Course Acronyms

Acronym or Initialism (E)
Meaning (E)
(C)NES
Canadian Network Encryption System
1xRTT
Single Carrier (1x) Radio Transmission Technology
3 DES
Triple Data Encryption Standard
A3
GSM Authentication Algorithm
A5
GSM Data Encryption Algorithm
A8
GSM Cipher Key Generation Algorithm
AA
Alternate Assurances Group (Common Criteria)
AAA
Authentication, Authorization and Accounting
AAD
Auxiliary Account Data
AC
Alternating Current
AC
Automated Control
ACCS
AEHF Constellation Control Station
ACES
Automated Communication Engineering Software
ACL
Access Control List
ACM
Accountable COMSEC Material
ACMCA
Accountable COMSEC Material Control Agreement
ACTS
AEHF COMSEC/TRANSEC System
Admin
Administrator
ADRL
Agreement Data Requirements List
AEHF
Advanced Extremely High Frequency
AES
Advanced Encryption Standard
AF
Application Filter
AFIS
Automated Fingerprint Identification System
AFU
Approval For Use
AIDS
Application-Based Intrusion Detection System
AIS
Automated Information System
AK
Automatic Keying
AK KEK
Automatic Keying Key Encryption Key
AK/RV
Automatic Rekey/Receive Key
AKA
Authentication & Key Agreement
AKEK
ACCORDION Key Encryption Key
AKLIF
AEHF key Loading and Initialization Facility
ALC
Accounting Legend Code
ALE
Automatic Link Establishment
ALKMS
AEHF Local Key Management Station
AM
Amplitude Modulation
AMES
Aerospace, Marines and Electronics Systems
AMP
Alternate MAC/PHY
AMPS
Advanced Mobile Phone Service/System
ANDVT
Advanced Narrowband Digital Voice Terminal
ANSI
American National Standards Institute
ANST
Active Network Security Testing
AP
Access Point
AP
Application Process
API
Application Programming Interface
APPK
Authenticated Pre-placed Key
ARDIS
Advanced Radio Data Information Services
ARL
Authority Revocation List
ARP
Address Resolution Protocol
ASCII
American Standard Code for Information Exchange
ASIS
American Society for Industrial Security
ASMCS
AEHF Satellite Mission Control System
ASN
Access Service Network
ASN
Advance Shipping Notice
ASN.1
Abstract Syntax Notation.1
ASOC
AEHF Satellilte Operations centre
ATE
Automated Test Equipment
ATIA
Access to Information Act
ATIP
Access to Information and Privacy
ATM
Asynchronous Transfer Mode
AU
Authentic User
AU
Authorized User
AuC
Authentication Centre
AUI
Attachment Unit Interface
Auth ID
Authorized Identification
BCP
Business Continuity Plan
BCPC
Business Continuity Plan Coordinator
BD_ADDR
Bluetooth Device Address
BDI
Black Digital Interface
BDSA
Border Directory Server Agent
BEA
Black Equipment Area
BES
BlackBerry Enterprise Server™
BET
Bulk Encrypted Transaction
BF
Benign Fill
BFF
Basic FIREFLY
BGP
Border Gateway Protocol
BIA
Business Impact Analysis
BID
British Inter-Departmental
BIOS
Basic Input Output System
BIP
Bit Interleaved Parity
BIS
BlackBerry Internet Service
BIT
Built-In-Test
BLP
Bell and LaPadula
Bluetooth SIG
Bluetooth Special Interest Group
BPSK
Binary Phase Shift Keying
BREW
Binary Run-Time Environment for Wireless
BRI
Basic Rate Interface
BRP
Business Resumption Plan
BS
Base Station
BSC
Base Station Controller
BSD
Berkeley Software Distribution
BSS
Basic Service Set
BSS
Broadcast Satellite Service
BSSID
Basic Service Set Identifier
BTS
Base Transceiver Station
BWA
Broadband Wireless Access
C&A
Certification and Accreditation
CA
Canadian
CA
Certification Authority
CA
COMSEC Authority
CA
Controlling Authority
CA&S
Conceptual Architecture and Strategy
CAA
Controlled Access Area
CAC
Consolidated Analysis Capability
CAC
Common Access Cards
CAD
Common Account Data
CAKMS
Central AEHF Key Mangement System
CANCERT
Term replaced by CERT-CA
CARDS
COMSEC Accounting, Reporting and Distribution System
CAST
Carlisle Adams and Stafford Tavares (Encryption Algorithm)
CAT
Core Architecture Team
CAW
Certification Authority Workstation
CB
Certification Body
CBC
Cipher Block Chaining (DES mode)
CBEA
Controlled Black Equipment Area
CBI
Certificate Based Infrastructure
CBT
Computer Based Training
CC
Common Criteria
CCA
Circuit Card Assembly
CCCS
Canadian Common Criteria Scheme
CCD
Canadian Cryptographic Doctrine
CCEB
Combined Communications-Electronics Board
CCEB
Common Criteria Editorial Board
CCEF
Common Criteria Evaluation Facility
CCEP
Commercial COMSEC Endorsement Program
CCF
Canadian Central Facility
CCF KPF
Canadian Central Facility Key Production Facility
CCI
Controlled Cryptographic Item
CCIB
Common Criteria Implementation Board
CCIMB
Common Criteria Implementation Management Board
CCITS
Common Criteria for Information Technology Security Evaluation
CCITT
Consultative Committee for International Telegraph and Telephone
CCMP
Canadian Cryptographic Management Program
CCPL
Canadian Certified Product List
CCRA
Arrangement on the Recognition of Common Criteria Certificates
CCS
Common Criteria Evaluation Certification Scheme
CCTP
Common Criteria Testing Program
CCTV
Closed Circuit Television
CD
Compact Disk
CDA
Crypto Distributing Authority
CDA
Certificate Distribution Agent
CDC
Computing Devices Canada
CDH
COMSEC/TRANSEC Integrated Circuit/DS-101 Hybrid
CDMA
Code Division Multiple Access
CDR
Critical Design Review
CDRL
Contract Data Requirements List
CD-ROM
Compact Disc-Read Only Memory
CDT
Cancel Distribution Transaction
CE
Compromising Emanation
CEAP
Cryptographic Endorsement and Assessment Program
CEM
Common Methodology for Information Technology Security Evaluation (Common Criteria)
CEO
Canadian Eyes Only
CEOI
Communications and Electronics Operating Instructions
CEP
Cryptographic Endorsement Program
CEPAF
COMSEC equipment Purchase Authorization Form
CEPL
CSE Evaluated Products List
CEPL
Canadian Evaluated Products List
CERF
COMSEC Equipment Requirement Form
CEROFF
Crypto Equipment Rapid Off-line
CERT
A trademark of Carnegie Mellon University that is licensed to authorized CSIRT. No longer treated as an acronym.
CERT-CA
An alternative name for the National CSIRT role of the Cyber Centre.
CERT/CC
Computer Emergency Response Team Coordination Centre
CESG
Communications and Electronic Security Group (UK)
CF
Canadian Forces
CF
Central Facility (USA)
CF
Computer Forensics
CF CONOP
Computer Forensics Concept of Operations
CFB
Cipher FeedBack (DES mode)
CFCSU
Canadian Forces Crypto Support Unit
CFD
Common Fill Device
CFI
Computer Forensics Investigation
CFIOG
Canadian Forces Information Operations Group
CFIOG/IPC
Canadian Forces Information Operations Group/Information Protection Centre
CFPB
Canadian Federal PKI Bridge
CFSS
Canadian Forces Supply System
CGI
Common Gateway Interface
chkdat
Check data
CHVP
Cryptographic High Value Product
CI
Compartmented Information
CIA
Confidentiality, Integrity and Availability
CIAA
Confidentiality, Integrity, Availability and Accountability
CIAS
Canadian INFOSEC Accounting System
CIC
Citizenship and Immigration Canada
CICA
CSE Industrial COMSEC Account
CID
Canadian Inter-Departmental Document
CIDF
Common Intrusion Detection Framework
CIDR
Classless Inter-Domain Routing
CIISD
Canadian and International Industrial Security Directorate
CIK
Crypto Ignition Key
CIM
Compromised Information Message
CIO
Chief Information Officer
CIP
Critical Infrastructure Protection
CIPR
CSE INFOSEC Product Review (CSE)
CIPTF
Critical Information Protection Task Force
CITP
Canadian Industrial TEMPEST Program
CKL
Compromised Key List
CKMU
Canadian Key Management Unit
CLEF
Commercial Licensed Evaluation Facility
CLI
Command Line Interface
CM
Cryptographic Module
CMAC
Crypto Material Assistance Centre
CMART
COMSEC Material Accounting and Reporting Tool
CMB
Configuration Management Board
CMCM
COMSEC Material Control Manual
CMD
Cryptographic Module Document (Common Criteria)
CMI
Certificate Management Infrastructure
CMM
Capability Maturity Model
CMMS
Crypto Material Management System
CMR
COMSEC Material Report
CMS
Certificate Management Services
CMT
Configuration Management
CMVP
Cryptographic Module Validation Program
CMW
Compartmented Mode Workstation
CN
Controlled Network Access
CNR
Combat Net Radio
CNR(P)
Combat Net Radio (Primary)
CNSS
Committee on National Security Systems
CNSSAM
Committee on National Security System Advisory Memorandum
CNSSI
Committee on National Security System Instructions
COI
Community of Interest
COMINT
Communications Intelligence
COMPUSEC
Computer Security
COMSEC
Communications Security
CONOP
Concept of Operations
COPS
The Computer Oracle and Password System
COR
Central Office of Record
COTS
Commercial-Off-The-Shelf
CP
Certificate Policy
CPO
Client/Partner Operations
CPRM
Content Protection for Removable Media
CPS
Certification Practice Statement
CPU
Central Processing Unit
CRC
Cyclic Redundancy Check
CRK
Cryptographic Recovery Key
CRL
Certificate Revocation List
CRN
Confirmation/Rejection Notice
Crypto
Cryptographic
CRYPTOSEC
Cryptographic Security
CS
Controlled Space
CS1
Commercial Security Protection Profile #1 (ITSS)
CS3
Commercial Security Protection Profile #3 (ITSS)
CSA
Cognizant Security Authority
CSC
COMSEC Safeguarding Capability
CSC
Communications-Electronics Security Committee
CSD
Circuit Switched Data
CSE
Communications Security Establishment Canada
CSI
Computer Security Institute (USA)
CSIRT
Computer Security Incident Response Team
CSIS
Canadian Security Intelligence Service
CSMA/CA
Carrier Sense Multiple Access with Collision Avoidance
CSMA/CD
Carrier Sense Multiple Access with Collision Detection
CSMI
Classified Security Management Infrastructure
CSN
Connectivity Service Network
CSO
Company Security Officer
CSR
Certificate Signing Request
CSSC
Canadian System Security Centre
CT
Cypher Text
CTCPEC
Canadian Trusted Computer Product Evaluation Criteria
CTIC
COMSEC/TRANSEC Integrated Circuit
CUAS
Common User Application Software
CUP
COMSEC User Portal
CVE
Commercially Verified Equipment
CVE
Common Vulnerabilities and Exposures
CVSS
Common Vulnerabilities Scoring System
CW
Continuous Wave
DA
Distributing/Distribution Authority
DA
Developmental Assurance (Common Criteria)
DAC
Discretionary Access Control
DACAN
Distribution and Accounting Agency NATO
DAD
Duplicate Address Detection
DAL
Developmental Assurance Level (Common Criteria)
DAMA
Demand Assigned Multiple Access
DAO
Department/Agency/Organization
DAP
Directory Access Protocol
DAR
Data At Rest
DARI
Detect, Analyze, and Response Infrastructure
DARI FOC
DARI Full Operational Capability
DARPA
Defence Advanced Research Projects Agency
DAT
Digital Audio Tape
DAV
Distinguished Attribute Value (X.500)
dB
Decibel
DBA
Database Administrator
dBm
Decibel-milliwatt
DC
Direct Current
DC
Distributed Control
DCA
Departmental COMSEC Authority
DCC
Data Correlation and Consolidation
DCDC
DND Crypto Distribution Centre
DCE
Distributed Computing Environment
DCOM
Distributed-Component Object Model
DCOR
DND Central Office of Record
DDoS
Distributed Denial of Service
DDSM
Directive on Department Security Management
DEK
Data Encryption Key
DEK-KEK
Data Encryption Key - Key Encryption Key
DEKM
Data Encryption Key Memory
DEKMS
DACAN Electronic Key Management System
DePAC
Decrypt Positive Access Control
DEQPSK
Differentially Encoded Quadrature Phase Shift Keying
DES
Data Encryption Standard
DFATD
Department of Foreign Affairs Trade and Development
DHCP
Dynamic Host Configuration Protocol
DIAS
Distributed INFOSEC Accounting System
DIB
Directory Information Base
DID
Data Item Description
D-IO
Defensive IO (Information Operation)
DISA
Defence Information Systems Agency
DISP
Directory Information Shadowing Protocol
DIT
Directory Information Tree
DLL
Dynamic Link Library
DMD
Data Management Device
DMZ
De-Militarized Zone
DN
Distinguished Name
DND
Department of National Defence
DNS
Domain Name System
DOCCT/S
DAMA Order Wire Channel Control Trainer/Simulator
DoD
Department of Defense (USA)
DoS
Denial of Service
DOS
Disk Operating System
DRA/Tacfire
Data Rate Adapter/Tactical Fire
DS
Direct Sales
DSA
Digital Signature Algorithm
DSA
Directory System Agent
DSC
Digital Signature Certificate
DSC
Document Safeguarding Capability
DSE
Digital Signature Entity
DSL
Digital Subscriber line
DSO
Departmental Security Officer
DSP
Directory System Protocol
DSS
Digital Signature Standard
DSS
Digital Spread Spectrum
DSSS
Direct Sequence Spread Spectrum
DTD
Data Transfer Device
DTE
Data Terminal Equipment
DUA
Directory User Agent
DVD
Digital Versatile Disk
EA
Enterprise Architecture
EAA
Electronic Authorization and Authentication
EAL
Evaluation Assurance Level (Common Criteria)
EAP
Employee Assistance Program
EC
Electronic Commerce
ECB
Electronic CodeBook (DES mode)
ECC
Elliptic Curve Cryptography
ECC
Enhanced Cryptographic Card
ECCM
Electronic Counter-Counter Measure
ECDH
Elliptic Curve Diffie-Hellman
ECDSA
Elliptic Curve Digital Signature Algorithm
ECM
Electronic Counter Measure
ECN
Explicit Congestion Notification
ECU
End Crypto Unit
EDGE
Enhanced Data rates for GSM Evolution
EDI
Electronic Data Interchange
EDP
Electronic Data Processing
EDP
Emergency Destruction Plan
EE
End-Entity
EED
Electro-Explosive Device
EEE
End-to-end Encryption
EEPROM
Electrically Erasable Programmable Read-Only Memory
EFE
Encase Forensic Edition
EFF
Enhanced FIREFLY
EFFVS
Enhanced FIREFLY Vector Set
EFS
Encrypting File System
EFT
Electronic Funds Transfer
EIDE
Enhanced Integrated Drive Electronics
EIGRP
Enhanced Interior Gateway Routing Protocol
EIR
Equipment Identity Register
EK
Exclusion Key
EKDL
Electronic Key Destruction List
EKE
Exponential Key Exchange
EKM
Electronic Key Management
EKMS
Electronic Key Management System
EKR
Electronic Key Replacement
EM
Encryptor Manager
EMA
Eclypt Management Application
EMC
Electromagnetic Compatibility
EMI
Electromagnetic Interference
EMR
Electromagnetic Radiation
EMSEC
Emission Security
EMT
Extruded or Electrical Metal Tubing
ENET
Ethernet
EPL
Evaluated Products List
EPROM
Erasable Programmable Read-Only Memory
EPS
Enhanced Polar System
ERTZ
Equipment Radiation TEMPEST Zone
ESA
Enhanced Subscriber Authentication
ESA
Enterprise Security Architecture
ESC
Extremely Sensitive COMSEC
ESD
Electronic Services Delivery
ESM
Enterprise Security Management
ESN
Electronic Serial Number
ESP
Encapsulating Security Payload (Ipv6)
ESP
Enhanced Subscriber Policy
ESPv1
Encapsulating Security Payload (Ipv6) version 1
ESPv3
Encapsulating Security Payload (Ipv6) version 3
ESS
Extended Service Set
ET
Entrust Technologies
ET
Transmitted Electric Field
ETPL
Endorsed TEMPEST Products List
ETPP
Endorsed TEMPEST Products Program
ETSI
European Telecommunications Standards Institute
ETSSP
Endorsed TEMPEST Support Service Program
EUT
Equipment Under Test
E-Vault
Electronic Vault
EV-DO
Evolution-Data Only
EV-DV
Evolution-Data and Voice
F&PCA
Functional and Physical Configuration Audit
FAA
Financial Administration Act
FAC
Foreign Affairs Canada
FAX
Facsimile
FCC
Federal Communications Commission (USA)
FDD
Frequency Division Duplex
FDDI
Fiber-Distributed Data Interface
FDMA
Frequency Division Multiple Access
FDT
Field Data Terminal
FEK
File Encryption Key
FF
FIREFLY
FFVS
FIREFLY Vector Set
FHS
Frequency Hopping Sequence
FHSS
Frequency Hopping Spread Spectrum
FI
File Integrity
FIPC
Federal Information Protection Centre
FIPS
Federal Information Processing Standard (USA)
FIREFLY
Key management protocol based on public key cryptography
FM
Frequency Modulation
FMS
Foreign Military Sales
FNBDT
Future Narrow Band Digital Terminal
FOC
Full Operational Capability
FOCI
Foreign Ownership, Control and Influence
FOD
Foreign Ownership or Dominance
FOUO
For Official Use Only (USA)
FPGA
Field Programmable Gate Array
FPL
Fixed Packet Length
FR
Field Reprogrammability
FSC
Facility Security Clearance
FSS
Fixed Satellite Service
FSU
Field Software Upgrade
FSU
Field Software Upgrade
FTP
File Transfer Protocol
FTR
Field Tamper Recovery
FY
Fiscal Year
Gbps
Gigabit per second
GC
Government of Canada
GC CBI
Government of Canada Certificate Based Infrastructure
GC EKMS
Government of Canada Electronic Key Management System
GC PKI
Government of Canada Public Key Infrastructure
GC-CIRT
Government of Canada Computer Incident Response Team
GCKDF
Generalized Concatenated Key Derivation Function
GCM
Galois/Counter Mode
GDC
Generic Discovery Client
GEA1, GEA2
GPRS Encryption Algorithms
GEDS
Government Electronic Directory Service
GEM
General Dynamics Encryptor Manager
GESC
Government Electronic Services Card
GFE
Government Furnished Equipment
GFF
Generic Fill Format
GGSN
Gateway GPRS Support Node
GHz
Gigahertz
GIDO
Generic Intrusion Detection Options
GIDS
Gateway Intrusion Detection System
GIG
Global Information Grid
GKP
GFF Key Packages
GMITS
Guidelines for the Management of IT Security
GOL
Government on-line
GPRS
General Packet Radio Service
GPS
Global Positioning System
GRE
Generic Routing Encapsulation
GSM
Global System for Mobile Communications
GSP
Government Security Policy
GSS
Generic Security Services
GTIS
Government Telecommunications and Informatics Services
GUI
Graphical User Interface
H2HKT
HAIPE-to-HAIPE Key Transfer
HA
High Availability
HAA
High Availability Architecture
HAC
Host Authorization Code
HACP
High Assurance Cryptographic Product
HAGAR
High Assurance Guidelines and Requirements
HAIPE
High Assurance Internet Protocol Encryptor
HAIPE IS
High Assurance Internet Protocol Encryptor Interoperability Specification
HAM
Host Authentication Module
HCI
Host Control Interface
HCI
Highest Classification Indicator
HCP
Hardened Cable Path
HDD
Hard Disk Drive
HDML
Handheld Device Markup Language
Hdr
Header
HEMP
High Altitude Electromagnetic Pulse
HF
High Frequency
HGEC
High Gain Earth Coverage
HI/DR
Handling Instructions/Disposition Record
HIDS
Host-Based Intrusion Detection System
HIPS
Host-Based Intrusion Prevention System
HLR
Home Location Register
HMAC
Hash Message Authentication Code
HMI
Human-Machine Interface
HPW
High Performance Waveform
HQ
Headquarters
HR
Human Resources
HRCA
High Resolution Coverage Area
HRZ
Highly Restricted Zone
HSDPA
Hign Speed Downlink Packet Access
HSPA
High Speed Packet Access
HSRP
Hot Standby Router Protocol
HTML
Hypertext Markup Language
HTRA
Harmonized Threat Risk Assessment
HTTP
Hypertext Transfer Protocol
HTTPS
Hypertext Transfer Protocol over SSL/TLS
HUB
Hold Up Battery
HUMINT
Human Intelligence
HW
Hardware
Hz
Hertz
I&A
Identification and Authentication
I&V
Identification and Validation
IAB
Internet Activities Board
IANA
Internet Assigned Numbers Authority
IAP
Interim Authority to Process
IATF
Information Assurance Technical Framework
IBKT
In-Band Key Transfer
IBSS
Independent Basic Service Set Network
IC
Integrated Circuit
ICD
Interface Control Document
ICMCM
Industrial COMSEC Material Control Manual
ICMP
Internet Control Message Protocol
ICMPv6
Internet Control Message Protocol version 6
ICOM
Integrated Communications Security
ICSD
Industrial & Corporate Security Directorate
ICSI
Interdepartmental Committee on Security and Intelligence
ICV
Integrity Check Value
ID
Identification
IDART
Information Design Assurance Red Team
IDC
International Data Corporation
IDC
Intrusion Detection Centre
IDEA
International Data Encryption Algorithm
iDEN
Integrated Digital Enhanced Network
IDES
Intrusion Detection Expert System
IDIQ
Indefinite Delivery Indefinite Quantity
IDS
Intrusion Detection System
IDUP
Independent Data Unit Protection
IEC
International Electrotechnical Commission
IEEE
Institute of Electrical and Electronics Engineers
IEKMS
International Electronic Key Management System
IERA
Information Technology Security Evaluation & Risk Assessment
IET
Individual Encrypted Transaction
IETF
Internet Engineering Task Force
IGMP
Internet Group Management Protocol
IGMPv1
Internet Group Management Protocol version 1
IGMPv2
Internet Group Management Protocol version 2
IIP
Information Infrastructure Protection
IIPTF
Information Infrastructure Protection Technical Framework
IIS
Internet Information Server
IKD
Individual Key Distribution
IKE
Internet Key Exchange
IKEK
Initialization Key Encryption Key
IKEv2
Internet Key Exchange version 2
IKMS
IRIS Key Management System
IM
Instant Messaging
IMEI
International Mobile Equipment Identity
IM-PEPD
Implicit Peer Enclave Prefix Discovery
IMSI
International Mobile Station Identity
INE
In-line Network Encryptor
INFOSEC
Information Security
INWG
Internetworking Working Group
IO
Information Operation
IOC
Initial Operational Capability
IOPS
Internet Official Protocol Standards
IOS
Internetworking Operating System
IP
In-Process
IP
Internet Protocol
IPC
Interprocess Communication Protocol
IPC
Information Protection centre
IPET
Information Protection Engineering Team
IPMEIR
Internet Protocol Security Minimum Essential Interoperability Requirements
IPPL
Information Technology Security Pre-qualified Products List
IPPP
Information Technology Security Product Pre-Qualification Program
IPPP
Information Technology Security Pre-Approved Products
IPRA
Internet Policy Registration Authority
IPSEC
Internet Protocol Security
IPV
International Partner Variant
IPv4
Internet Protocol version 4
IPv6
Internet Protocol version 6
IPX
Internet Packet Exchange
IR
Infrared
IRE
Information Resource Engineering
IRI
Issue Report Initiating
IRIG-B
Inter-Range Instrumentation Group B format
IRIS
Integrated Radio Information System
IRST
Inventory Reconciliation Status Transaction
IS
Information System
IS
Inspectable Space
IS
Interoperability Specification
ISAC
Isolation Systems Access Control
ISAKMP
Internet Security Association and Key Management Protocol
ISC
Interdepartmental Steering Committee
ISDN
Integrated Services Digital Network
ISM
Industrial Security Manual
ISM
Iridium Secure Mode
ISM
Industrial, Scientific and Medical Band
ISO
International Organization for Standardization
ISO/IEC
International Organization for Standardization/International Electrotechnical Commission
ISOC
Internet Society
ISP
Internet Service Provider
ISS
Internet Security Scanner
ISSAA
Information System Security Assurance Architecture
ISSM
Information System Security Manager
ISSO
Information Systems Security Officer
IT
Information Technology
ITAR
International Traffic in Arms Regulation (USA)
ITCP
Information Technology Continuity Planning
ITI
IT Infrastructure
ITIL
Information Technology Infrastructure Library
ITISPS
Information Technology Infrastructure Security and Protection Services
ITS
Information Technology Security
ITS AFU
Information Technology Security Approval For Use (CSE)
ITSA
Information Technology Security Alert (CSE)
ITSB
Information Technology Security Bulletin (CSE)
ITSC
Information Technology Security Coordinator
ITSC
Information Technology Security Committee
ITSCC
Information Technology Security Coordination Centre
ITSD
Information Technology Security Directorate (PWGSC)
ITSD
Information Technology Security Directive (CSE)
ITSEC
Information Technology Security Evaluation Criteria
ITSEC
Information Technology Security
ITSEM
Information Technology Security Evaluation Manual (Common Criteria)
ITSET
Information Technology Security Evaluation and Testing (Common Criteria)
ITSG
Information Technology Security Guidance (CSE)
ITSIRT
Information Technology Security Incidence Response Team
ITSLC
Information Technology Security Learning Centre
ITSPL
Information Technology Security Product List
ITSPSR
Information Technology Security Product System Report (CSE)
ITST
Information Technology Security Training
ITU
International Telecommunications Union (formerly CCITT)
ITU-T
ITU Telecommunication Standardization Sector
IUP
Internet Usage Policy
IV
Initialization Vector
IVRS
Internal Voice Recognition System
IW
Information Warfare
JITC
Joint Interoperability Test Command
JTRS
Joint Tactical Radio System
KB
Kilobyte
Kbps
Kilobit per second
KBps
Kilobyte per second
Kc
Ciphering Key
KCN
Key Conversion Notice
KDC
Key Distribution Centre
KDF
Key Derivation Function
KDM
Key Distribution Manager
KEA
Key Exchange Algorithm
KEK
Key Encryption Key
KEKL
Local Key Encryption Key
KEKM
Memory Key Encryption Key
KEKow
Key Encryption Key - Order Wire
KEKuc
Key Encryption Key - User Communications
Keymat
Keying Material
KG
Key Generator
KGM
Key Generation manager
KGS
Key Generation System
KHz
Kilohertz
Ki
Individual Subscriber Authentication Key
KLIF
Key Loading and Initialization Facility
KLIFMS
Key Loading and Initialization Facility Management Station
KMA
Key Management Authority
KMC
Key Management Centre
KMID
Key Management Infrastructure
KMID
Key Material IDentifier
KMP
Key Management Plan
KMSP
Key Material Support Plan
KOMPASS
Key Order Management/Production Accounting Software System
KP
Key Processor
KPF
Key Production Facility
KPK
Key Production Key
KPKI
Key Production Key Initial
KPKL
Local Key Production Key
KPS
Key Production System
KSD
Key Storage Device
KTE
Key Translation Element
KV
Key Variable
KVA
Kilovolt-amper
LAKMS
Local AEHF Key Management Station
LAN
Local Area Network
LANT
Atlantic Coverage for DAMA satellite system
LAR
Light Assault Radio
LCD
Liquid Crystal Dysplay
LCMS
Local COMSEC Management Software
LCP
Link Control Protocol
LDAP
Lightweight Directory Access Protocol
LDGID
Load Group Identifier
LEA
Law Enforcement Agency
LEA
Limited Exclusion Area
LEAD
Low-Cost Encryption Authentication Device
LED
Light Emitting Diode
LEF
Link Encryptor Family
LEF IS
Link Encryptor Family Interoperability Specification
LEP
List of Effective Pages
LFM
Log File Monitors
LGEC
Low Gain Earth Coverage
LIPC
Local Information Protection Centre
LIT
Line Interface Terminal
LKEK
Local Key Encryption Key
LLT
Low Latency Transport
LMD
Local Management Device
LMD/KP
Local Management Device / Key Processor
LOA
Letter Of Agreement
LOS
Line Of Sight
LPD
Line Printer Daemon
LPD
Low probability of detection
LPI
Low probability of intercept
LRA
Local Registration Authority
LX
Long Wavelength Optical Fiber
LYOU
Last Year Of Use
MA
Management Agent
MAC
Mandatory Access Control
MAC
Media Access Control
MAC
Message Authentication Code
MAD
Maximum Allowable Downtime
MAN
Metropolitan Area Network
MAPI
Messaging Application Programming Interface
MAXSL
Maximum Security Level
MB
Megabyte
MBITR
Multiband Inter/Intra Team Radio
Mbps
Megabit per second
MC
Memorandum to Cabinet
MCD
Malicious Code Defence
MCD&ID
Malicious Code Defence and Intrusion Detection
MD
Message Digest
MD5
Message Digest 5
MDAC
Microsoft Data Access Components
MDC
Mobile Data Communication
MDS
Mobile Data System (BlackBerry)
MELP
Mixed Excitation Linear Predictive
MG
Manuals and Guidelines
MHS
Message Handling System (X.400)
MHz
Megahertz
MIB
Management Information Base
MicroSD
Micro Secure Digital
MIDS-JTRS
Multifunctional Infromation Distribution System - Joint Tactical Radio System
MIL - STD
Military Standard
MILS
Multiple Independent Levels of Security
MIME
Multipurpose Internet Mail Extensions
MIMO
Multiple Input Multiple Output
MiniSD
Mini Secure Digital
MINSL
Minimum Security Level
MISPC
Minimum Interoperability Specification for PKI Components
MISSI
Multilevel Information System Security Initiative
MITS
Management of Information Technology Security
MK KEK
Manual Keying Key Encryption Key
MKEK
Master Key Encryption Key
MLA
Mail List Agent
MLD
Multicast Listener Discovery
MLDv1
Multicast Listener Discovery version 1
MLDv2
Multicast Listener Discovery version 2
MLPP
Multilevel Precedence and Pre-emption
MLS
Multi Level Security
MMS
Multimedia Messaging Service
MMSI
Meeting of Ministers on Security and Intelligence
MMT
Multi Media Terminal
MN
Management Node
Mo
Megaoctet
MOA
Memorandum of Agreement
MODEM
Modulate/Demodulate
MOSS
MIME Object Security Services
MOU
Memorandum of Understanding
MPD
Message Processing and Dispatching
MPE
Mission Planning Element
MPSS
Mission Planning Sub System
MPUP
Main Processor Update Program
MQV
Menezes-Qu-Vanstone
MR
Mutual Recognition Group (Common Criteria)
MS
Mobile Station
MS
Message Store (X.400)
MSC
Mobile Switching Centre
MS-DOS
Microsoft Disk Operating System
MSFR
Minimum Security Functional Requirement (Common Criteria)
MSK
Message Signature Key
MSL
Minimum Service Level
MSL
Multiple Security Level
MSP
Message Security Protocol
MSS
Mobile Satellite Service
MSSDE
Missions Specific Software Development Environment
MTA
Message Transfer Agent (X.400)
MTBF
Mean Time Between Failure
MTEK
Main Traffic Encryption Key
MTS
Mobile Telephone Service
MTS
Message Transfer System (X.400)
MTTR
Mean Time To Restore
MTU
Maximum Transmission Unit
MUX
Multiplexer
mW
Milliwatt
MWOD-A
HAVEQUICK Multiple Word of Day - Automatic
MWOD-M
HAVEQUICK Multiple Word of Day - Manual
NA
Network Administrator
NAI
National Affiliation Identifier
NAS
Network-Attached Storage
NAT
Network Address Translation
NATO
North Atlantic Treaty Organization
NAT-T
Network Address Translation - Traversal
NC
Network Controller
NCAT
National COMSEC Audit Team
NCD
Net Control Device
NCER
National Cryptographic Equipment Reserve
NCIAP
National Critical Infrastructure Assurance Program
NCIO
National COMSEC Incidents Office
NCMCS
National COMSEC Material Control System
NCOR
National Central Office of Record
NCP
Network Control Protocol
NCP
Novell Core Protocol
NCR
National Capital Region
NCS
Net Control Station
NCSA
National centre for Supercomputing Applications (USA)
NCSC
National Computer Security Centre (USA)
NDA
National Distribution Authority
NDP
Neighbor Discovery Protocol
NDS
Network Directory Service (Novell)
NES
Network Encryption System
NetBIOS
Network Basic Input Output System
NETCON
Net Controller
NetRPC
Network Remote Procedure Call (Banyan)
NETSEC
Network Security
NFC
Near Field Communication
NFK
Netted FIREFLY Key
NFR
Network Flight Recorder
NFS
Network File System
NIC
Network Interface Card
NIDS
Network Intrusion Detection System
NIPRNET
Non-Classified Internet Protocol Router Network (USA)
NIPS
Network Intrusion Prevention System
NIS
Network Information Service
NIST
National Institute of Standards and Technology (USA)
NITSM
National Information Technology Security Memoranda
NKMS
Net Key Management Server
NLZ
No Lone Zone
NMC
Network Management centre
NMP
Network Management Protocol
NMSO
National Master Standing Offer
NMT
Navy Multi-band Terminal
NNTP
Network News Transfer Protocol
NOS
Network Operating System
NPS
Not Physically Sighted
NRPL
NATO Recommended Product List
NSA
National Security Agency (USA)
NSF
National Science Foundation
NSM
Network Security Manager
NSN
Nortel Secure Networks
NSP
Network Service Provider
NSTISSAM
National Security Telecommunications and Information Systems Security Advisory Memoranda
NSTISSI
National Security Telecommunications and Information Systems Security Instructions
NT
Network Terminal
NT1
Non Type 1
NTP
Network Time Protocol
NVRAM
Non-Volatile Random Access Memory
OCSP
Online Certificate Status Protocol
ODBC
Open Database Connectivity
ODS
Optical Data
OECD
Organization for Economic Cooperation and Development
OEM
Original Equipment Manufacturer
OFB
Output FeedBack (DES mode)
OFDM
Orthogonal Frequency Division Multiplexing
OGD
Other Government Department
OID
Object Identifier
O-IO
Offensive Information Operation
OLE
Object Linking and Embedding
OLG
Other Levels of Government
OMC
Operations and Maintenance Centre
OO
Object Oriented
OOBKT
Out-Of-Band Key Transfer
OOP
Object Oriented Programming
OPM
Ordering Privilege Manager
OPN
Order Privilege Notice
OPSEC
Open Platform for Security
OPSEC
Operations Security
ORR
Operational Rekey Report
OS
Operating System
OSI
Open System Interconnection
OSPF
Open Shortest Path First
OSVBD
Operating System Vulnerability Database
OTAD
Over-the-Air Distribution
OTADD
Over-the-Air Data Distribution
OTAR
Over-the-Air Rekey
OTAT
Over-the-Air Key Transfer
OTNK
Over-The-Air Network Rekey
OTT
Office of Technical Threat
OTVA
On-site Technical Vulnerability Assessment
OZ
Operations Zone
P/L
Plain Language
PA
Privacy Act
PAB
Public Address Book
PABX
Private Automatic Branch Exchange
PAC
Pacific coverage for DAMA satellite system
PAC
Positive Access Control
PAN
Personal Area Network
PATA
Parallel Advanced Technology Attachment
PAZ
Public Access Zone
PBX
Private Branch Exchange
PC
Personal Computer
PC
Privacy Card
PCA
Policy Certification Authority (Europe)
PCCIP
Presidential Commission on Critical Infrastructure Protection
PCI
Peripheral Component Interconnect
PCM
Privilege Certificate Manager
PCMCIA
Personal Computer Memory Card International Association
PCO
Privy Council Office
PCS
Personal Communications Service
PCT
Private Communications Technology
PCW
Pulse Continuous Wave
PDA
Personal Digital Assistant
P-DARR
Prevention, Detection, Analysis, Response and Recovery
PDK
Private Decryption Key
PDR
Preliminary Design Review
PDS
Practice Dangerous to Security
PDS
Protected Distribution System
PDSO
Packet Data Security Overlay
PDT
Portable Data Terminal
PDU
Protocol Data Unit
PDUN
Peer Destination Unreachable Notification
PED
PIN Entry Device
PEM
Privacy Enhanced Mail
PER
Privilege Establishment Request
PET
<>Privacy Enhancing Technologies
PETPL
Potential Endorsed TEMPEST Products List
PFFW
Packet Filter Firewall
PGP
Pretty Good Privacy
PGS
Policy on Government Security
PHRD
Peer HAIPE Reachability Detection
PIA
Privacy Impact Assessment
PIB
Personal Information Bank
PIM
Personnel Information Management
PIN
Personal Identification Number
PIPEDA
Personal Information Protection and Electronic Documents Act
PIX
Private Internet Exchange
PKC
Public Key Cryptography
PKCS
Public Key Cryptography Standards (USA)
PKI
Public Key Infrastructure
PKI ACIMN
Public Key Infrastructure Automated Certificate Insurance Management Node
PKI MN
Public Key Infrastructure Management Node
PKIX
Public Key Infrastructure X.509
PKIX CMP
Public Key Interchange Certificate Management Protocol
PKM
Private Key Management
PLMN
Public Land Mobile Network
PMA
Policy Management Authority
Pmax
Maximum Power
PMBOK
Project Management Body of Knowledge
PMCS
Preventive Maintenance Checks and Services
PMI
Privilege Management Infrastructure
Pmin
Minimum Power
PMO
Project Management Office
PMP
Product Management Plan
PMTU
Path Maximum Transmission Unit
POC
Point Of Contact
POST
Power-On Self Test
POTS
Plain Old Telephone Service
PP
Protection Profile (Common Criteria)
PP/ST
Protection Profile/Security Target (Common Criteria)
PPE
Point-to-Point Encryption
PPK
Pre-placed Key
PPP
Policies, Practices and Procedures
PPP
Point to Point Protocol
PRI
Primary Rate Interface
PRNG
Pseudorandom Number Generator
PS
Public Safety Canada
PSAT
Public Safety and Anti-Terrorism
PSCIOC
Public Sector Chief Information Officers Council
PSEPC
Public Safety and Emergency Preparedness Canada
PSEQN
Payload Sequence Number
PSTN
Public Switched Telephone Network
PT
Plain text
PTP
Point-To-Point
PUB
Publication
PVC
Permanent Virtual Circuit
PVK
Public Verification Key
PWA
Printed Wiring Assembly
PWGSC
Public Works and Government Services Canada
PWGSC ICSD
Public Works and Government Services Canada Industrial and Corporate Security Directorate
PZ
Public Zone
QA
Quality Assurance
QKEK
Quadrant Key Encryption Key
QoS
Quality of Service
R&D
Research and Development
R&M
Repair and Maintenance
RA
Registration Authority
RADIUS
Remote Authentication Dial-In User Service
RAID
Redundant Array of Inexpensive (or Independent) Disks
RAM
Random Access Memory
RAMP
Rating Maintenance Phase (USA)
RAND
Random number
RARP
Reverse Address Resolution Protocol
RAS
Remote Access Server
RASKL
Really Simple Key Loader
RASP
Remote Access Security Program
RATS
Remote Access Trojans
RBAC
Role-Based Access Control
RC4
Rivest Cipher 4
RCMP
Royal Canadian Mounted Police
RCP
Remote Control Processor
RD-LAP
Radio Data-Link Access Procedure
RDS
RED Distribution System
REA
Red Equipment Area
REZ
Restricted Extranet Zone
RF
Radio Frequency
RFA
Relief From Accountability
RFC
Request for Comments
RFI
Radio Frequency Interference
RFID
Radio Frequency Identification
RFP
Request For Proposal
RIDS
Remote Intrusion Detection System
RIM®
Research in Motion (Limited)
RIP
Routing Information Protocol (TCP/IP, Novell)
RIPng
Routing Information Protocol Next Generation (TCP/IP, Novell)
RIPv1
Routing Information Protocol version 1 (TCP/IP, Novell)
RIPv6
Routing Information Protocol version 6 (TCP/IP, Novell)
RM
Rating Maintenance Phase (Canada)
RMA
Repair and Maintenance Activity
RMF
Risk Management Framework
ROM
Read Only Memory
RPC
Remote Procedure Call
RRB
Radio Re-Broadcast
RSA
Rivest-Shamir-Adleman; RSA algorithm
RTCP
Real-time Transport Control Protocol
RTP
Real-time Transport Protocol
RTP
Routing Table Protocol (Banyan)
RX
Receiver
RZ
Restricted Zone
S&I
Security and Intelligence
S/MIME
Secure/Multipurpose Internet Mail Extension
S^2
Software Signature
SA
Security Association
SA
Security Administrator
SA&A
Security Assessment and Authorization
SAA
Stateless Address Autoconfiguration
SACS
Secure Access Control System
SAD
Security Association Database
SAK
Secure Attention Key (Common Criteria)
SAKMS
Secure Applications and Key Management Service
SAMP
Suspicious Activity Monitoring Protocol
SAN
Storage Area Network
SAP
Service Advertising Protocol (Novell)
SAR
Specific Absortion Rate
SARK
Saville Advanced Remote Rekey
SATA
Serial Advanced Technology Attachment
SATAN
System Administration Tool for Analyzing Networks
SATCOM
Satellite Communication
SAZ
Special Access Zone
SBU
Sensitive-but-unclassified (USA)
SC ESM/DCC
Secure Channel Enterprise Security Management/Data Correlation and Consolidation
SC IDMCD
Secure Channel Intrusion Detection and Malicious Code Defence
SC SRM
Secure Channel Secure Remote Management
SCAP
Secure Content Automation Protocol
SCC
Standards Council of Canada
SCESM
Secure Channel Enterprise Security Management
SCI
Sensitive Compartmented Information
SCI SO
Sensitive Compartmented Information Security Officer
SCIF
Sensitive Compartmented Information Facility
SCIP
Secure Communications Interoperability Protocol
SCNet
Secure Channel Network
SCO UNIX
Santa Cruz Operations UNIX (Operating System)
SCS
Secure Conference System
SCSI
Small Computer System Interface
SDA
Sensitive Discussion Area
SDD
Secure Data Device
SDD
Secure Dynamic Discovery
SDLC
System Development Life Cycle
SDNS
Secure Data Network System
SDR
Software-Defined Radio
SDRAM
Synchronous Dynamic Random Access Memory
SDS
Secure Data Transfer Device 2000 System
SECAN
Military Committee Communications Security and Evaluation Agency NATO
SEIT
Security Evaluation and Inspection Team
SEP
Secure Exchange Protocol
SET
Secure Electronic Transaction
SF
Security Function (Common Criteria)
SFP
Small Form-Factor Pluggable
SFP
Security Function Policy (Common Criteria)
SFTP
Shielded Foil Twisted Pair
SFUG
Security Features Users Guide (Common Criteria)
SGSM
Sectéra Secure Wireless Phone for GSM
SGSN
Serving GPRS Support Node
SHA
Secure Hash Algorithm
SHGEC
Super High Gain Earth Coverage
SHS
Secure Hash Standard
s-http
Secure - Hyper Text Transfer Protocol
SIGINT
Signals Intelligence
SII
Strategic IM/IT Infrastructure Initiative
SIM
Subscriber Identity Module
SIN
Social Insurance Number
SINCGARS
Single Channel Ground and Airborne Radio System
SIP
Session Initiation Protocol
SIP
SINCGARS System Improvement Plan
SIPRNET
Secure Internet Protocol Router Network (USA)
SIV
System Integrity Identifier
SKCR
Seed Key Conversion Report
SKEK
Storage Key Encryption Key (now LKEK)
Skipjack
U.S. Key Escrow Encryption Algorithm
SKL
Simple Key Loader
SLIP
Serial Line Internet Protocol
SME PED
Secure Mobile Environment Portable Electronic Device
SMG
Secure Mail Guard
SMI
Security Management Infrastructure
SMP
Service Management Plan
SMS
Short Message Service
SMTP
Simple Mail Transfer Protocol
SNAC
Serial Number Accounting Control
SNMP
Simple Network Management Protocol
SNMPv2
Simple Network Management Protocol version 2
SNMPv3
Simple Network Management Protocol version 3
SNS
Secure Network Server
SNTP
Simple Network Time Protocol
SOC
Secure Operations Centre
SOCKS
SOCKet Secure Protocol
SOF
Strength of Function (Common Criteria)
SOI
Signal Operation Instruction
SOP
Standard Operating Procedure
SOQPSK
Shaped Offset Quadrature Phase Shift Keying
SOS
Statement of Sensitivity
SP
Security Policy
SP
Security Processor
SPD
Security Policy Database
SPIN
Security Policy Implementation Notice
SPIRS
SDNS PSTN-ISDN Rekey Subsystem
SPKM
Simple Public Key Mechanism
SPM
Security Policy Model
SPP
Sequenced Packet Protocol (Banyan)
SR
Sponsor Representatives (Common Criteria)
SRCL
Security Requirements Checklist
SRP
Server Relay Protocol
SRS
Security Requirements Statement
SSA
SIGINT Secure Area
SSB
Single Side Band
SSC
Shared Services Canada
SSD
Solid State Drive
SSE-CMM
System Security Engineering Capability Maturity Model
SSH
Secure Shell Protocol
SSID
Service Set Identifier
SSL
Secure Sockets Layer
SSO
Site Security Officer
SSO
System Security Officer
SSUPS
Solid State Uninterruptible Power Supply
ST
Security Target (Common Criteria)
ST&E
Security Testing and Evaluation
STAR
Short Title Assignment Requester
STD
Standard
STE
Secure Terminal Equipment
STP
Shielded Twisted Pair
STU-III
Secure Telephone Unit - Third Generation
SUB
Subnetwork
SVC
Switched Virtual Circuit
SVN
Secure Virtual Network
SW
Software
SWLAN
Secure Wireless Local Area Network
SWT
Sectéra Wireline Terminal
T1
1.56 Mbps
T1DSW
Type 1 Default Software
T3
44.736 Mbps
T3MD
Tier 3 Management Device
TA
Terminal Administrator
TA
Token Administrator
TACACS
Terminal Access Controller Access Control System
TAMPDET
Tamper Detect Signal
TAT
Technical Assessment Team
TBD
To be determined
TBITS
Treasury Board Information Technology Standards
TBS
Treasury Board Secretariat
TCA
TALON Communication Adapter
TCB
Trusted Computing Base
TCCCS
Tactical Command, Control, and Communications System
TCI
Technical COMSEC Inspection
TCP
Transmission Control Protocol
TCP/IP
Transmission Control Protocol/Internet Protocol
TCSE
Trusted Computer System Evaluation Criteria (USA)
TCT
TALON Cryptographic Token
TDD
Time Division Duplex
TDMA
Time Division Multiple Access
TEK
Traffic Encryption Key
TEKow
Traffic Encryption Key - Order Wire
TEKuc
Traffic Encryption Key - User Communications
TELCO
Telephone Company
TFC
TALON Fill Cable
TFM
Trusted Facility Manual (Common Criteria)
TFS
Traffic Flow Security
TFT
Thin Film Transistor
TFTP
Trivial File Transfer Protocol
THS
TALON Host Software
THz
Terahertz
TIS Toolkit
Trusted Information Systems Toolkit
TKIP
Temporal Key Integrity Protocol
TL
TACLANE
TLS
Transport Layer Security
TMD
Touch Memory Device
TNI
Trusted Network Interpretation (Common Criteria)
TOE
Target of Evaluation (Common Criteria)
TOGAF
The Open Group Architecture Framework
TPA
Terminal Privilege Authority
TPEP
Trusted Product Evaluation Program
TPI
Two-person Integrity
TRA
Threat and Risk Assessment
TRA
Transfer Report Receipt - All
TRANSEC
Transmission Security
TRI
Transfer Report Initiating
TRI
Transfer Report Receipt - Individual
Triple DES
Triple Data Encryption Standard
TrKEK
Transfer Key Encryption Key
TRR
Test and Readiness Review
TS
TOP SECRET
TSEC
Telecommunications Security
TSEGFW
Trusted Systems Environmental Guideline For Firewalls
TSF
Trusted Security Functions (synonymous with TCB)
TSG
Telephone Security Group
TSK
Transmission Security Key
TSP
TOE Security Policy (Common Criteria)
TSRD
Technical and Security Requirements Document
TSSIT
Technical Security Standards for Information Technology
TTS
Trusted Time Source
TVAC
Threat and Vulnerability Analysis Capability
TVAS
Threat and Vulnerability Analysis System
TX
Transmitter
U.S. KMS
United States Key Management System
U//FOUO
Unclassified//For Official Use Only
UA
User Agent (X.400)
UAA
Uncontrolled Access Area
UAS
User Application Software
UDF
User Data File
UDP
User Datagram Protocol
UHF
Ultra High Frequency
UMTS
Universal Mobile Telecommunications System
UPS
Uninterruptable Power Supply
URL
Uniform Resource Locator
USB
Universal Serial Bus
US-EKMS-CF
United States-Electronic Key Management System-Central Facility
User Rep
User Representative
USM
User-based Security Model
USRP
Universal Software Radio Peripheral
UUCP
UNIX-to-UNIX Copy Program
V2
Version 2
V3
Version 3
VA
Vulnerability Assessment
VCS
VERITAS Cluster Server
VDU
Video Docking Unit
VHF
Very High Frequency
VIP
Vines Internet Protocol (Banyan)
VLAN
Virtual Local Area Network
VLR
Visitor Location Register
VM
Virtual Machine
VME
Versa Module Eurocard
VoIP
Voice Over Internet Protocol; Voice over IP
VPN
Virtual Private Network
VSA
Vendor Security Analyst (Common Criteria)
VSWR
Voltage Standing Wave Ratio
WAE
Wireless Application Environment
WAIS
Wide-Area Information Server
WAN
Wide Area Network
Wang TIU
Wang Trusted Interface Unit
WAP
Wireless Access Protocol
W-CDMA
Wideband Code Division Multiple Access
WCMP
Wireless Control Message Protocol
WDP
Wireless Datagram Protocol
WEP
Wired Equivalent Privacy
WIDS
Wireless Intrusion Detection System
WiMAX
Worldwide Interoperability for Microwave Access
WIN-T
War-fighter Information Network - Tactical
WIPS
Wireless Intrusion Prevention System
WLAN
Wireless Local Area Network
WML
Wireless Markup Language
WPA
Wi-Fi Protected Access
WPA2
Wi-Fi Protected Access 2
WPAN
Wireless Personal Area Network
WSP
Wireless Session Protocol
WTA
Wireless Telephony Application
WTLS
Wireless Transport Layer Security
WTP
Wireless Transaction Protocol
WWAN
Wireless Wide Area Network
WWW
World Wide Web
X.400
Message Handling System described by the ITU-T X.400 Recommendations.
X.500
Directory Service described by the ITU-T X.500 Recommendations (X.500)
X.509
ITU-T standard format for public key certificates
ZIP
Zone Interface Point
Report a problem on this page

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Please select all that apply:

Thank you for your help!

You will not receive a reply. For enquiries, please contact us.

Date modified: