JavaScriptMessages
APEC
Asia Pacific Economic Cooperation
.English
.Español
.tiếng Việt
.По-русски
.한국어
.日本語
.简体中文版
Home
News
Rss Feeds
SiteMap
Academics
Tools
Tool Downloads (Pg. 1)
Tool Downloads (Pg. 2)
Tool Downloads (Pg. 3)
Tool Downloads (Pg. 4)
Curriculum
CNSS Standards
Ethics and Law
K-12 Material
NSA Centers of Excellence
Teaching Materials
4012 Presentation
Course Modules
Module 1
01. (I) Corporate Resource
02. (II) Basic Problems
03. (III) Ethical Issues
04. (IV) Studies
Teaching Considerations
Module 2
01. (I) Ethics
02. (II) Environment
03. (III) Physical
04. (IV) Data
05. (V) Security Training
Teaching Considerations
Module 3
01. (I) Planning
02. (II) Organizational Policies & Procedures
03. (III) Ethics and Professionalism
04. (IV) Personnel Security
05. (V) Physical Security
06. (VI) System Security
07. (VII) Threats & Vulnerabilities
08. (VIII) Data Security & Recovery
09. (IX) Control and Audit
10. (X) Costs and Benefits
Teaching Considerations
Module 4
01. (I) Underlying Problem
02. (II) Laws as Tools for Information Security
03. (III) Laws and Legislation as Legal Options to
Teaching Considerations
Module 5
01. (I) Overview
02. (II) System Sensitivity
03. (III) Security Requirements
04. (IV) Levels of Security
05. (V) Data Life Cycles
06. (VI) Sample Protection Plan
Teaching Considerations
Module 6
01. (I) Overview
02. (II) Threats
03. (III) Countermeasures
04. (IV) Tradeoffs-Costs & Benefits
05. (V) Network Design
Teaching Considerations
Module 7
01. (I) Overview
02. (II) Development of Security Program
03. (III) Risk Analysis
04. (IV) Contingency Planning
05. (V) Legal Issues for Managers
06. (VI) System Validation & Verification (Accredi
07. (VII) Information Systems Audit
08. (VIII) Computer Security Check List
Teaching Considerations
Module 8
Course Modules Website
Course Videos
IA Videos
Videos (Pg. 1)
Videos (Pg. 2)
Videos (Pg. 3)
Videos (Pg. 4)
Videos (Pg. 5)
Videos (Pg. 6)
Videos (Pg. 7)
External Links
Academic Sites
Government Sites
Independent Organizations
Industry Sites
General Interest
Common Criteria
IA Activities
Professional Certification
Seminal Works
Seminal Papers
Glossary
Publications
Government Documents
Gov Docs (Pg. 1)
Gov Docs (Pg. 2)
Gov Docs (Pg. 3)
Gov Docs (Pg. 4)
Gov Docs (Pg. 5)
Gov Docs (Pg. 6)
IA Posters
IA Posters (Pg. 1)
IA Posters (Pg. 2)
IA Posters (Pg. 3)
IA Posters (Pg. 4)
IA Posters (Pg. 5)
IA Posters (Pg. 6)
Industry Documents
NIATEC Publications
Older Papers
Publisher Databases
Login
Glossary
Filter:
#
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
All
Return to List
A
A1
Abandoned Call
Abbrev
Abbreviated Dialing
ABEND
Abort
Aborted Connection
Above Type 2 Magnetic Media
AC
AC Erasure
Accept
Acceptable Level Of Risk
Acceptance
Acceptance Certification
Acceptance Inspection
Acceptance Test
Access
Access Attempt
Access Authorization
Access card
Access Category
Access Code
Access Contention
Access Control
Access Control List
Access Control List(ACL)
Access control lists (ACLs)
Access Control Measures
Access Control Mechanism
Access Control Mechanism(s)
Access Control Models
Access Control Policies
Access control policy
Access Control Roster
Access Control Software
Access Controls
Access Level
Access Line
Access List
Access Mode
Access Node
Access Originator
Access Period
Access Permissions
Access permissions (authorizations)
Access Phase
Access Point
Access point. 1)
Access Port
Access Privileges
Access Request
Access Time
Access To Information
Access Type
Accessible Space
Accidental
Account Administration
Account Administrator
Account Management
Accountability
Accountability For Sensitive Data
Accountability Information
Accounting
Accounting Legend
Accounting Legend Code (ALC)
Accounting Number
Accounting System
Accreditation
Accreditation Authority
Accumulator
Accuracy
ACD
ACK
ACK (Acknowledgement)
Acknowledge Character
Acknowledgement
Acknowledgement (ACK)
Acknowledgement number
ACL
ACLs (Access control lists)
Acme
Acolyte
A-Condition
Acoustic Coupler
Acoustic Emanation
Acoustical Intelligence
ACOUSTINT
Acquisition
Acquisition Program
Acquisition Specification
Acquisitions
Active Attack
Active content
Active Directory
Active Directory Users and Computers
Active fingerprinting
Active Server Pages
Active Wiretapping
Active-X
Activity
Activity Log
ACU
A-D
Ad Hoc Query
Ada
Adaptive Channel Allocation
Adaptive Communication
Adaptive Routing
Adaptive System
ADC
ADCCP
Add Mode
Added Bit
Added Block
Adder
Adder-Subtracter
Add-On Security
Address
Address Field
Address Message Sequencing
Address Part
Address Pattern
Address Separator
Address Space
Address spoofing
Address Translation Unit
Addressability
Addressable Point
Adequate Notice
Adger
ADH
Ad-Hockery
ADM
Admin
Administration
Administrative Security
Administrative Security Policies And Procedures
Administrative Tools
Administrative User
Administratively Controlled Information
Administrator
Administrator Of General Services
ADP
ADP Facility
ADP Security
ADP Security Documentation
ADP Security Staff
ADP Storage Media
ADP System
ADP System Security
ADPCM
ADPE
Advanced Data Communication Control Procedure
Advanced Development Model
Advanced Encryption Standard (AES)
Advanced Intelligent Network
ADVENT
Adversary
Adversary Scenario
AE
AES
AFAIK
AFDTC
Affirm
AFJ
AFR
AFSSI
AFSSM
Agencies
Agency
Agency-Specific Policies And Procedures
Agent
Aggregation
Aggregation Problem
AH (Authentication Header)
AI
AI-Complete
AIG
AIN
AIOD
Air Conditioning
Air gap
AIRK
Airplane Rule
AIS
AIS Security
AISS
AJ
AK
AKD/RCU
AKDC
AKM
Alarm
Alarm Center
Alarm Indicator
Alarm Sensor
Alarms, Signals And Reports
ALC
ALC-3
ALC-4
ALE
Algorithm
Algorithmic Language
Aliasing Bug
All-Elbows
Allman Style'*
Alpha Profile
Alphabet
Alphabet Translation
Alphabet Transliteration
Alphabetic Character Set
Alphabetic Code
Alphabetic String
Alphabetic Word
Alphanumeric
Alphanumeric Character Set
Alphanumeric Code
Alphanumeric Data
Alt /awlt/
Alt Bit
Alternate COMSEC
Alternate COMSEC Manager
Alternate Mark Inversion Signal
Alternate Routing
Alternating Current
Alternative
Altmode
ALU
Aluminum Book
AMA
Ambient Level
Ambiguity
American National Standard Code For Information Interchange
American National Standards Institute
American Standard Code For Information Interchange (ASCII)
AMI
Amp Off
Amper
AMPS
AMS
Analog Computer
Analog Control
Analog Data
Analog Decoding
Analog Encoding
Analog Facsimile Equipment
ANALOG Signal
Analog Synchronization
Analog Technology
Analog Transmission
Analog-To-Digital
Analog-To-Digital Coder
Analog-To-Digital Converter
Analog-To-Digital Encoder
Analysis
ANDVT
Angle Brackets
Angry Fruit Salad
ANI
Annual cost of protection
Annual Loss Expectancy
Annual Reports
Annual threat severity
Anomaly detection analysis
Anonymous websurfing services
ANSI
Answer Back
Answer Signal
Anti-Jam
Anti-Jamming
Anti-replay protection
Anti-Spoof
Anti-Virus Program
Antivirus programs
AOS
AOSS
AP
Apache
APC
APD
APL
App
Append Access Mode
Applicant
Application
Application Development Control
Application firewall
Application Layer
Application layer authentication
Application monitors
Application Software
Application Software (functional)
Applications Security
Appreciations
Approval Accreditation
Approval To Operate
Approval/accreditation
Approved Circuit
Approving
APU
AR
AR 380-380
ARCH:D1
ARCH:D2
Archive
Archivist
Area Code
Arena
ARES
Arg
Argument
Arithmetic And Logic Unit
Arithmetic Operation
Arithmetic Overflow
Arithmetic Register
Arithmetic Shift
Arithmetic Underflow
Arithmetic Unit
ARMM
ARPANET
ARQ
Array
Array Processor
Arrest
ARS
Artificial Intelligence
ASCII
ASCIIbetical Order
ASPJ
Assemble
Assembler
Assembly
Assembly Language
Assembly Phase
Assembly Program
Assembly Time
Assertion
Assessing Controlled Access Protection
Assessment
Assessments (e. G. , Surveys, Inspections)
Asset
Asset Category
Asset Container
Asset enumeration
Asset Granularity
Association Description
Assurance
Assurance Testing
ASU
Asymmetrical warfare
Asynchronous And Synchronous Communications
Asynchronous Attack
Asynchronous Network
Asynchronous Operation
Asynchronous Transfer Mode
Asynchronous Transmission
Asynchronous Working
AT&T
ATAM
Atomic
Attachment
Attachment Unit Interface
Attack
Attack automation
Attack software
Attack Time
Attacker-in-the-middle attack
Attempt
Attention Character
Attenuation
Attoparsec
Attribute
Attribute Of An Entity
AUD (audit)
AUD/D1
AUD/D2
AUD/D3
Audit
Audit Analysis Tools
Audit Collection Requirements
Audit Event
Audit Log
Audit logs
Audit Mechanism
Audit Parameters
Audit Record
Audit Reduction Tools
Audit Review File
Audit Trail
Audit Trails And Logging
Audit Trails And Logging Policies
Auditable Events
Auditing Tools
Auditor
Authenticate
Authenticated User
Authentication
Authentication credentials
Authentication Data Base
Authentication Equipment
Authentication Header (AH)
Authentication Period
Authentication Process
Authentication System
Authenticator
Authority Arrest
Authorization
Authorization Process
Authorizations (access permissions)
Authorized Station
Authorized Vendor
Authorized Vendor Program
Autobogotiphobia*
AUTODIN
Automagically*
Auto-Manual System
Automated action
Automated Data Medium
Automated Data Processing
Automated Data Processing Equipment
Automated Data Processing Security
Automated Decision Making Computer
Automated Decision-Making System
Automated Information
Automated Information System
Automated Information System Security
Automated Information Systems Security
Automated Information Systems(s)
Automated Security
Automated Security Monitoring
Automated Security Tools
Automated System Security
Automatic
Automatic Answering
Automatic Data Handling
Automatic Data Processing
Automatic Data Processing Equipment
Automatic Data Processing System
Automatic Dialing
Automatic Message Accounting
Automatic Message Processing System
Automatic Number Identification
Automatic Operation
Automatic Remote
Automatic Remote Rekeying
Automatic Remote Reprogramming And Rekeying
Automatic Repeat-Request
Automatic Route Selection
Automatic Secure Voice Communications Network (AUTOSEVOCOM)
Automatic Voice Network
Automation
Automation Security
Autonomous
AUTOSEVOCOM
AUTOVON
Auxiliary Operation
Auxiliary Power
Auxiliary Storage
AV
Availability
Availability Of Data
Avatar
Average Rate Of Transmission
Avoiding Information Monopolies
AVP
Awk*
AFSSM
See Air Force Systems Security Memorandum.