Course Acronyms
- Acronym or Initialism (E)
- Meaning (E)
- (C)NES
- Canadian Network Encryption System
- 1xRTT
- Single Carrier (1x) Radio Transmission Technology
- 3 DES
- Triple Data Encryption Standard
- A3
- GSM Authentication Algorithm
- A5
- GSM Data Encryption Algorithm
- A8
- GSM Cipher Key Generation Algorithm
- AA
- Alternate Assurances Group (Common Criteria)
- AAA
- Authentication, Authorization and Accounting
- AAD
- Auxiliary Account Data
- AC
- Alternating Current
- AC
- Automated Control
- ACCS
- AEHF Constellation Control Station
- ACES
- Automated Communication Engineering Software
- ACL
- Access Control List
- ACM
- Accountable COMSEC Material
- ACMCA
- Accountable COMSEC Material Control Agreement
- ACTS
- AEHF COMSEC/TRANSEC System
- Admin
- Administrator
- ADRL
- Agreement Data Requirements List
- AEHF
- Advanced Extremely High Frequency
- AES
- Advanced Encryption Standard
- AF
- Application Filter
- AFIS
- Automated Fingerprint Identification System
- AFU
- Approval For Use
- AIDS
- Application-Based Intrusion Detection System
- AIS
- Automated Information System
- AK
- Automatic Keying
- AK KEK
- Automatic Keying Key Encryption Key
- AK/RV
- Automatic Rekey/Receive Key
- AKA
- Authentication & Key Agreement
- AKEK
- ACCORDION Key Encryption Key
- AKLIF
- AEHF key Loading and Initialization Facility
- ALC
- Accounting Legend Code
- ALE
- Automatic Link Establishment
- ALKMS
- AEHF Local Key Management Station
- AM
- Amplitude Modulation
- AMES
- Aerospace, Marines and Electronics Systems
- AMP
- Alternate MAC/PHY
- AMPS
- Advanced Mobile Phone Service/System
- ANDVT
- Advanced Narrowband Digital Voice Terminal
- ANSI
- American National Standards Institute
- ANST
- Active Network Security Testing
- AP
- Access Point
- AP
- Application Process
- API
- Application Programming Interface
- APPK
- Authenticated Pre-placed Key
- ARDIS
- Advanced Radio Data Information Services
- ARL
- Authority Revocation List
- ARP
- Address Resolution Protocol
- ASCII
- American Standard Code for Information Exchange
- ASIS
- American Society for Industrial Security
- ASMCS
- AEHF Satellite Mission Control System
- ASN
- Access Service Network
- ASN
- Advance Shipping Notice
- ASN.1
- Abstract Syntax Notation.1
- ASOC
- AEHF Satellilte Operations centre
- ATE
- Automated Test Equipment
- ATIA
- Access to Information Act
- ATIP
- Access to Information and Privacy
- ATM
- Asynchronous Transfer Mode
- AU
- Authentic User
- AU
- Authorized User
- AuC
- Authentication Centre
- AUI
- Attachment Unit Interface
- Auth ID
- Authorized Identification
- BCP
- Business Continuity Plan
- BCPC
- Business Continuity Plan Coordinator
- BD_ADDR
- Bluetooth Device Address
- BDI
- Black Digital Interface
- BDSA
- Border Directory Server Agent
- BEA
- Black Equipment Area
- BES
- BlackBerry Enterprise Server™
- BET
- Bulk Encrypted Transaction
- BF
- Benign Fill
- BFF
- Basic FIREFLY
- BGP
- Border Gateway Protocol
- BIA
- Business Impact Analysis
- BID
- British Inter-Departmental
- BIOS
- Basic Input Output System
- BIP
- Bit Interleaved Parity
- BIS
- BlackBerry Internet Service
- BIT
- Built-In-Test
- BLP
- Bell and LaPadula
- Bluetooth SIG
- Bluetooth Special Interest Group
- BPSK
- Binary Phase Shift Keying
- BREW
- Binary Run-Time Environment for Wireless
- BRI
- Basic Rate Interface
- BRP
- Business Resumption Plan
- BS
- Base Station
- BSC
- Base Station Controller
- BSD
- Berkeley Software Distribution
- BSS
- Basic Service Set
- BSS
- Broadcast Satellite Service
- BSSID
- Basic Service Set Identifier
- BTS
- Base Transceiver Station
- BWA
- Broadband Wireless Access
- C&A
- Certification and Accreditation
- CA
- Canadian
- CA
- Certification Authority
- CA
- COMSEC Authority
- CA
- Controlling Authority
- CA&S
- Conceptual Architecture and Strategy
- CAA
- Controlled Access Area
- CAC
- Consolidated Analysis Capability
- CAC
- Common Access Cards
- CAD
- Common Account Data
- CAKMS
- Central AEHF Key Mangement System
- CANCERT
- Term replaced by CERT-CA
- CARDS
- COMSEC Accounting, Reporting and Distribution System
- CAST
- Carlisle Adams and Stafford Tavares (Encryption Algorithm)
- CAT
- Core Architecture Team
- CAW
- Certification Authority Workstation
- CB
- Certification Body
- CBC
- Cipher Block Chaining (DES mode)
- CBEA
- Controlled Black Equipment Area
- CBI
- Certificate Based Infrastructure
- CBT
- Computer Based Training
- CC
- Common Criteria
- CCA
- Circuit Card Assembly
- CCCS
- Canadian Common Criteria Scheme
- CCD
- Canadian Cryptographic Doctrine
- CCEB
- Combined Communications-Electronics Board
- CCEB
- Common Criteria Editorial Board
- CCEF
- Common Criteria Evaluation Facility
- CCEP
- Commercial COMSEC Endorsement Program
- CCF
- Canadian Central Facility
- CCF KPF
- Canadian Central Facility Key Production Facility
- CCI
- Controlled Cryptographic Item
- CCIB
- Common Criteria Implementation Board
- CCIMB
- Common Criteria Implementation Management Board
- CCITS
- Common Criteria for Information Technology Security Evaluation
- CCITT
- Consultative Committee for International Telegraph and Telephone
- CCMP
- Canadian Cryptographic Management Program
- CCPL
- Canadian Certified Product List
- CCRA
- Arrangement on the Recognition of Common Criteria Certificates
- CCS
- Common Criteria Evaluation Certification Scheme
- CCTP
- Common Criteria Testing Program
- CCTV
- Closed Circuit Television
- CD
- Compact Disk
- CDA
- Crypto Distributing Authority
- CDA
- Certificate Distribution Agent
- CDC
- Computing Devices Canada
- CDH
- COMSEC/TRANSEC Integrated Circuit/DS-101 Hybrid
- CDMA
- Code Division Multiple Access
- CDR
- Critical Design Review
- CDRL
- Contract Data Requirements List
- CD-ROM
- Compact Disc-Read Only Memory
- CDT
- Cancel Distribution Transaction
- CE
- Compromising Emanation
- CEAP
- Cryptographic Endorsement and Assessment Program
- CEM
- Common Methodology for Information Technology Security Evaluation (Common Criteria)
- CEO
- Canadian Eyes Only
- CEOI
- Communications and Electronics Operating Instructions
- CEP
- Cryptographic Endorsement Program
- CEPAF
- COMSEC equipment Purchase Authorization Form
- CEPL
- CSE Evaluated Products List
- CEPL
- Canadian Evaluated Products List
- CERF
- COMSEC Equipment Requirement Form
- CEROFF
- Crypto Equipment Rapid Off-line
- CERT
- A trademark of Carnegie Mellon University that is licensed to authorized CSIRT. No longer treated as an acronym.
- CERT-CA
- An alternative name for the National CSIRT role of the Cyber Centre.
- CERT/CC
- Computer Emergency Response Team Coordination Centre
- CESG
- Communications and Electronic Security Group (UK)
- CF
- Canadian Forces
- CF
- Central Facility (USA)
- CF
- Computer Forensics
- CF CONOP
- Computer Forensics Concept of Operations
- CFB
- Cipher FeedBack (DES mode)
- CFCSU
- Canadian Forces Crypto Support Unit
- CFD
- Common Fill Device
- CFI
- Computer Forensics Investigation
- CFIOG
- Canadian Forces Information Operations Group
- CFIOG/IPC
- Canadian Forces Information Operations Group/Information Protection Centre
- CFPB
- Canadian Federal PKI Bridge
- CFSS
- Canadian Forces Supply System
- CGI
- Common Gateway Interface
- chkdat
- Check data
- CHVP
- Cryptographic High Value Product
- CI
- Compartmented Information
- CIA
- Confidentiality, Integrity and Availability
- CIAA
- Confidentiality, Integrity, Availability and Accountability
- CIAS
- Canadian INFOSEC Accounting System
- CIC
- Citizenship and Immigration Canada
- CICA
- CSE Industrial COMSEC Account
- CID
- Canadian Inter-Departmental Document
- CIDF
- Common Intrusion Detection Framework
- CIDR
- Classless Inter-Domain Routing
- CIISD
- Canadian and International Industrial Security Directorate
- CIK
- Crypto Ignition Key
- CIM
- Compromised Information Message
- CIO
- Chief Information Officer
- CIP
- Critical Infrastructure Protection
- CIPR
- CSE INFOSEC Product Review (CSE)
- CIPTF
- Critical Information Protection Task Force
- CITP
- Canadian Industrial TEMPEST Program
- CKL
- Compromised Key List
- CKMU
- Canadian Key Management Unit
- CLEF
- Commercial Licensed Evaluation Facility
- CLI
- Command Line Interface
- CM
- Cryptographic Module
- CMAC
- Crypto Material Assistance Centre
- CMART
- COMSEC Material Accounting and Reporting Tool
- CMB
- Configuration Management Board
- CMCM
- COMSEC Material Control Manual
- CMD
- Cryptographic Module Document (Common Criteria)
- CMI
- Certificate Management Infrastructure
- CMM
- Capability Maturity Model
- CMMS
- Crypto Material Management System
- CMR
- COMSEC Material Report
- CMS
- Certificate Management Services
- CMT
- Configuration Management
- CMVP
- Cryptographic Module Validation Program
- CMW
- Compartmented Mode Workstation
- CN
- Controlled Network Access
- CNR
- Combat Net Radio
- CNR(P)
- Combat Net Radio (Primary)
- CNSS
- Committee on National Security Systems
- CNSSAM
- Committee on National Security System Advisory Memorandum
- CNSSI
- Committee on National Security System Instructions
- COI
- Community of Interest
- COMINT
- Communications Intelligence
- COMPUSEC
- Computer Security
- COMSEC
- Communications Security
- CONOP
- Concept of Operations
- COPS
- The Computer Oracle and Password System
- COR
- Central Office of Record
- COTS
- Commercial-Off-The-Shelf
- CP
- Certificate Policy
- CPO
- Client/Partner Operations
- CPRM
- Content Protection for Removable Media
- CPS
- Certification Practice Statement
- CPU
- Central Processing Unit
- CRC
- Cyclic Redundancy Check
- CRK
- Cryptographic Recovery Key
- CRL
- Certificate Revocation List
- CRN
- Confirmation/Rejection Notice
- Crypto
- Cryptographic
- CRYPTOSEC
- Cryptographic Security
- CS
- Controlled Space
- CS1
- Commercial Security Protection Profile #1 (ITSS)
- CS3
- Commercial Security Protection Profile #3 (ITSS)
- CSA
- Cognizant Security Authority
- CSC
- COMSEC Safeguarding Capability
- CSC
- Communications-Electronics Security Committee
- CSD
- Circuit Switched Data
- CSE
- Communications Security Establishment Canada
- CSI
- Computer Security Institute (USA)
- CSIRT
- Computer Security Incident Response Team
- CSIS
- Canadian Security Intelligence Service
- CSMA/CA
- Carrier Sense Multiple Access with Collision Avoidance
- CSMA/CD
- Carrier Sense Multiple Access with Collision Detection
- CSMI
- Classified Security Management Infrastructure
- CSN
- Connectivity Service Network
- CSO
- Company Security Officer
- CSR
- Certificate Signing Request
- CSSC
- Canadian System Security Centre
- CT
- Cypher Text
- CTCPEC
- Canadian Trusted Computer Product Evaluation Criteria
- CTIC
- COMSEC/TRANSEC Integrated Circuit
- CUAS
- Common User Application Software
- CUP
- COMSEC User Portal
- CVE
- Commercially Verified Equipment
- CVE
- Common Vulnerabilities and Exposures
- CVSS
- Common Vulnerabilities Scoring System
- CW
- Continuous Wave
- DA
- Distributing/Distribution Authority
- DA
- Developmental Assurance (Common Criteria)
- DAC
- Discretionary Access Control
- DACAN
- Distribution and Accounting Agency NATO
- DAD
- Duplicate Address Detection
- DAL
- Developmental Assurance Level (Common Criteria)
- DAMA
- Demand Assigned Multiple Access
- DAO
- Department/Agency/Organization
- DAP
- Directory Access Protocol
- DAR
- Data At Rest
- DARI
- Detect, Analyze, and Response Infrastructure
- DARI FOC
- DARI Full Operational Capability
- DARPA
- Defence Advanced Research Projects Agency
- DAT
- Digital Audio Tape
- DAV
- Distinguished Attribute Value (X.500)
- dB
- Decibel
- DBA
- Database Administrator
- dBm
- Decibel-milliwatt
- DC
- Direct Current
- DC
- Distributed Control
- DCA
- Departmental COMSEC Authority
- DCC
- Data Correlation and Consolidation
- DCDC
- DND Crypto Distribution Centre
- DCE
- Distributed Computing Environment
- DCOM
- Distributed-Component Object Model
- DCOR
- DND Central Office of Record
- DDoS
- Distributed Denial of Service
- DDSM
- Directive on Department Security Management
- DEK
- Data Encryption Key
- DEK-KEK
- Data Encryption Key - Key Encryption Key
- DEKM
- Data Encryption Key Memory
- DEKMS
- DACAN Electronic Key Management System
- DePAC
- Decrypt Positive Access Control
- DEQPSK
- Differentially Encoded Quadrature Phase Shift Keying
- DES
- Data Encryption Standard
- DFATD
- Department of Foreign Affairs Trade and Development
- DHCP
- Dynamic Host Configuration Protocol
- DIAS
- Distributed INFOSEC Accounting System
- DIB
- Directory Information Base
- DID
- Data Item Description
- D-IO
- Defensive IO (Information Operation)
- DISA
- Defence Information Systems Agency
- DISP
- Directory Information Shadowing Protocol
- DIT
- Directory Information Tree
- DLL
- Dynamic Link Library
- DMD
- Data Management Device
- DMZ
- De-Militarized Zone
- DN
- Distinguished Name
- DND
- Department of National Defence
- DNS
- Domain Name System
- DOCCT/S
- DAMA Order Wire Channel Control Trainer/Simulator
- DoD
- Department of Defense (USA)
- DoS
- Denial of Service
- DOS
- Disk Operating System
- DRA/Tacfire
- Data Rate Adapter/Tactical Fire
- DS
- Direct Sales
- DSA
- Digital Signature Algorithm
- DSA
- Directory System Agent
- DSC
- Digital Signature Certificate
- DSC
- Document Safeguarding Capability
- DSE
- Digital Signature Entity
- DSL
- Digital Subscriber line
- DSO
- Departmental Security Officer
- DSP
- Directory System Protocol
- DSS
- Digital Signature Standard
- DSS
- Digital Spread Spectrum
- DSSS
- Direct Sequence Spread Spectrum
- DTD
- Data Transfer Device
- DTE
- Data Terminal Equipment
- DUA
- Directory User Agent
- DVD
- Digital Versatile Disk
- EA
- Enterprise Architecture
- EAA
- Electronic Authorization and Authentication
- EAL
- Evaluation Assurance Level (Common Criteria)
- EAP
- Employee Assistance Program
- EC
- Electronic Commerce
- ECB
- Electronic CodeBook (DES mode)
- ECC
- Elliptic Curve Cryptography
- ECC
- Enhanced Cryptographic Card
- ECCM
- Electronic Counter-Counter Measure
- ECDH
- Elliptic Curve Diffie-Hellman
- ECDSA
- Elliptic Curve Digital Signature Algorithm
- ECM
- Electronic Counter Measure
- ECN
- Explicit Congestion Notification
- ECU
- End Crypto Unit
- EDGE
- Enhanced Data rates for GSM Evolution
- EDI
- Electronic Data Interchange
- EDP
- Electronic Data Processing
- EDP
- Emergency Destruction Plan
- EE
- End-Entity
- EED
- Electro-Explosive Device
- EEE
- End-to-end Encryption
- EEPROM
- Electrically Erasable Programmable Read-Only Memory
- EFE
- Encase Forensic Edition
- EFF
- Enhanced FIREFLY
- EFFVS
- Enhanced FIREFLY Vector Set
- EFS
- Encrypting File System
- EFT
- Electronic Funds Transfer
- EIDE
- Enhanced Integrated Drive Electronics
- EIGRP
- Enhanced Interior Gateway Routing Protocol
- EIR
- Equipment Identity Register
- EK
- Exclusion Key
- EKDL
- Electronic Key Destruction List
- EKE
- Exponential Key Exchange
- EKM
- Electronic Key Management
- EKMS
- Electronic Key Management System
- EKR
- Electronic Key Replacement
- EM
- Encryptor Manager
- EMA
- Eclypt Management Application
- EMC
- Electromagnetic Compatibility
- EMI
- Electromagnetic Interference
- EMR
- Electromagnetic Radiation
- EMSEC
- Emission Security
- EMT
- Extruded or Electrical Metal Tubing
- ENET
- Ethernet
- EPL
- Evaluated Products List
- EPROM
- Erasable Programmable Read-Only Memory
- EPS
- Enhanced Polar System
- ERTZ
- Equipment Radiation TEMPEST Zone
- ESA
- Enhanced Subscriber Authentication
- ESA
- Enterprise Security Architecture
- ESC
- Extremely Sensitive COMSEC
- ESD
- Electronic Services Delivery
- ESM
- Enterprise Security Management
- ESN
- Electronic Serial Number
- ESP
- Encapsulating Security Payload (Ipv6)
- ESP
- Enhanced Subscriber Policy
- ESPv1
- Encapsulating Security Payload (Ipv6) version 1
- ESPv3
- Encapsulating Security Payload (Ipv6) version 3
- ESS
- Extended Service Set
- ET
- Entrust Technologies
- ET
- Transmitted Electric Field
- ETPL
- Endorsed TEMPEST Products List
- ETPP
- Endorsed TEMPEST Products Program
- ETSI
- European Telecommunications Standards Institute
- ETSSP
- Endorsed TEMPEST Support Service Program
- EUT
- Equipment Under Test
- E-Vault
- Electronic Vault
- EV-DO
- Evolution-Data Only
- EV-DV
- Evolution-Data and Voice
- F&PCA
- Functional and Physical Configuration Audit
- FAA
- Financial Administration Act
- FAC
- Foreign Affairs Canada
- FAX
- Facsimile
- FCC
- Federal Communications Commission (USA)
- FDD
- Frequency Division Duplex
- FDDI
- Fiber-Distributed Data Interface
- FDMA
- Frequency Division Multiple Access
- FDT
- Field Data Terminal
- FEK
- File Encryption Key
- FF
- FIREFLY
- FFVS
- FIREFLY Vector Set
- FHS
- Frequency Hopping Sequence
- FHSS
- Frequency Hopping Spread Spectrum
- FI
- File Integrity
- FIPC
- Federal Information Protection Centre
- FIPS
- Federal Information Processing Standard (USA)
- FIREFLY
- Key management protocol based on public key cryptography
- FM
- Frequency Modulation
- FMS
- Foreign Military Sales
- FNBDT
- Future Narrow Band Digital Terminal
- FOC
- Full Operational Capability
- FOCI
- Foreign Ownership, Control and Influence
- FOD
- Foreign Ownership or Dominance
- FOUO
- For Official Use Only (USA)
- FPGA
- Field Programmable Gate Array
- FPL
- Fixed Packet Length
- FR
- Field Reprogrammability
- FSC
- Facility Security Clearance
- FSS
- Fixed Satellite Service
- FSU
- Field Software Upgrade
- FSU
- Field Software Upgrade
- FTP
- File Transfer Protocol
- FTR
- Field Tamper Recovery
- FY
- Fiscal Year
- Gbps
- Gigabit per second
- GC
- Government of Canada
- GC CBI
- Government of Canada Certificate Based Infrastructure
- GC EKMS
- Government of Canada Electronic Key Management System
- GC PKI
- Government of Canada Public Key Infrastructure
- GC-CIRT
- Government of Canada Computer Incident Response Team
- GCKDF
- Generalized Concatenated Key Derivation Function
- GCM
- Galois/Counter Mode
- GDC
- Generic Discovery Client
- GEA1, GEA2
- GPRS Encryption Algorithms
- GEDS
- Government Electronic Directory Service
- GEM
- General Dynamics Encryptor Manager
- GESC
- Government Electronic Services Card
- GFE
- Government Furnished Equipment
- GFF
- Generic Fill Format
- GGSN
- Gateway GPRS Support Node
- GHz
- Gigahertz
- GIDO
- Generic Intrusion Detection Options
- GIDS
- Gateway Intrusion Detection System
- GIG
- Global Information Grid
- GKP
- GFF Key Packages
- GMITS
- Guidelines for the Management of IT Security
- GOL
- Government on-line
- GPRS
- General Packet Radio Service
- GPS
- Global Positioning System
- GRE
- Generic Routing Encapsulation
- GSM
- Global System for Mobile Communications
- GSP
- Government Security Policy
- GSS
- Generic Security Services
- GTIS
- Government Telecommunications and Informatics Services
- GUI
- Graphical User Interface
- H2HKT
- HAIPE-to-HAIPE Key Transfer
- HA
- High Availability
- HAA
- High Availability Architecture
- HAC
- Host Authorization Code
- HACP
- High Assurance Cryptographic Product
- HAGAR
- High Assurance Guidelines and Requirements
- HAIPE
- High Assurance Internet Protocol Encryptor
- HAIPE IS
- High Assurance Internet Protocol Encryptor Interoperability Specification
- HAM
- Host Authentication Module
- HCI
- Host Control Interface
- HCI
- Highest Classification Indicator
- HCP
- Hardened Cable Path
- HDD
- Hard Disk Drive
- HDML
- Handheld Device Markup Language
- Hdr
- Header
- HEMP
- High Altitude Electromagnetic Pulse
- HF
- High Frequency
- HGEC
- High Gain Earth Coverage
- HI/DR
- Handling Instructions/Disposition Record
- HIDS
- Host-Based Intrusion Detection System
- HIPS
- Host-Based Intrusion Prevention System
- HLR
- Home Location Register
- HMAC
- Hash Message Authentication Code
- HMI
- Human-Machine Interface
- HPW
- High Performance Waveform
- HQ
- Headquarters
- HR
- Human Resources
- HRCA
- High Resolution Coverage Area
- HRZ
- Highly Restricted Zone
- HSDPA
- Hign Speed Downlink Packet Access
- HSPA
- High Speed Packet Access
- HSRP
- Hot Standby Router Protocol
- HTML
- Hypertext Markup Language
- HTRA
- Harmonized Threat Risk Assessment
- HTTP
- Hypertext Transfer Protocol
- HTTPS
- Hypertext Transfer Protocol over SSL/TLS
- HUB
- Hold Up Battery
- HUMINT
- Human Intelligence
- HW
- Hardware
- Hz
- Hertz
- I&A
- Identification and Authentication
- I&V
- Identification and Validation
- IAB
- Internet Activities Board
- IANA
- Internet Assigned Numbers Authority
- IAP
- Interim Authority to Process
- IATF
- Information Assurance Technical Framework
- IBKT
- In-Band Key Transfer
- IBSS
- Independent Basic Service Set Network
- IC
- Integrated Circuit
- ICD
- Interface Control Document
- ICMCM
- Industrial COMSEC Material Control Manual
- ICMP
- Internet Control Message Protocol
- ICMPv6
- Internet Control Message Protocol version 6
- ICOM
- Integrated Communications Security
- ICSD
- Industrial & Corporate Security Directorate
- ICSI
- Interdepartmental Committee on Security and Intelligence
- ICV
- Integrity Check Value
- ID
- Identification
- IDART
- Information Design Assurance Red Team
- IDC
- International Data Corporation
- IDC
- Intrusion Detection Centre
- IDEA
- International Data Encryption Algorithm
- iDEN
- Integrated Digital Enhanced Network
- IDES
- Intrusion Detection Expert System
- IDIQ
- Indefinite Delivery Indefinite Quantity
- IDS
- Intrusion Detection System
- IDUP
- Independent Data Unit Protection
- IEC
- International Electrotechnical Commission
- IEEE
- Institute of Electrical and Electronics Engineers
- IEKMS
- International Electronic Key Management System
- IERA
- Information Technology Security Evaluation & Risk Assessment
- IET
- Individual Encrypted Transaction
- IETF
- Internet Engineering Task Force
- IGMP
- Internet Group Management Protocol
- IGMPv1
- Internet Group Management Protocol version 1
- IGMPv2
- Internet Group Management Protocol version 2
- IIP
- Information Infrastructure Protection
- IIPTF
- Information Infrastructure Protection Technical Framework
- IIS
- Internet Information Server
- IKD
- Individual Key Distribution
- IKE
- Internet Key Exchange
- IKEK
- Initialization Key Encryption Key
- IKEv2
- Internet Key Exchange version 2
- IKMS
- IRIS Key Management System
- IM
- Instant Messaging
- IMEI
- International Mobile Equipment Identity
- IM-PEPD
- Implicit Peer Enclave Prefix Discovery
- IMSI
- International Mobile Station Identity
- INE
- In-line Network Encryptor
- INFOSEC
- Information Security
- INWG
- Internetworking Working Group
- IO
- Information Operation
- IOC
- Initial Operational Capability
- IOPS
- Internet Official Protocol Standards
- IOS
- Internetworking Operating System
- IP
- In-Process
- IP
- Internet Protocol
- IPC
- Interprocess Communication Protocol
- IPC
- Information Protection centre
- IPET
- Information Protection Engineering Team
- IPMEIR
- Internet Protocol Security Minimum Essential Interoperability Requirements
- IPPL
- Information Technology Security Pre-qualified Products List
- IPPP
- Information Technology Security Product Pre-Qualification Program
- IPPP
- Information Technology Security Pre-Approved Products
- IPRA
- Internet Policy Registration Authority
- IPSEC
- Internet Protocol Security
- IPV
- International Partner Variant
- IPv4
- Internet Protocol version 4
- IPv6
- Internet Protocol version 6
- IPX
- Internet Packet Exchange
- IR
- Infrared
- IRE
- Information Resource Engineering
- IRI
- Issue Report Initiating
- IRIG-B
- Inter-Range Instrumentation Group B format
- IRIS
- Integrated Radio Information System
- IRST
- Inventory Reconciliation Status Transaction
- IS
- Information System
- IS
- Inspectable Space
- IS
- Interoperability Specification
- ISAC
- Isolation Systems Access Control
- ISAKMP
- Internet Security Association and Key Management Protocol
- ISC
- Interdepartmental Steering Committee
- ISDN
- Integrated Services Digital Network
- ISM
- Industrial Security Manual
- ISM
- Iridium Secure Mode
- ISM
- Industrial, Scientific and Medical Band
- ISO
- International Organization for Standardization
- ISO/IEC
- International Organization for Standardization/International Electrotechnical Commission
- ISOC
- Internet Society
- ISP
- Internet Service Provider
- ISS
- Internet Security Scanner
- ISSAA
- Information System Security Assurance Architecture
- ISSM
- Information System Security Manager
- ISSO
- Information Systems Security Officer
- IT
- Information Technology
- ITAR
- International Traffic in Arms Regulation (USA)
- ITCP
- Information Technology Continuity Planning
- ITI
- IT Infrastructure
- ITIL
- Information Technology Infrastructure Library
- ITISPS
- Information Technology Infrastructure Security and Protection Services
- ITS
- Information Technology Security
- ITS AFU
- Information Technology Security Approval For Use (CSE)
- ITSA
- Information Technology Security Alert (CSE)
- ITSB
- Information Technology Security Bulletin (CSE)
- ITSC
- Information Technology Security Coordinator
- ITSC
- Information Technology Security Committee
- ITSCC
- Information Technology Security Coordination Centre
- ITSD
- Information Technology Security Directorate (PWGSC)
- ITSD
- Information Technology Security Directive (CSE)
- ITSEC
- Information Technology Security Evaluation Criteria
- ITSEC
- Information Technology Security
- ITSEM
- Information Technology Security Evaluation Manual (Common Criteria)
- ITSET
- Information Technology Security Evaluation and Testing (Common Criteria)
- ITSG
- Information Technology Security Guidance (CSE)
- ITSIRT
- Information Technology Security Incidence Response Team
- ITSLC
- Information Technology Security Learning Centre
- ITSPL
- Information Technology Security Product List
- ITSPSR
- Information Technology Security Product System Report (CSE)
- ITST
- Information Technology Security Training
- ITU
- International Telecommunications Union (formerly CCITT)
- ITU-T
- ITU Telecommunication Standardization Sector
- IUP
- Internet Usage Policy
- IV
- Initialization Vector
- IVRS
- Internal Voice Recognition System
- IW
- Information Warfare
- JITC
- Joint Interoperability Test Command
- JTRS
- Joint Tactical Radio System
- KB
- Kilobyte
- Kbps
- Kilobit per second
- KBps
- Kilobyte per second
- Kc
- Ciphering Key
- KCN
- Key Conversion Notice
- KDC
- Key Distribution Centre
- KDF
- Key Derivation Function
- KDM
- Key Distribution Manager
- KEA
- Key Exchange Algorithm
- KEK
- Key Encryption Key
- KEKL
- Local Key Encryption Key
- KEKM
- Memory Key Encryption Key
- KEKow
- Key Encryption Key - Order Wire
- KEKuc
- Key Encryption Key - User Communications
- Keymat
- Keying Material
- KG
- Key Generator
- KGM
- Key Generation manager
- KGS
- Key Generation System
- KHz
- Kilohertz
- Ki
- Individual Subscriber Authentication Key
- KLIF
- Key Loading and Initialization Facility
- KLIFMS
- Key Loading and Initialization Facility Management Station
- KMA
- Key Management Authority
- KMC
- Key Management Centre
- KMID
- Key Management Infrastructure
- KMID
- Key Material IDentifier
- KMP
- Key Management Plan
- KMSP
- Key Material Support Plan
- KOMPASS
- Key Order Management/Production Accounting Software System
- KP
- Key Processor
- KPF
- Key Production Facility
- KPK
- Key Production Key
- KPKI
- Key Production Key Initial
- KPKL
- Local Key Production Key
- KPS
- Key Production System
- KSD
- Key Storage Device
- KTE
- Key Translation Element
- KV
- Key Variable
- KVA
- Kilovolt-amper
- LAKMS
- Local AEHF Key Management Station
- LAN
- Local Area Network
- LANT
- Atlantic Coverage for DAMA satellite system
- LAR
- Light Assault Radio
- LCD
- Liquid Crystal Dysplay
- LCMS
- Local COMSEC Management Software
- LCP
- Link Control Protocol
- LDAP
- Lightweight Directory Access Protocol
- LDGID
- Load Group Identifier
- LEA
- Law Enforcement Agency
- LEA
- Limited Exclusion Area
- LEAD
- Low-Cost Encryption Authentication Device
- LED
- Light Emitting Diode
- LEF
- Link Encryptor Family
- LEF IS
- Link Encryptor Family Interoperability Specification
- LEP
- List of Effective Pages
- LFM
- Log File Monitors
- LGEC
- Low Gain Earth Coverage
- LIPC
- Local Information Protection Centre
- LIT
- Line Interface Terminal
- LKEK
- Local Key Encryption Key
- LLT
- Low Latency Transport
- LMD
- Local Management Device
- LMD/KP
- Local Management Device / Key Processor
- LOA
- Letter Of Agreement
- LOS
- Line Of Sight
- LPD
- Line Printer Daemon
- LPD
- Low probability of detection
- LPI
- Low probability of intercept
- LRA
- Local Registration Authority
- LX
- Long Wavelength Optical Fiber
- LYOU
- Last Year Of Use
- MA
- Management Agent
- MAC
- Mandatory Access Control
- MAC
- Media Access Control
- MAC
- Message Authentication Code
- MAD
- Maximum Allowable Downtime
- MAN
- Metropolitan Area Network
- MAPI
- Messaging Application Programming Interface
- MAXSL
- Maximum Security Level
- MB
- Megabyte
- MBITR
- Multiband Inter/Intra Team Radio
- Mbps
- Megabit per second
- MC
- Memorandum to Cabinet
- MCD
- Malicious Code Defence
- MCD&ID
- Malicious Code Defence and Intrusion Detection
- MD
- Message Digest
- MD5
- Message Digest 5
- MDAC
- Microsoft Data Access Components
- MDC
- Mobile Data Communication
- MDS
- Mobile Data System (BlackBerry)
- MELP
- Mixed Excitation Linear Predictive
- MG
- Manuals and Guidelines
- MHS
- Message Handling System (X.400)
- MHz
- Megahertz
- MIB
- Management Information Base
- MicroSD
- Micro Secure Digital
- MIDS-JTRS
- Multifunctional Infromation Distribution System - Joint Tactical Radio System
- MIL - STD
- Military Standard
- MILS
- Multiple Independent Levels of Security
- MIME
- Multipurpose Internet Mail Extensions
- MIMO
- Multiple Input Multiple Output
- MiniSD
- Mini Secure Digital
- MINSL
- Minimum Security Level
- MISPC
- Minimum Interoperability Specification for PKI Components
- MISSI
- Multilevel Information System Security Initiative
- MITS
- Management of Information Technology Security
- MK KEK
- Manual Keying Key Encryption Key
- MKEK
- Master Key Encryption Key
- MLA
- Mail List Agent
- MLD
- Multicast Listener Discovery
- MLDv1
- Multicast Listener Discovery version 1
- MLDv2
- Multicast Listener Discovery version 2
- MLPP
- Multilevel Precedence and Pre-emption
- MLS
- Multi Level Security
- MMS
- Multimedia Messaging Service
- MMSI
- Meeting of Ministers on Security and Intelligence
- MMT
- Multi Media Terminal
- MN
- Management Node
- Mo
- Megaoctet
- MOA
- Memorandum of Agreement
- MODEM
- Modulate/Demodulate
- MOSS
- MIME Object Security Services
- MOU
- Memorandum of Understanding
- MPD
- Message Processing and Dispatching
- MPE
- Mission Planning Element
- MPSS
- Mission Planning Sub System
- MPUP
- Main Processor Update Program
- MQV
- Menezes-Qu-Vanstone
- MR
- Mutual Recognition Group (Common Criteria)
- MS
- Mobile Station
- MS
- Message Store (X.400)
- MSC
- Mobile Switching Centre
- MS-DOS
- Microsoft Disk Operating System
- MSFR
- Minimum Security Functional Requirement (Common Criteria)
- MSK
- Message Signature Key
- MSL
- Minimum Service Level
- MSL
- Multiple Security Level
- MSP
- Message Security Protocol
- MSS
- Mobile Satellite Service
- MSSDE
- Missions Specific Software Development Environment
- MTA
- Message Transfer Agent (X.400)
- MTBF
- Mean Time Between Failure
- MTEK
- Main Traffic Encryption Key
- MTS
- Mobile Telephone Service
- MTS
- Message Transfer System (X.400)
- MTTR
- Mean Time To Restore
- MTU
- Maximum Transmission Unit
- MUX
- Multiplexer
- mW
- Milliwatt
- MWOD-A
- HAVEQUICK Multiple Word of Day - Automatic
- MWOD-M
- HAVEQUICK Multiple Word of Day - Manual
- NA
- Network Administrator
- NAI
- National Affiliation Identifier
- NAS
- Network-Attached Storage
- NAT
- Network Address Translation
- NATO
- North Atlantic Treaty Organization
- NAT-T
- Network Address Translation - Traversal
- NC
- Network Controller
- NCAT
- National COMSEC Audit Team
- NCD
- Net Control Device
- NCER
- National Cryptographic Equipment Reserve
- NCIAP
- National Critical Infrastructure Assurance Program
- NCIO
- National COMSEC Incidents Office
- NCMCS
- National COMSEC Material Control System
- NCOR
- National Central Office of Record
- NCP
- Network Control Protocol
- NCP
- Novell Core Protocol
- NCR
- National Capital Region
- NCS
- Net Control Station
- NCSA
- National centre for Supercomputing Applications (USA)
- NCSC
- National Computer Security Centre (USA)
- NDA
- National Distribution Authority
- NDP
- Neighbor Discovery Protocol
- NDS
- Network Directory Service (Novell)
- NES
- Network Encryption System
- NetBIOS
- Network Basic Input Output System
- NETCON
- Net Controller
- NetRPC
- Network Remote Procedure Call (Banyan)
- NETSEC
- Network Security
- NFC
- Near Field Communication
- NFK
- Netted FIREFLY Key
- NFR
- Network Flight Recorder
- NFS
- Network File System
- NIC
- Network Interface Card
- NIDS
- Network Intrusion Detection System
- NIPRNET
- Non-Classified Internet Protocol Router Network (USA)
- NIPS
- Network Intrusion Prevention System
- NIS
- Network Information Service
- NIST
- National Institute of Standards and Technology (USA)
- NITSM
- National Information Technology Security Memoranda
- NKMS
- Net Key Management Server
- NLZ
- No Lone Zone
- NMC
- Network Management centre
- NMP
- Network Management Protocol
- NMSO
- National Master Standing Offer
- NMT
- Navy Multi-band Terminal
- NNTP
- Network News Transfer Protocol
- NOS
- Network Operating System
- NPS
- Not Physically Sighted
- NRPL
- NATO Recommended Product List
- NSA
- National Security Agency (USA)
- NSF
- National Science Foundation
- NSM
- Network Security Manager
- NSN
- Nortel Secure Networks
- NSP
- Network Service Provider
- NSTISSAM
- National Security Telecommunications and Information Systems Security Advisory Memoranda
- NSTISSI
- National Security Telecommunications and Information Systems Security Instructions
- NT
- Network Terminal
- NT1
- Non Type 1
- NTP
- Network Time Protocol
- NVRAM
- Non-Volatile Random Access Memory
- OCSP
- Online Certificate Status Protocol
- ODBC
- Open Database Connectivity
- ODS
- Optical Data
- OECD
- Organization for Economic Cooperation and Development
- OEM
- Original Equipment Manufacturer
- OFB
- Output FeedBack (DES mode)
- OFDM
- Orthogonal Frequency Division Multiplexing
- OGD
- Other Government Department
- OID
- Object Identifier
- O-IO
- Offensive Information Operation
- OLE
- Object Linking and Embedding
- OLG
- Other Levels of Government
- OMC
- Operations and Maintenance Centre
- OO
- Object Oriented
- OOBKT
- Out-Of-Band Key Transfer
- OOP
- Object Oriented Programming
- OPM
- Ordering Privilege Manager
- OPN
- Order Privilege Notice
- OPSEC
- Open Platform for Security
- OPSEC
- Operations Security
- ORR
- Operational Rekey Report
- OS
- Operating System
- OSI
- Open System Interconnection
- OSPF
- Open Shortest Path First
- OSVBD
- Operating System Vulnerability Database
- OTAD
- Over-the-Air Distribution
- OTADD
- Over-the-Air Data Distribution
- OTAR
- Over-the-Air Rekey
- OTAT
- Over-the-Air Key Transfer
- OTNK
- Over-The-Air Network Rekey
- OTT
- Office of Technical Threat
- OTVA
- On-site Technical Vulnerability Assessment
- OZ
- Operations Zone
- P/L
- Plain Language
- PA
- Privacy Act
- PAB
- Public Address Book
- PABX
- Private Automatic Branch Exchange
- PAC
- Pacific coverage for DAMA satellite system
- PAC
- Positive Access Control
- PAN
- Personal Area Network
- PATA
- Parallel Advanced Technology Attachment
- PAZ
- Public Access Zone
- PBX
- Private Branch Exchange
- PC
- Personal Computer
- PC
- Privacy Card
- PCA
- Policy Certification Authority (Europe)
- PCCIP
- Presidential Commission on Critical Infrastructure Protection
- PCI
- Peripheral Component Interconnect
- PCM
- Privilege Certificate Manager
- PCMCIA
- Personal Computer Memory Card International Association
- PCO
- Privy Council Office
- PCS
- Personal Communications Service
- PCT
- Private Communications Technology
- PCW
- Pulse Continuous Wave
- PDA
- Personal Digital Assistant
- P-DARR
- Prevention, Detection, Analysis, Response and Recovery
- PDK
- Private Decryption Key
- PDR
- Preliminary Design Review
- PDS
- Practice Dangerous to Security
- PDS
- Protected Distribution System
- PDSO
- Packet Data Security Overlay
- PDT
- Portable Data Terminal
- PDU
- Protocol Data Unit
- PDUN
- Peer Destination Unreachable Notification
- PED
- PIN Entry Device
- PEM
- Privacy Enhanced Mail
- PER
- Privilege Establishment Request
- PET
- <>Privacy Enhancing Technologies
- PETPL
- Potential Endorsed TEMPEST Products List
- PFFW
- Packet Filter Firewall
- PGP
- Pretty Good Privacy
- PGS
- Policy on Government Security
- PHRD
- Peer HAIPE Reachability Detection
- PIA
- Privacy Impact Assessment
- PIB
- Personal Information Bank
- PIM
- Personnel Information Management
- PIN
- Personal Identification Number
- PIPEDA
- Personal Information Protection and Electronic Documents Act
- PIX
- Private Internet Exchange
- PKC
- Public Key Cryptography
- PKCS
- Public Key Cryptography Standards (USA)
- PKI
- Public Key Infrastructure
- PKI ACIMN
- Public Key Infrastructure Automated Certificate Insurance Management Node
- PKI MN
- Public Key Infrastructure Management Node
- PKIX
- Public Key Infrastructure X.509
- PKIX CMP
- Public Key Interchange Certificate Management Protocol
- PKM
- Private Key Management
- PLMN
- Public Land Mobile Network
- PMA
- Policy Management Authority
- Pmax
- Maximum Power
- PMBOK
- Project Management Body of Knowledge
- PMCS
- Preventive Maintenance Checks and Services
- PMI
- Privilege Management Infrastructure
- Pmin
- Minimum Power
- PMO
- Project Management Office
- PMP
- Product Management Plan
- PMTU
- Path Maximum Transmission Unit
- POC
- Point Of Contact
- POST
- Power-On Self Test
- POTS
- Plain Old Telephone Service
- PP
- Protection Profile (Common Criteria)
- PP/ST
- Protection Profile/Security Target (Common Criteria)
- PPE
- Point-to-Point Encryption
- PPK
- Pre-placed Key
- PPP
- Policies, Practices and Procedures
- PPP
- Point to Point Protocol
- PRI
- Primary Rate Interface
- PRNG
- Pseudorandom Number Generator
- PS
- Public Safety Canada
- PSAT
- Public Safety and Anti-Terrorism
- PSCIOC
- Public Sector Chief Information Officers Council
- PSEPC
- Public Safety and Emergency Preparedness Canada
- PSEQN
- Payload Sequence Number
- PSTN
- Public Switched Telephone Network
- PT
- Plain text
- PTP
- Point-To-Point
- PUB
- Publication
- PVC
- Permanent Virtual Circuit
- PVK
- Public Verification Key
- PWA
- Printed Wiring Assembly
- PWGSC
- Public Works and Government Services Canada
- PWGSC ICSD
- Public Works and Government Services Canada Industrial and Corporate Security Directorate
- PZ
- Public Zone
- QA
- Quality Assurance
- QKEK
- Quadrant Key Encryption Key
- QoS
- Quality of Service
- R&D
- Research and Development
- R&M
- Repair and Maintenance
- RA
- Registration Authority
- RADIUS
- Remote Authentication Dial-In User Service
- RAID
- Redundant Array of Inexpensive (or Independent) Disks
- RAM
- Random Access Memory
- RAMP
- Rating Maintenance Phase (USA)
- RAND
- Random number
- RARP
- Reverse Address Resolution Protocol
- RAS
- Remote Access Server
- RASKL
- Really Simple Key Loader
- RASP
- Remote Access Security Program
- RATS
- Remote Access Trojans
- RBAC
- Role-Based Access Control
- RC4
- Rivest Cipher 4
- RCMP
- Royal Canadian Mounted Police
- RCP
- Remote Control Processor
- RD-LAP
- Radio Data-Link Access Procedure
- RDS
- RED Distribution System
- REA
- Red Equipment Area
- REZ
- Restricted Extranet Zone
- RF
- Radio Frequency
- RFA
- Relief From Accountability
- RFC
- Request for Comments
- RFI
- Radio Frequency Interference
- RFID
- Radio Frequency Identification
- RFP
- Request For Proposal
- RIDS
- Remote Intrusion Detection System
- RIM®
- Research in Motion (Limited)
- RIP
- Routing Information Protocol (TCP/IP, Novell)
- RIPng
- Routing Information Protocol Next Generation (TCP/IP, Novell)
- RIPv1
- Routing Information Protocol version 1 (TCP/IP, Novell)
- RIPv6
- Routing Information Protocol version 6 (TCP/IP, Novell)
- RM
- Rating Maintenance Phase (Canada)
- RMA
- Repair and Maintenance Activity
- RMF
- Risk Management Framework
- ROM
- Read Only Memory
- RPC
- Remote Procedure Call
- RRB
- Radio Re-Broadcast
- RSA
- Rivest-Shamir-Adleman; RSA algorithm
- RTCP
- Real-time Transport Control Protocol
- RTP
- Real-time Transport Protocol
- RTP
- Routing Table Protocol (Banyan)
- RX
- Receiver
- RZ
- Restricted Zone
- S&I
- Security and Intelligence
- S/MIME
- Secure/Multipurpose Internet Mail Extension
- S^2
- Software Signature
- SA
- Security Association
- SA
- Security Administrator
- SA&A
- Security Assessment and Authorization
- SAA
- Stateless Address Autoconfiguration
- SACS
- Secure Access Control System
- SAD
- Security Association Database
- SAK
- Secure Attention Key (Common Criteria)
- SAKMS
- Secure Applications and Key Management Service
- SAMP
- Suspicious Activity Monitoring Protocol
- SAN
- Storage Area Network
- SAP
- Service Advertising Protocol (Novell)
- SAR
- Specific Absortion Rate
- SARK
- Saville Advanced Remote Rekey
- SATA
- Serial Advanced Technology Attachment
- SATAN
- System Administration Tool for Analyzing Networks
- SATCOM
- Satellite Communication
- SAZ
- Special Access Zone
- SBU
- Sensitive-but-unclassified (USA)
- SC ESM/DCC
- Secure Channel Enterprise Security Management/Data Correlation and Consolidation
- SC IDMCD
- Secure Channel Intrusion Detection and Malicious Code Defence
- SC SRM
- Secure Channel Secure Remote Management
- SCAP
- Secure Content Automation Protocol
- SCC
- Standards Council of Canada
- SCESM
- Secure Channel Enterprise Security Management
- SCI
- Sensitive Compartmented Information
- SCI SO
- Sensitive Compartmented Information Security Officer
- SCIF
- Sensitive Compartmented Information Facility
- SCIP
- Secure Communications Interoperability Protocol
- SCNet
- Secure Channel Network
- SCO UNIX
- Santa Cruz Operations UNIX (Operating System)
- SCS
- Secure Conference System
- SCSI
- Small Computer System Interface
- SDA
- Sensitive Discussion Area
- SDD
- Secure Data Device
- SDD
- Secure Dynamic Discovery
- SDLC
- System Development Life Cycle
- SDNS
- Secure Data Network System
- SDR
- Software-Defined Radio
- SDRAM
- Synchronous Dynamic Random Access Memory
- SDS
- Secure Data Transfer Device 2000 System
- SECAN
- Military Committee Communications Security and Evaluation Agency NATO
- SEIT
- Security Evaluation and Inspection Team
- SEP
- Secure Exchange Protocol
- SET
- Secure Electronic Transaction
- SF
- Security Function (Common Criteria)
- SFP
- Small Form-Factor Pluggable
- SFP
- Security Function Policy (Common Criteria)
- SFTP
- Shielded Foil Twisted Pair
- SFUG
- Security Features Users Guide (Common Criteria)
- SGSM
- Sectéra Secure Wireless Phone for GSM
- SGSN
- Serving GPRS Support Node
- SHA
- Secure Hash Algorithm
- SHGEC
- Super High Gain Earth Coverage
- SHS
- Secure Hash Standard
- s-http
- Secure - Hyper Text Transfer Protocol
- SIGINT
- Signals Intelligence
- SII
- Strategic IM/IT Infrastructure Initiative
- SIM
- Subscriber Identity Module
- SIN
- Social Insurance Number
- SINCGARS
- Single Channel Ground and Airborne Radio System
- SIP
- Session Initiation Protocol
- SIP
- SINCGARS System Improvement Plan
- SIPRNET
- Secure Internet Protocol Router Network (USA)
- SIV
- System Integrity Identifier
- SKCR
- Seed Key Conversion Report
- SKEK
- Storage Key Encryption Key (now LKEK)
- Skipjack
- U.S. Key Escrow Encryption Algorithm
- SKL
- Simple Key Loader
- SLIP
- Serial Line Internet Protocol
- SME PED
- Secure Mobile Environment Portable Electronic Device
- SMG
- Secure Mail Guard
- SMI
- Security Management Infrastructure
- SMP
- Service Management Plan
- SMS
- Short Message Service
- SMTP
- Simple Mail Transfer Protocol
- SNAC
- Serial Number Accounting Control
- SNMP
- Simple Network Management Protocol
- SNMPv2
- Simple Network Management Protocol version 2
- SNMPv3
- Simple Network Management Protocol version 3
- SNS
- Secure Network Server
- SNTP
- Simple Network Time Protocol
- SOC
- Secure Operations Centre
- SOCKS
- SOCKet Secure Protocol
- SOF
- Strength of Function (Common Criteria)
- SOI
- Signal Operation Instruction
- SOP
- Standard Operating Procedure
- SOQPSK
- Shaped Offset Quadrature Phase Shift Keying
- SOS
- Statement of Sensitivity
- SP
- Security Policy
- SP
- Security Processor
- SPD
- Security Policy Database
- SPIN
- Security Policy Implementation Notice
- SPIRS
- SDNS PSTN-ISDN Rekey Subsystem
- SPKM
- Simple Public Key Mechanism
- SPM
- Security Policy Model
- SPP
- Sequenced Packet Protocol (Banyan)
- SR
- Sponsor Representatives (Common Criteria)
- SRCL
- Security Requirements Checklist
- SRP
- Server Relay Protocol
- SRS
- Security Requirements Statement
- SSA
- SIGINT Secure Area
- SSB
- Single Side Band
- SSC
- Shared Services Canada
- SSD
- Solid State Drive
- SSE-CMM
- System Security Engineering Capability Maturity Model
- SSH
- Secure Shell Protocol
- SSID
- Service Set Identifier
- SSL
- Secure Sockets Layer
- SSO
- Site Security Officer
- SSO
- System Security Officer
- SSUPS
- Solid State Uninterruptible Power Supply
- ST
- Security Target (Common Criteria)
- ST&E
- Security Testing and Evaluation
- STAR
- Short Title Assignment Requester
- STD
- Standard
- STE
- Secure Terminal Equipment
- STP
- Shielded Twisted Pair
- STU-III
- Secure Telephone Unit - Third Generation
- SUB
- Subnetwork
- SVC
- Switched Virtual Circuit
- SVN
- Secure Virtual Network
- SW
- Software
- SWLAN
- Secure Wireless Local Area Network
- SWT
- Sectéra Wireline Terminal
- T1
- 1.56 Mbps
- T1DSW
- Type 1 Default Software
- T3
- 44.736 Mbps
- T3MD
- Tier 3 Management Device
- TA
- Terminal Administrator
- TA
- Token Administrator
- TACACS
- Terminal Access Controller Access Control System
- TAMPDET
- Tamper Detect Signal
- TAT
- Technical Assessment Team
- TBD
- To be determined
- TBITS
- Treasury Board Information Technology Standards
- TBS
- Treasury Board Secretariat
- TCA
- TALON Communication Adapter
- TCB
- Trusted Computing Base
- TCCCS
- Tactical Command, Control, and Communications System
- TCI
- Technical COMSEC Inspection
- TCP
- Transmission Control Protocol
- TCP/IP
- Transmission Control Protocol/Internet Protocol
- TCSE
- Trusted Computer System Evaluation Criteria (USA)
- TCT
- TALON Cryptographic Token
- TDD
- Time Division Duplex
- TDMA
- Time Division Multiple Access
- TEK
- Traffic Encryption Key
- TEKow
- Traffic Encryption Key - Order Wire
- TEKuc
- Traffic Encryption Key - User Communications
- TELCO
- Telephone Company
- TFC
- TALON Fill Cable
- TFM
- Trusted Facility Manual (Common Criteria)
- TFS
- Traffic Flow Security
- TFT
- Thin Film Transistor
- TFTP
- Trivial File Transfer Protocol
- THS
- TALON Host Software
- THz
- Terahertz
- TIS Toolkit
- Trusted Information Systems Toolkit
- TKIP
- Temporal Key Integrity Protocol
- TL
- TACLANE
- TLS
- Transport Layer Security
- TMD
- Touch Memory Device
- TNI
- Trusted Network Interpretation (Common Criteria)
- TOE
- Target of Evaluation (Common Criteria)
- TOGAF
- The Open Group Architecture Framework
- TPA
- Terminal Privilege Authority
- TPEP
- Trusted Product Evaluation Program
- TPI
- Two-person Integrity
- TRA
- Threat and Risk Assessment
- TRA
- Transfer Report Receipt - All
- TRANSEC
- Transmission Security
- TRI
- Transfer Report Initiating
- TRI
- Transfer Report Receipt - Individual
- Triple DES
- Triple Data Encryption Standard
- TrKEK
- Transfer Key Encryption Key
- TRR
- Test and Readiness Review
- TS
- TOP SECRET
- TSEC
- Telecommunications Security
- TSEGFW
- Trusted Systems Environmental Guideline For Firewalls
- TSF
- Trusted Security Functions (synonymous with TCB)
- TSG
- Telephone Security Group
- TSK
- Transmission Security Key
- TSP
- TOE Security Policy (Common Criteria)
- TSRD
- Technical and Security Requirements Document
- TSSIT
- Technical Security Standards for Information Technology
- TTS
- Trusted Time Source
- TVAC
- Threat and Vulnerability Analysis Capability
- TVAS
- Threat and Vulnerability Analysis System
- TX
- Transmitter
- U.S. KMS
- United States Key Management System
- U//FOUO
- Unclassified//For Official Use Only
- UA
- User Agent (X.400)
- UAA
- Uncontrolled Access Area
- UAS
- User Application Software
- UDF
- User Data File
- UDP
- User Datagram Protocol
- UHF
- Ultra High Frequency
- UMTS
- Universal Mobile Telecommunications System
- UPS
- Uninterruptable Power Supply
- URL
- Uniform Resource Locator
- USB
- Universal Serial Bus
- US-EKMS-CF
- United States-Electronic Key Management System-Central Facility
- User Rep
- User Representative
- USM
- User-based Security Model
- USRP
- Universal Software Radio Peripheral
- UUCP
- UNIX-to-UNIX Copy Program
- V2
- Version 2
- V3
- Version 3
- VA
- Vulnerability Assessment
- VCS
- VERITAS Cluster Server
- VDU
- Video Docking Unit
- VHF
- Very High Frequency
- VIP
- Vines Internet Protocol (Banyan)
- VLAN
- Virtual Local Area Network
- VLR
- Visitor Location Register
- VM
- Virtual Machine
- VME
- Versa Module Eurocard
- VoIP
- Voice Over Internet Protocol; Voice over IP
- VPN
- Virtual Private Network
- VSA
- Vendor Security Analyst (Common Criteria)
- VSWR
- Voltage Standing Wave Ratio
- WAE
- Wireless Application Environment
- WAIS
- Wide-Area Information Server
- WAN
- Wide Area Network
- Wang TIU
- Wang Trusted Interface Unit
- WAP
- Wireless Access Protocol
- W-CDMA
- Wideband Code Division Multiple Access
- WCMP
- Wireless Control Message Protocol
- WDP
- Wireless Datagram Protocol
- WEP
- Wired Equivalent Privacy
- WIDS
- Wireless Intrusion Detection System
- WiMAX
- Worldwide Interoperability for Microwave Access
- WIN-T
- War-fighter Information Network - Tactical
- WIPS
- Wireless Intrusion Prevention System
- WLAN
- Wireless Local Area Network
- WML
- Wireless Markup Language
- WPA
- Wi-Fi Protected Access
- WPA2
- Wi-Fi Protected Access 2
- WPAN
- Wireless Personal Area Network
- WSP
- Wireless Session Protocol
- WTA
- Wireless Telephony Application
- WTLS
- Wireless Transport Layer Security
- WTP
- Wireless Transaction Protocol
- WWAN
- Wireless Wide Area Network
- WWW
- World Wide Web
- X.400
- Message Handling System described by the ITU-T X.400 Recommendations.
- X.500
- Directory Service described by the ITU-T X.500 Recommendations (X.500)
- X.509
- ITU-T standard format for public key certificates
- ZIP
- Zone Interface Point
- Date modified: