Network Security
Network Security
September 2009
Karen Scarfone
Victoria Thompson
System and Network Security Acronyms
NIST Interagency Report 7581 and Abbreviations
September 2009
Karen Scarfone
Victoria Thompson
C O M P U T E R S E C U R I T Y
Computer Security Division
Information Technology Laboratory
National Institute of Standards and Technology
Gaithersburg, MD 20899-8930
September 2009
The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology
(NIST) promotes the U.S. economy and public welfare by providing technical leadership for the nation’s
measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of
concept implementations, and technical analysis to advance the development and productive use of
information technology. ITL’s responsibilities include the development of technical, physical,
administrative, and management standards and guidelines for the cost-effective security and privacy of
sensitive unclassified information in Federal computer systems. This Interagency Report discusses ITL’s
research, guidance, and outreach efforts in computer security and its collaborative activities with industry,
government, and academic organizations.
ii
SYSTEM AND NETWORK SECURITY ACRONYMS AND ABBREVIATIONS
Acknowledgments
The authors, Karen Scarfone of the National Institute of Standards and Technology (NIST) and Victoria
Thompson of Booz Allen Hamilton, wish to thank their colleagues who reviewed drafts of this report,
particularly Liz Lennon and Tim Grance of NIST. Thanks also go to individuals and organizations that
submitted suggestions, particularly Tim Kramer, Mark Seecof, Janine Paris, the U.S. Department of
Energy, and the U.S. Department of State. The authors also thank their colleagues who created acronym
and abbreviation lists for their publications that were subsequently used as sources of information for this
report.
Trademark Information
Note to Reviewers
Reviewers are encouraged to submit additional acronyms and abbreviations related to system and network
security, particularly for emerging technologies, for consideration as additions to this report. All
suggestions and corrections should be sent to [email protected].
iii
SYSTEM AND NETWORK SECURITY ACRONYMS AND ABBREVIATIONS
Table of Contents
1. Introduction ...................................................................................................................... 1
iv
SYSTEM AND NETWORK SECURITY ACRONYMS AND ABBREVIATIONS
1. Introduction
This report contains a list of selected acronyms and abbreviations for system and network security terms
with their generally accepted or preferred definitions. It is intended as a resource for federal agencies and
other users of system and network security publications.
The capitalization, spelling, and definitions of acronyms and abbreviations frequently vary among
publications. It is easy to understand why this happens. While some acronyms and abbreviations (e.g.,
WWW) have one universally recognized and understood definition within the domain of system and
network security, others (e.g., IA, MAC) have multiple valid definitions depending upon the context in
which they are used. Some acronyms bear little resemblance to their definitions, such as Modes of
Operation Validation System for the Triple DES Algorithm (TMOVS). Others use unexpected
capitalization or spelling (e.g., Electronic Business using eXtensible Markup Language [ebXML] and
Organisation for Economic Co-operation and Development [OECD]). As a result, acronyms,
abbreviations, and their definitions may be inaccurately or inconsistently defined by authors, perpetuating
errors and confusing or misleading readers.
This report is meant to help reduce these errors and confusion by providing the generally accepted or
preferred definitions of a list of frequently used acronyms and abbreviations. The list does not include all
system and network security terms, nor is it a compendium of every acronym and abbreviation found in
system and network security documents published by NIST. Readers should refer to each document’s list
of acronyms and abbreviations (typically found in an appendix) for definitions applicable to that
particular document.
The following conventions have been used in the preparation of the list of acronyms and abbreviations in
this report.
Abbreviations and acronyms generally appear in all capital letters, although there are occasional
exceptions—for example, meter (m) and decibels referenced to one milliwatt (dBm).
Technical terms are not capitalized unless they are proper nouns. Names of people, places, and
groups, and the titles of protocols, standards, and algorithms are considered proper nouns. For
example, certification and accreditation (C&A) is not capitalized, but Advanced Encryption Standard
(AES) is capitalized.
Collective nouns are not capitalized (e.g., wide area network [WAN]).
When two or more definitions of the same acronym or abbreviation are given, the acronym or
abbreviation is italicized and repeated for each definition. Definitions are listed alphabetically.
1
SYSTEM AND NETWORK SECURITY ACRONYMS AND ABBREVIATIONS
This section consists of a list of selected system and network security acronyms and abbreviations, along
with their generally accepted definitions. When there are multiple definitions for a single term, the
acronym or abbreviation is italicized and each definition is listed separately.
Numeric
2
SYSTEM AND NETWORK SECURITY ACRONYMS AND ABBREVIATIONS
B2B business-to-business
BCP best current practice
BCP business continuity plan
BGP Border Gateway Protocol
BGP-4 Border Gateway Protocol 4
BIA Bump-in-the-API
BIA business impact analysis
BioAPI Biometric Application Programming Interface
BIOS basic input/output system
BITS Bump-in-the-Stack
BPML Business Process Modeling Language
BPSS Business Process Specification Schema
BRP business recovery (resumption) plan
BS base station
BSC base station controller
BSI British Standards Institution
BSIA British Security Industry Association
BSP best security practice
BSS basic service set
BSSID basic service set identifier
BTNS better-than-nothing-security
BTS base transceiver station
BU binding update
BUA binding update acknowledgement
3
SYSTEM AND NETWORK SECURITY ACRONYMS AND ABBREVIATIONS
4
SYSTEM AND NETWORK SECURITY ACRONYMS AND ABBREVIATIONS
5
SYSTEM AND NETWORK SECURITY ACRONYMS AND ABBREVIATIONS
DA destination address
DAA designated accrediting authority
DAA designated approving authority
DAC discretionary access control
DAD duplicate address detection
DAML DARPA Agent Markup Language
D-AMPS Digital Advanced Mobile Phone Service
DAO Data Access Object
DARPA Defense Advanced Research Projects Agency
dBm decibels referenced to one milliwatt
DBMS database management system
DC domain controller
DCE Distributed Computing Environment
DCOM Distributed Component Object Model
DCS distributed control system
DDMS Department of Defense Metadata Specification
DDoS distributed denial of service
DEA Data Encryption Algorithm
DEP Data Execution Prevention
DES Data Encryption Standard
DFS Distributed File System
DFS dynamic frequency selection
DH Diffie-Hellman
DHAAD Dynamic Home Agent Address Discovery
DHCP Dynamic Host Configuration Protocol
DHCPv6 Dynamic Host Configuration Protocol for Internet Protocol v6
DHS U.S. Department of Homeland Security
DIMS Digital Identity Management Service
DISA U.S. Defense Information Systems Agency
DLL dynamic link library
DMA direct memory access
DMZ demilitarized zone
DN distinguished name
DN domain name
DNP Distributed Network Protocol
DNS domain name system
DNSBL Domain Name System Blacklist
DNSSEC Domain Name System Security Extensions
DOC U.S. Department of Commerce
DoD U.S. Department of Defense
6
SYSTEM AND NETWORK SECURITY ACRONYMS AND ABBREVIATIONS
7
SYSTEM AND NETWORK SECURITY ACRONYMS AND ABBREVIATIONS
8
SYSTEM AND NETWORK SECURITY ACRONYMS AND ABBREVIATIONS
9
SYSTEM AND NETWORK SECURITY ACRONYMS AND ABBREVIATIONS
GR graceful restart
GRE Generic Routing Encapsulation
GRS General Records Schedule
GS1 Global Standards One
GSA U.S. General Services Administration
GSM Global System for Mobile Communications
GTC Generic Token Card
GTEK group traffic encryption key
GTK group temporal key
gTLD generic top-level domain
GTSM Generalized TTL Security Mechanism
GUI graphical user interface
HA high availability
HA home agent
HAG high assurance guard
HCI host controller interface
HERF hazards of electromagnetic radiation to fuel
HERO hazards of electromagnetic radiation to ordnance
HERP hazards of electromagnetic radiation to personnel
HF high frequency
HFS Hierarchical File System
HHS U.S. Department of Health and Human Services
HINFO host information
HIP Host Identity Protocol
HIPAA Health Insurance Portability and Accountability Act
HIPERLAN high-performance radio local area network
HKLM HKEY_Local_Machine
HL7 Health Level Seven
HMAC keyed-hash message authentication code
HMI human-machine interface
HPA host protected area
HPFS High-Performance File System
HR human resources
HSARPA Homeland Security Advanced Research Projects Agency
HSPD Homeland Security Presidential Directive
HTCIA High Technology Crime Investigation Association
HTCP Hyper Text Caching Protocol
HTML Hypertext Markup Language
HTTP Hypertext Transfer Protocol
HTTPS Secure Hypertext Transfer Protocol
Hz hertz
10
SYSTEM AND NETWORK SECURITY ACRONYMS AND ABBREVIATIONS
11
SYSTEM AND NETWORK SECURITY ACRONYMS AND ABBREVIATIONS
12
SYSTEM AND NETWORK SECURITY ACRONYMS AND ABBREVIATIONS
KB kilobyte
Kbps kilobit per second
KDC key distribution center
KEK key encryption key
KG key generator
KGD key generation and distribution
kHz kilohertz
KINK Kerberized Internet Negotiation of Keys
KSG key stream generator
KSK key signing key
13
SYSTEM AND NETWORK SECURITY ACRONYMS AND ABBREVIATIONS
LF low frequency
LFSR linear feedback shift register
LIR local Internet registry
LM LAN Manager
LMP Link Manager Protocol
LOC location (DNS record)
LOS line-of-sight
LRA Local Registration Authority
LUA limited user account
m meter
MAC mandatory access control
MAC media access control (layer)
MAC Medium Access Control
MAC message authentication code
MAF multi-mode authentication framework
MAN metropolitan area network
MAPS Mail Abuse Prevention System
MB megabyte
Mbps megabits per second
MBR master boot record
MBSA Microsoft Baseline Security Analyzer
MD message digest
ME mobile equipment
MED multi-exit discriminator
MEP message exchange pattern
MES manufacturing execution system
MHz megahertz
MIB management information base
MIC mandatory integrity control
MIC message integrity check
MIC message integrity code
MIKEY Multimedia Internet KEYing
MIME Multipurpose Internet Mail Extensions
MIMO multiple-input, multiple-output
MIN mobile identification number
Mini SD mini secure digital
MIP Mobile Internet Protocol
MitM man-in-the-middle (attack)
MLD Multicast Listener Discovery
MMC Microsoft Management Console
MMC MultiMediaCard
MMCmobile MultiMediaCard Mobile
MMS Multimedia Messaging Service
MN mobile node
MO magneto-optical
MOA memorandum of agreement
MOBIKE IKEv2 Mobility and Multihoming Protocol
14
SYSTEM AND NETWORK SECURITY ACRONYMS AND ABBREVIATIONS
NA Neighbor Advertisement
NAC network access control
NACI National Agency Check and Inquiries
NAP Network Access Protection
NARA National Archives and Records Administration
NAS network access server
NAT network address translation
NAT-PT network address translation—protocol translation
NAT-T network address translation traversal
NBA network behavior analysis
NBAD network behavior anomaly detection
NCES NetCentric Enterprise Services
NCP National Checklist Program
NCSD National Cyber Security Division
NCSI NIST National Center for Standards and Certification Information
ND Neighbor Discovery
15
SYSTEM AND NETWORK SECURITY ACRONYMS AND ABBREVIATIONS
16
SYSTEM AND NETWORK SECURITY ACRONYMS AND ABBREVIATIONS
P2P peer-to-peer
PAC Privilege Attribute Certificate
PAC Protected Access Credential
PAD peer authorization database
PAM pluggable authentication module
PAN personal area network
PAOS Reverse HTTP Binding for SOAP
PAP Password Authentication Protocol
PAP policy access point
PAS publicly available specification
PBA pre-boot authentication
PBAC policy-based access control
PBCC Packet Binary Convolutional Code
17
SYSTEM AND NETWORK SECURITY ACRONYMS AND ABBREVIATIONS
18
SYSTEM AND NETWORK SECURITY ACRONYMS AND ABBREVIATIONS
19
SYSTEM AND NETWORK SECURITY ACRONYMS AND ABBREVIATIONS
20
SYSTEM AND NETWORK SECURITY ACRONYMS AND ABBREVIATIONS
21
SYSTEM AND NETWORK SECURITY ACRONYMS AND ABBREVIATIONS
TA test assertion
TA transmitter address
TACACS Terminal Access Controller Access Control System
TAG technical advisory group
TB terabyte
TC technical committee
22
SYSTEM AND NETWORK SECURITY ACRONYMS AND ABBREVIATIONS
23
SYSTEM AND NETWORK SECURITY ACRONYMS AND ABBREVIATIONS
VB Visual Basic
VB.NET Visual Basic .NET
VBA Visual Basic for Applications
VBScript Visual Basic Script
VFD variable frequency drive
VHD virtual hard drive
VHF very high frequency
VLAN virtual local area network
VM virtual machine
VMS vulnerability management system
VoIP Voice over Internet Protocol
VOIPSA Voice over IP Security Alliance
VPN virtual private network
VPNC Virtual Private Network Consortium
VRRP Virtual Router Redundancy Protocol
24
SYSTEM AND NETWORK SECURITY ACRONYMS AND ABBREVIATIONS
XYZ
25
SYSTEM AND NETWORK SECURITY ACRONYMS AND ABBREVIATIONS
Appendix A—References
Sources used in the development of the list of system and network security acronyms and abbreviations in
this document include the following:
National Institute of Standards and Technology Publications, NIST Computer Security Division
Resource Center Web site, http://csrc.nist.gov/
Microsoft Hardware Developer Central, Glossary of Acronyms for PC and Server Technologies,
http://www.microsoft.com/whdc/resources/support/glossary.mspx
26
SYSTEM AND NETWORK SECURITY ACRONYMS AND ABBREVIATIONS
Over time, as organizations, technologies, or other entities change, some acronyms associated with them
may lose their definitions and thus no longer be considered acronyms. This appendix presents selected
former acronyms related to system and network security. As additional acronyms in this publication lose
their definitions, readers are encouraged to send notification of these, along with references to
authoritative sources of information, to [email protected] for possible inclusion in future
releases of this report.
27