv2  Privacy Key Management Protocol version 2

P.L. Public Law

PL Planning, Public Law

PLC  programmable logic controller

PM Project Management

PMA  Policy Management Authority 

PMBOK® Project Management Body of Knowledge® 

PML  Physical Measurement Laboratory

PLC Programmable Logic Controller

PMEF  Primary Mission Essential Functions

PMI Preventative Maintenance Inspection

PMK   Pairwise Master Key

PMKSA  Pairwise Master Key Security Association

PMP  point-to-multipoint

PMTU   Path Maximum Transmission Unit

PMU Phasor Measurement Unit

PN  Packet Number

pNIC Physical Network Interface Card

PNG Portable Network Graphics

PoA Point of Attachment

POA&M  Plan of Action and Milestones 

POC  Point of Contact

PoE  Power over Ethernet 

POI  Point of Interaction

POL Primary Operating Location

POMS  Proactive Obsolescence Management System

POP  Post Office Protocol

PoP Period of Performance

POP3  Post Office Protocol v3 

POPRV  Pilot-Operated Pressure Relief Valve 

PORV  Pilot Operated Relief Valves 

POS  Point of sale; piece of shit 

POSE  Palm Operating System Emulator

POSRV  Pilot Operated Safety Relief Valve 

POST  Power-up Self Test

POSV  Pilot-Operated Safety Valve 

POUs  Publicly Owned Utilities

PP  Protection Profile

PPC  Pocket PC

PPDM  Privacy Preserving Data Mining 

PPDP  Privacy Preserving Data Publishing

PPE  Personal Protective Equipment

PPI  Pixels Per Inch

PPP Point-to-Point Protocol

PPS  Ports, Protocol, and Services

PPSM  Ports, Protocol, and Services Management

PPTP  Point-to-Point Tunneling Protocol

PPV positive-pressure ventilation

PPVPN  Provisioner-Provided VPN

PQ Power Quality

PPQAS  Password Policy Question-Answer System

PQC  Post-Quantum Cryptography

PQCrypto  Post-Quantum Cryptography

PRA  Paperwork Reduction Act

PRAM   Privacy Risk Assessment Methodology

Pre-PAK  Pre-Primary Authorization Key

PRF  Pseudo-Random Function

PRIME  Privacy and Identity Management for Europe

PRIVO   Privacy Vaults Online

PRL  Potential Routers List

PRM  Performance Reference Model 

PRNG   Pseudorandom Number Generator

PROM   Programmable Read-only Memory 

PROPIN  Proprietary Information 

ProSe  Proximity Services

PRP Policy Retrieval Point

PRSN  Primary Services Node 

PRSN  Primary Services Node

PRV  Pressure Relief Valve 

PS Personnel Security

PSCR  Public Safety Communications Research

PSIRT Product Security Incident Response Team

PSK  Pre-Shared Key

PSN  Product Source Node 

PSO Particle Swarm Optimization

PSP  Payment Service Provider 

PSS  Probabilistic Signature Scheme

PSTN Public Switched Telephone Network

PSWAC Public Safety Wireless Advisory Committee

PTA  Privacy Threshold Analysis

PTK  Pairwise Transient Key

PTP  Precision Time Protocol

PTS  PIN Transaction Security 

PTT Push-To-Talk

PTV  perceived target value

PUB  publication

PUC Public Utilities Commission

PUE Power Usage Effectiveness

PUK  PIN Unblocking Key

P-value  Tail Probability

PVG  patch and vulnerability group

PVV  PIN Verification Value

PWG  Public Working Group

PWS Performance-Based Work Statement

PXE Preboot Execution Environment

  

Q

QA Quality Assurance

QA/QC  Quality Assurance/Quality Control

QEMU Quick Emulator

QFE  Quick Fix Engineering Software Updates

QoL Quality of Life

QoP  quality of protection 

QoS  Quality of Service

QR  Quick Response

QRF Quick Reaction Force

QSA  Qualified Security Assessor 

QUAL Qualification 

  

R

RAU Reserve Augmentation Unit

RAW  Read-After-Write

R&D  research and development

R/W  Read/Write

R2L  Remote-to-Local User Attack 

RA  Registration Authority, Risk Assessment, Receiver Address 

RaaS  Ransomware-as-a-Service

RAD Rapid Application Development

RAdAC  Risk-Adaptable Access Control 

RADIUS  Remote Authentication Dial-in User Service

RAID Random Array of Inexpensive Disks, Redundant Array of Inexpensive Disks

RAM  random access memory

RAMPS  Regional Alliances and Multistakeholder Partnerships to Stimulate

RAN  Radio Access Network

Rand Random Number

RAPI  Remote Application Programming Interface

RAPIDS Real-time Automated Personnel Identification System

RAR Risk Assessment Report

RAT  Remote Access Tool 

RBAC  Role-Based Access Control

RBG  Random Bit Generator 

RBIS Risk-Based Inspection System

RBL  Real-Time Blackhole List 

RC2  Rivest Cipher 2

RC4  Rivest Cipher 4

RCD Records Disposition Schedule

RCE  route cache entry

RDF Resource Description Framework

RCFL  Regional Computer Forensics Laboratory 

RCP  Remote Copy Protocol, Ready Cybercrew Program

RCS Rich Communication Services

RDBMS  Regional Database Management System

RDF Resource Description Framework

RDP Remote Desktop Protocol

RDS  Reference Data Set, Records Disposition Schedule

R&D Research and Design

RED  Classified information that is not encrypted 

REL  Rights Expression Language

REMSEC Remanence Security

REN-ISAC  Research and Education Networking Information Sharing and Analysis Center

REP  Robots Exclusion Protocol 

RES Response

REST  Representational State Transfer

RF  Radio Frequency

RFC  Request for Comments 

RF CM  Radio Frequency Countermeasures

RFD  Reflected File Download Attack 

RFI  Request for Information

RFID  Radio Frequency Identification

RFP Request for Proposal 

RFTC  Request for Technical Capabilities

RFU  Reserved for Future Use

RIB  Routing Information Base 

RID  Real-Time Inter-Network Defense, Registered application provider IDentifier

RIP  Routing Information Protocol

RIPng  Routing Information Protocol next generation

RIPv2  Routing Information Protocol version 2

RIPE NCC  Réseaux IP Européens Network Coordination Centre

RIR  Regional Internet Registry

RIS  Remote Installation Services

RISC  Reduced Instruction Set Computing

RITIS Regional Integrated Transportation Information System

RIT/RIC rapid intervention teams or crews

RLS  Row Level Security

RM Risk Management

RMA  reliability, maintainability, and availability

RMF Risk Management Framework 

RMON   Remote Monitoring

RN Relay Node

RNG  Random Number Generator 

ROA  Route Origin Authorization 

ROE  Rules of Engagement 

ROI  Return on Investment

ROLIE   Resource-Oriented Lightweight Information Exchange

ROM  Read-Only Memory

ROS Robot Operating System 

RoT   Root of Trust

ROV  Route Origin Validation

RP  Relying Party, Responsible Person

RPA Resolvable Private Address

RPC  remote procedure call

RPF  Reverse Path Forwarding

RPKI  Resource Public Key Infrastructure

RPKI VC  RPKI Validating Cache

RPO  Recovery Point Objective

RPM Revolutions per minute

RPS Registration Practice Statement

RQNT Request for Notification

RR  Resource Record

RRAS Routing and Remote Access Service

RRC Radio Resource Control

RRSIG   Resource Record Signature

RS  Router Solicitation, relay station

RSA  Rivest-Shamir-Adleman

RSASSA RSA Signature Scheme with Appendix

RSBAC  rule set-based access control

RSIP Restart In Progress

RSN  Robust Security Network 

RSNA  Robust Security Network Association

RSNIE   Robust Security Network Information Element 

RSO  reduced sign-on 

RSP Readiness Spares Packages

RSS  Really Simple Syndication

RSSI Received Signal Strength Indication

RSTP Rapid Spanning Tree Protocol

RSVP  Resource Reservation Protocol

RT Runtime, Requalification training

RTA (fictional)  Radionuclide Transportation Agency

RTD Root of Trust for Detection

RTF  Reader Talks First

RTLS  Real-Time Location System

RTM  Root of Trust for Measurement, Ready Tasking Memorandum

RTO  Recovery Time Objective, Regional Transmission Operator

RTOI Real-Time Operations and Innovation

RTP  Real-time Transport Protocol, Real-Time Pricing

RTR  Root of Trust for Reporting

RTRB Realistic Training Review Board

RTRec Root of Trust for Recovery

RTS  Root of Trust for Storage, Remote Telematics System 

RTSP  Real Time Streaming Protocol 

RTU Root of Trust for Update

RuBAC  Rule-Based Access Control

RuleML  Rule Markup Language

R-UIM  Removable User Identity Module