Glossary

Filter:
# A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
A
A1
AC
ACD
ACK
ACL
ACU
A-D
Ada
ADC
ADH
ADM
ADP
AE
AES
AFJ
AFR
AI
AIG
AIN
AIS
AJ
AK
AKM
ALC
ALE
ALU
AMA
AMI
AMS
ANI
AOS
AP
APC
APD
APL
App
APU
AR
Arg
ARQ
ARS
ASU
AV
AVP
B
B
B1
B2
B3
BBS
BCC
BCD
BCI
Bd
BER
Bit
BIU
BPI
BPS
BR
BSA
BSE
Bug
Bus
BW
C
C*
C1
C2
C3
C3I
C4
CA
Can
Cat
CBA
CBC
CCB
CCI
CCO
CDR
CDS
CF
CFD
CFE
CI
CIA
CIK
CIP
CK
CKG
CKL
CM
CMP
CMS
CN
CNK
COR
CPC
Cpi
CPS
CPU
CRB
CRC
CRO
CRP
CSA
CSC
CSE
CSM
CSO
CSS
CTY
CUP
CVA
CWC
D
D&V
D-A
DAA
DAC
DAU
DC
DCA
DCP
DCS
Dd
DDD
DDN
DDS
DDT
DEC
DED
DES
DF
DIB
DID
Die
DIP
DLE
DMA
DO
Doc
DOD
DOE
DON
DOS
DP
DPB
DPL
DS
DSN
DSU
DTD
DTE
DTS
DUA
E
EAM
EAP
ECM
EDM
EEI
EFD
EFT
EIF
EMS
ENQ
EOF
EOL
EOT
EOU
EPL
Era
ES
ESS
ETB
ETL
ETX
EV
Exa
EXE
F
Fan
FAQ
FAX
FCA
FDM
FEC
FER
FIN
Fix
FOI
FQR
FQT
FRD
Fry
FSD
FTS
H
H
Hat
HCF
HD
HDM
Hex
HF
HLL
Hog
HOL
Hop
HSM
HUS
Hz
I
I&A
I/O
IAC
Ice
ICU
IDN
IDS
IFF
II
IIS
IKE
ILS
IM
IMP
IN
Inc
INF
IOC
IP
IPC
IPM
IRC
IRK
IRM
IS
ISM
ISO
ISS
IT
ITF
ITM
ITS
L
LAN
LDB
LER
LKG
LLC
LMD
LME
LMI
Log
LOS
LP
LPC
LPD
LPI
LPT
Ls
LSI
M
M
MAC
MAN
MD5
MDC
Meg
MEP
MER
Mgt
MHS
MHz
MI
MIB
MLS
MOA
Mod
MOE
MOP
MOU
MRK
MRT
MSE
MTR
MTT
Mu
MUD
MUX
Mw
N
N
NAK
NAR
NBH
NCA
NCC
NCS
NEC
Net
NID
NII
NIL
NIU
NM
NP
NRZ
NSA
NSD
NSI
NSM
NSO
NSP
NTI
NTM
NTN
NXX
O
O&M
Ob
OCR
OEM
OMB
ONA
OPI
OPM
OPT
OR
ORD
OS
OSI
OSU
OTP
OTT
P
P&D
P3P
PA
PAA
PAD
PAE
PAL
PAP
PAX
PBD
PBX
PC
PCA
PCS
PCZ
PD
Pdl
PDN
PDR
PDS
PDU
PES
PIP
PIX
PKA
PKC
PL
PLA
PM
PMD
PMO
PMP
Pod
POM
Pop
PPL
PPN
PPS
Ps
PSL
PSN
PTR
PTT
PUC
PUT
PVC
PWA
PX
R
R&D
RAC
RAM
RAT
RC4
RD
RED
REL
RF
RFC
RFE
RFP
RKV
RL
RMR
RO
ROM
RPM
RQT
RSA
Rsh
RSN
RTI
RTM
RTS
Run
RWX
S
S
S&T
SAO
SAP
SAV
Say
SCG
SCI
SCP
SDR
Set
S-F
SFA
SI
SIG
SMM
SMO
SMU
SO
SOH
SON
SOS
SOW
SPK
Spl
SPO
SPS
Spy
SRI
SRP
SRR
SSE
SSO
SSR
STD
STI
STS
STU
STX
SUB
SYN
T
T&E
TA
TAG
Tap
Tar
TCB
TCD
TCS
TCU
TD
TDM
TED
Tee
TEI
TEK
TEP
TFM
TFS
TLA
TLS
TMC
TNI
Toy
TPC
TPI
TRB
TRR
TSK
Tty
TV
TWX
U
U
UA
UBD
UIS
UK
Up
UPP
URL
UV
W
WAN
Win
WPA
Certification
  • A statement that specifies the extent to which the security measures meet specifications. Certification is based on the results of the risk analysis performed. It does not necessarily imply a guarantee that the described system is impenetrable. It is an input to the security approval process. (AFR 205-16;)
  • External evaluation of an employee’s expertise.
  • A statement based on detailed technical analysis that specifies the extent to which the security measures in the system or facility meet the security requirements. Certification is based on the results of the risk analysis performed. It does not necessarily imply a guarantee that the described system is impenetrable. It is an input to the security accreditation process. (AFR 700-10;)
  • The technical evaluation of a system's security features, made as part of and in support of the approval/accreditation process, that establishes the extent to which a particular computer system's design and implementation meet a set of specified security requirements. (CSC-STD-001-83;)
  • The technical evaluation of an AIS's security features and other safeguards, made as part of and in support of the accreditation process, that establishes the extent to which a particular AIS design and implementation meet a set of specified security requirements. (DODD 5200. 28;)
  • An individual's formal written assurance that, based on evaluation of security tests, the classified ADP system and its environment meet the approved security specifications outlined by the ADP Security Plan (DOE 5636. 2A;)
  • The technical evaluation, made as part of and in support of the accreditation process, that establishes the extent to which the design and implementation of a computer system or network meet prespecified security requirements. (FIPS PUB 39;; AR 380-380;) 7. The resulting decision attesting to the system's ability to meet the specified security requirements. This decision is in support of the accreditation process and is based on the finding of a technical evaluation. (NCSC-WA-001-85;) 8. The technical process evaluation, made as part of and in support of the accreditation process, whereby a procedure, program, system, component, or system is shown to be secure; i. e. , that the security design specifications are correct and have been properly implemented. Certification is performed by independent technical personnel according to an acceptable standard of proof such that the level of security protection is identified with regard to a procedure, program, system component, or system. (OPNAVINST 5239. 1A;) 9. A reasonable assurance (based on a technical evaluation of a system test) and written acknowledgment made by a CPPM, or an individual designated by the CPPM, that a proposed unclassified computer application processing sensitive information meets all applicable federal and departmental policies, regulations, and procedures, and that results of a systems test demonstrate installed security safeguards are adequate and functioning properly. (DOE 1360. 2A) 10) The comprehensive evaluation of the technical and nontechnical security features of an AIS and other safeguards, made in support of the accreditation process, that establishes the extent to which a particular design and implementation meet a specified set of security requirements. (NCSC-TG-004-88)