JavaScriptMessages
APEC
Asia Pacific Economic Cooperation
SiteMap
Login
Glossary
Filter:
#
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
All
Return to List
A
A1
Abandoned Call
Abbrev
Abbreviated Dialing
ABEND
Abort
Aborted Connection
Above Type 2 Magnetic Media
AC
AC Erasure
Accept
Acceptable Level Of Risk
Acceptance
Acceptance Certification
Acceptance Inspection
Acceptance Test
Access
Access Attempt
Access Authorization
Access card
Access Category
Access Code
Access Contention
Access Control
Access Control List
Access Control List(ACL)
Access control lists (ACLs)
Access Control Measures
Access Control Mechanism
Access Control Mechanism(s)
Access Control Models
Access Control Policies
Access control policy
Access Control Roster
Access Control Software
Access Controls
Access Level
Access Line
Access List
Access Mode
Access Node
Access Originator
Access Period
Access Permissions
Access permissions (authorizations)
Access Phase
Access Point
Access point. 1)
Access Port
Access Privileges
Access Request
Access Time
Access To Information
Access Type
Accessible Space
Accidental
Account Administration
Account Administrator
Account Management
Accountability
Accountability For Sensitive Data
Accountability Information
Accounting
Accounting Legend
Accounting Legend Code (ALC)
Accounting Number
Accounting System
Accreditation
Accreditation Authority
Accumulator
Accuracy
ACD
ACK
ACK (Acknowledgement)
Acknowledge Character
Acknowledgement
Acknowledgement (ACK)
Acknowledgement number
ACL
ACLs (Access control lists)
Acme
Acolyte
A-Condition
Acoustic Coupler
Acoustic Emanation
Acoustical Intelligence
ACOUSTINT
Acquisition
Acquisition Program
Acquisition Specification
Acquisitions
Active Attack
Active content
Active Directory
Active Directory Users and Computers
Active fingerprinting
Active Server Pages
Active Wiretapping
Active-X
Activity
Activity Log
ACU
A-D
Ad Hoc Query
Ada
Adaptive Channel Allocation
Adaptive Communication
Adaptive Routing
Adaptive System
ADC
ADCCP
Add Mode
Added Bit
Added Block
Adder
Adder-Subtracter
Add-On Security
Address
Address Field
Address Message Sequencing
Address Part
Address Pattern
Address Separator
Address Space
Address spoofing
Address Translation Unit
Addressability
Addressable Point
Adequate Notice
Adger
ADH
Ad-Hockery
ADM
Admin
Administration
Administrative Security
Administrative Security Policies And Procedures
Administrative Tools
Administrative User
Administratively Controlled Information
Administrator
Administrator Of General Services
ADP
ADP Facility
ADP Security
ADP Security Documentation
ADP Security Staff
ADP Storage Media
ADP System
ADP System Security
ADPCM
ADPE
Advanced Data Communication Control Procedure
Advanced Development Model
Advanced Encryption Standard (AES)
Advanced Intelligent Network
ADVENT
Adversary
Adversary Scenario
AE
AES
AFAIK
AFDTC
Affirm
AFJ
AFR
AFSSI
AFSSM
Agencies
Agency
Agency-Specific Policies And Procedures
Agent
Aggregation
Aggregation Problem
AH (Authentication Header)
AI
AI-Complete
AIG
AIN
AIOD
Air Conditioning
Air gap
AIRK
Airplane Rule
AIS
AIS Security
AISS
AJ
AK
AKD/RCU
AKDC
AKM
Alarm
Alarm Center
Alarm Indicator
Alarm Sensor
Alarms, Signals And Reports
ALC
ALC-3
ALC-4
ALE
Algorithm
Algorithmic Language
Aliasing Bug
All-Elbows
Allman Style'*
Alpha Profile
Alphabet
Alphabet Translation
Alphabet Transliteration
Alphabetic Character Set
Alphabetic Code
Alphabetic String
Alphabetic Word
Alphanumeric
Alphanumeric Character Set
Alphanumeric Code
Alphanumeric Data
Alt /awlt/
Alt Bit
Alternate COMSEC
Alternate COMSEC Manager
Alternate Mark Inversion Signal
Alternate Routing
Alternating Current
Alternative
Altmode
ALU
Aluminum Book
AMA
Ambient Level
Ambiguity
American National Standard Code For Information Interchange
American National Standards Institute
American Standard Code For Information Interchange (ASCII)
AMI
Amp Off
Amper
AMPS
AMS
Analog Computer
Analog Control
Analog Data
Analog Decoding
Analog Encoding
Analog Facsimile Equipment
ANALOG Signal
Analog Synchronization
Analog Technology
Analog Transmission
Analog-To-Digital
Analog-To-Digital Coder
Analog-To-Digital Converter
Analog-To-Digital Encoder
Analysis
ANDVT
Angle Brackets
Angry Fruit Salad
ANI
Annual cost of protection
Annual Loss Expectancy
Annual Reports
Annual threat severity
Anomaly detection analysis
Anonymous websurfing services
ANSI
Answer Back
Answer Signal
Anti-Jam
Anti-Jamming
Anti-replay protection
Anti-Spoof
Anti-Virus Program
Antivirus programs
AOS
AOSS
AP
Apache
APC
APD
APL
App
Append Access Mode
Applicant
Application
Application Development Control
Application firewall
Application Layer
Application layer authentication
Application monitors
Application Software
Application Software (functional)
Applications Security
Appreciations
Approval Accreditation
Approval To Operate
Approval/accreditation
Approved Circuit
Approving
APU
AR
AR 380-380
ARCH:D1
ARCH:D2
Archive
Archivist
Area Code
Arena
ARES
Arg
Argument
Arithmetic And Logic Unit
Arithmetic Operation
Arithmetic Overflow
Arithmetic Register
Arithmetic Shift
Arithmetic Underflow
Arithmetic Unit
ARMM
ARPANET
ARQ
Array
Array Processor
Arrest
ARS
Artificial Intelligence
ASCII
ASCIIbetical Order
ASPJ
Assemble
Assembler
Assembly
Assembly Language
Assembly Phase
Assembly Program
Assembly Time
Assertion
Assessing Controlled Access Protection
Assessment
Assessments (e. G. , Surveys, Inspections)
Asset
Asset Category
Asset Container
Asset enumeration
Asset Granularity
Association Description
Assurance
Assurance Testing
ASU
Asymmetrical warfare
Asynchronous And Synchronous Communications
Asynchronous Attack
Asynchronous Network
Asynchronous Operation
Asynchronous Transfer Mode
Asynchronous Transmission
Asynchronous Working
AT&T
ATAM
Atomic
Attachment
Attachment Unit Interface
Attack
Attack automation
Attack software
Attack Time
Attacker-in-the-middle attack
Attempt
Attention Character
Attenuation
Attoparsec
Attribute
Attribute Of An Entity
AUD (audit)
AUD/D1
AUD/D2
AUD/D3
Audit
Audit Analysis Tools
Audit Collection Requirements
Audit Event
Audit Log
Audit logs
Audit Mechanism
Audit Parameters
Audit Record
Audit Reduction Tools
Audit Review File
Audit Trail
Audit Trails And Logging
Audit Trails And Logging Policies
Auditable Events
Auditing Tools
Auditor
Authenticate
Authenticated User
Authentication
Authentication credentials
Authentication Data Base
Authentication Equipment
Authentication Header (AH)
Authentication Period
Authentication Process
Authentication System
Authenticator
Authority Arrest
Authorization
Authorization Process
Authorizations (access permissions)
Authorized Station
Authorized Vendor
Authorized Vendor Program
Autobogotiphobia*
AUTODIN
Automagically*
Auto-Manual System
Automated action
Automated Data Medium
Automated Data Processing
Automated Data Processing Equipment
Automated Data Processing Security
Automated Decision Making Computer
Automated Decision-Making System
Automated Information
Automated Information System
Automated Information System Security
Automated Information Systems Security
Automated Information Systems(s)
Automated Security
Automated Security Monitoring
Automated Security Tools
Automated System Security
Automatic
Automatic Answering
Automatic Data Handling
Automatic Data Processing
Automatic Data Processing Equipment
Automatic Data Processing System
Automatic Dialing
Automatic Message Accounting
Automatic Message Processing System
Automatic Number Identification
Automatic Operation
Automatic Remote
Automatic Remote Rekeying
Automatic Remote Reprogramming And Rekeying
Automatic Repeat-Request
Automatic Route Selection
Automatic Secure Voice Communications Network (AUTOSEVOCOM)
Automatic Voice Network
Automation
Automation Security
Autonomous
AUTOSEVOCOM
AUTOVON
Auxiliary Operation
Auxiliary Power
Auxiliary Storage
AV
Availability
Availability Of Data
Avatar
Average Rate Of Transmission
Avoiding Information Monopolies
AVP
Awk*
Audit Trail
An automated or manual set of records that collectively provide documentary evidence of processing used to aid in tracing system activities. (AFR 205-16;)
A chronological record of activities which will enable the reconstruction, review and examination of the sequence of environments and activities concerning each event in the transaction. (AR 380-380;)
A set of records that collectively provide documentary evidence of processing used to aid in tracing from original transactions forward to related records and reports, and/or backwards from records and reports to their component source transactions. (CSC-STD-001-83;)
A chronological record of system activities which is sufficient to enable the reconstruction, review, and examination of the sequence of environments and activities surrounding or leading to an operation, a procedure, or an event in the path of a transaction from its inception to output of final results. (DODD 5200. 28;, FIPS PUB 39;)
A set of manual and/or automated produced records that provide documentary evidence of system use. (NCSC-wa-001-85;)
A special case of an activity log that is sufficient to enable reconstruction, review, and examination of the sequence of activities involved in every transaction. (RM;) 7. A chronological record of system activities which is sufficient to enable the reconstruction, review, and examination of the sequence of events leading towards a particular final result. 8) 8. A chronological record of system activities that is sufficient to enable the reconstruction, reviewing and examination of the sequence of environments and activities surrounding or leading to an operation, a procedure or an event in a transaction from its inception to final results. (OPNAVINST 5239. 1A;)