DOCUMENT
Glossary of Security Terms, Definitions, and Acronyms
911 definitions by Center for Development of Security Excellence

Acceptable Level of RiskAccessAccess ApprovalAccess Approval Authority (AAA)Access ControlAccess Control MechanismsAccess Eligibility DeterminationAccessesAccess EvaluationAccessioned RecordsAccess National Agency Check with Inquiries (ANACI)Access RosterAccess TerminationAccountabilityAccreditationAccreditation (of Information Systems (IS))Accredited Security Parameter (ASP)Accrediting AuthorityAcknowledged Special Access ProgramAcoustical IntelligenceAcoustical SecurityAcquisition ProgramAcquisition Special Access ProgramAcquisition Systems ProtectionActivityActivity Security Manager (ASM)AdjudicationAdjudication AuthorityAdjudicative ProcessAdjudicatorAdversaryAdversary Collection MethodologyAdversary Threat StrategyAdverse ActionAdverse InformationAffiliateAgencyAgentAgent of the GovernmentAlienAlternative Compensatory Control MeasuresAnalysisAnti-TamperAnti-Tamper Executive Agent (ATEA)AppealApplicantApplicationApproved Access Control DeviceApproved Built-in Combination LockApproved Combination PadlockApproved Electronic, Mechanical, or ElectroMechanical DeviceApproved Key-Operated PadlockApproved Security ContainerApproved VaultApproved Vault DoorAssessmentAssetAssociated (Enhanced) MarkingsAstragal StripAuthenticationAuthenticityAuthorized Adjudicative AgencyAuthorized Classification and Control Markings RegisterAuthorized Investigative AgencyAuthorized PersonAuthorized User (AU)Automated Information System (AIS)Automated Information System Media Control SystemAutomatic DeclassificationAvailabilityBackground Investigation (BI)Balanced Magnetic SwitchBank Secrecy Act (BSA)Beta IBeta IIBilletsBlackBLACK EquipmentBLACK LineBLACK Optical Fiber LineBLACK Wire LineBoundaryBreak-Wire DetectorBurn BagBurn-InBUSTERCamouflageCarve-OutCase-by-Case BasisCase OfficerCaveatCentral Adjudication Facility (CAF)Central United States Registry for North Atlantic Treaty Organization (NATO)CertificationCertification and Accreditation (C&A)Certified Transient Electromagnetic Pulse Emanation Standard (TEMPEST) Technical Authority (CTTA)Character Investigation (CI)Civil Service Commission (CSC)ClassificationClassification and Control Markings (CCM)Classification and Control Markings System (Intelligence Community Directive (ICD) 710)Classification GuidanceClassification GuideClassification LevelsClassification Markings and Implementation Working Group (CMIWG)Classified ContractClassified InformationClassified Information Procedures Act (CIPA)Classified Military Information (CMI)Classified National Security Information (CNSI)Classified VisitClassifierClearanceClearance CertificationCleared Commercial CarrierCleared EmployeesCleared EscortClearingClosed AreaClosed StorageCoalitionCodec ACode WordCoercive ForceCoercivityCognizant Security Agency (CSA)Cognizant Security Authority (CSA)Cognizant Security Office (CSO)CohabitantCollateral EffectCollateral InformationCommand and Control Warfare (C2W)Command AuthorityCommercial and Government Entity (CAGE) CodeCommercial Off-The-Shelf (COTS)Common Operational Picture (COP)Common Wall FacilityCommunications IntelligenceCommunications ProfileCommunications Security (COMSEC)Communications Security MonitoringCommunity of Interest (COI)Community RiskCompanyCompartmentationCompartmented IntelligenceCompelling NeedCompromiseCompromising Emanations (CE)Computerized Telephone System (CTS)Computer NetworkComputer Network Attack (CNA)Computer Network Exploitation (CNE)Computer SecurityComputer Security ActComputer Security ToolboxComputing EnvironmentConcealmentConcept of Intelligence OperationsConcept of Operations (CONOPS)Condition (Personnel Security)ConfidentialConfidentialityConfidential SourceConfiguration ControlConfiguration Management (CM)Connection ApprovalConnectivityConsigneeConsignorConstant Surveillance ServiceConstruction Surveillance Technician (CST)Continental United States (CONUS)Contingency PlanContinuity of Operations (COOP)Continuous EvaluationContinuous OperationContinuous Sensitive Compartmented Information Facility (SCIF) OperationContracting Officer (CO)ContractorContractor/Command Program Manager (CPM)Contractor/Command Program Security Officer (CPSO)Contractor Special Security Officer (CSSO)ControlControlled Access Area (CAA)Controlled Access Program (CAP)Controlled Access Program Coordination Office (CAPCO)Controlled Access Program Coordination Office (CAPCO) Authorized Classification and Control Markings RegisterControlled Access Program Oversight Committee (CAPOC)Controlled Area/CompoundControlled BuildingControlled Cryptographic ItemControlled InformationControlled InterfaceControlled Substances Act (CSA)Controlled Unclassified Information (CUI)Cooperative Program Personnel (CPP)Core SecretsCorporate FamilyCorporationCorroborateCounterintelligence (CI)Counterintelligence (CI) AssessmentCountermeasure (CM)CourierCo-Utilization AgreementCoverCovert OperationCredit CheckCriminal ActivityCritical and Sensitive Information List (CSIL)Critical Design Review (CDR)Critical Information (CI)Critical Infrastructure (CI)Critical Infrastructure (CI) Owner and OperatorCritical Infrastructure Information Act (CIIA)Critical Infrastructure Protection (CIP) ProgramCritical Nuclear Weapons Design Information (CNWDI)Critical Program Information (CPI)Crypto-EquipmentCryptographyCrypto-Ignition Key (CIK)Cryptologic Information System (CIS)CryptologyCrypto-SecurityCustodianCustomerCyber AttackCyber Incident (Significant)Cyber InfrastructureCyber Operational Preparation of the Environment (C-OPE)CybersecurityCybersecurity Act of 2012Cybersecurity Enhancement Act (CSEA)Cybersecurity Information Sharing Act of 2012CyberspaceCyberspace Operations (CO)Cyberspace SuperiorityCyber Warfare (CW)DamageDamage AssessmentDamage to the National SecurityDataData AggregationData IntegrityData MiningDD 254 (Final)DD 254 (Original)DD 254 (Revised)Dead BoltDebriefingDeceptionDecibelDeclassificationDeclassification AuthorityDeclassification GuideDefense ArticlesDefense Central Index of Investigations (DCII)Defense Central Security IndexDefense Industrial Security Clearance Office (DISCO)Defense Information Infrastructure (DII)Defense Information Systems Network (DISN)Defense Information Systems Network (DISN) Designated Approving Authority (DAA)Defense Office of Hearings and Appeals (DOHA)Defense Personnel Exchange Program (DPEP)Defense Security Service (DSS)Defense Support of Civil AuthoritiesDefense Technical Information Center (DTIC)Defense Travel BriefingDefense Treaty Inspection Readiness Program (DTIRP)Defensive Counter-Cyber (DCC)Defensive Travel Security BriefingDegaussDegausserDegaussingDelegation of Disclosure Authority Letter (DDAL)Deliberate Compromise of Classified InformationDemilitarized Zone (DMZ)DenialDenial of Service (DOS)Department/Agency/Organization (DAO) CodeDepartment of Defense Components (DODC)Department of Defense (DoD) DirectiveDepartment of Defense (DoD) Information Assurance Certification and Accreditation Process (DIACAP)Department of Defense (DoD) InstructionDepartment of Defense (DoD) PublicationDepartment of Defense Information System (DODIS)Department of Energy (DOE)Department of Homeland Security (DHS)Department of State (DOS)Department of the Treasury (TREAS DEPT)Derivative ClassificationDerogatory InformationDesignated Approving Authority (DAA)Designated Approving Authority (DAA) RepresentativeDesignated CourierDesignated Disclosure Authority (DDA)Designated Intelligence Disclosure Official (DIDO)DestroyingDetectable ActionsDetermination AuthorityDeviation (Personnel Security)Digital SignatureDigraphDirection FindingDirectiveDisclosure RecordDiscretionary Access Control (DAC)DisketteDisposable RecordsDispositionDisseminationDocumentDocumentary InformationDomainDowngradingDrug Enforcement Administration (DEA)Dual CitizenDual TechnologyDynamic Random-Access Memory (DRAM)Economic Intelligence (ECINT)Electrically Erasable Programmable Read-Only Memory (EEPROM)Electronic Attack (EA)Electronic Intelligence (ELINT)Electronic Protection (EP)Electronic Questionnaire for Investigative Processing (e-QIP)Electronic Security (ELSEC)Electronic Surveillance (ES)Electronic Transmission (ET)Electronic Warfare (EW)Electronic Warfare Support (EWS)EligibilityEmanation Security (EMSEC)Emergency Action Plan (EAP)Emission Security (EMSEC)EmployeeEnclaveEntrance National Agency Check (ENTNAC)Equal Employment Opportunity Commission (EEOC)Equipment Transient Electromagnetic Pulse Emanation Standard (TEMPEST) Zone (ETZ)EquityErasable Programmable Read-Only Memory (EPROM)EscortEspionageEssential Elements of Friendly Information (EEFI)Essential Elements of Information (EI)Essential SecrecyEventException (Personnel Security)Executive Order (EO)ExemptedExpanded National Agency Check (ENAC)Expanded SteelExploitationExportExport License Application (ELA)Export License (EL)Extraordinary Security Measure (ESM)Facilities AccreditationFacilities CertificationFacilityFacility Security Clearance (FCL)Facility Security Officer (FSO)Facility Transient Electromagnetic Pulse Emanation Standard (TEMPEST) Zone (FTZ)Federal Information Security Management Act (FISMA)Federal Labor Relations Authority (FLRA)Federal Personnel Manual (FPM)Federal RecordFerroelectric Random-Access Memory (FRAM)File Control Block (FCB)File SeriesFinancial Crimes Enforcement Network (FINCEN)Financial DisclosureFirewallFixed DiskFixed Facility Checklist (FFC)Flash MemoryFlushFoeForced EntryForeground InformationForeign ContactForeign Disclosure (FD)Foreign Disclosure Point of ContactForeign Exchange PersonnelForeign Government Information (FGI)Foreign Instrumentation Signals Intelligence (FISINT)Foreign Intelligence Collection ThreatForeign Intelligence Entity (FIE)Foreign Intelligence (FI)Foreign InterestForeign Liaison Officer (FLO)Foreign Military Sales (FMS)Foreign NationalForeign Ownership, Control, or Influence (FOCI)Foreign PersonForeign RepresentativeForeign Travel BriefingForeign VisitFormerly Restricted Data (FRD)For Official Use Only (FOUO)For Official Use Only (FOUO) Certified Transient Electromagnetic Pulse Emanation Standard (TEMPEST) Technical Authority (CTTA)Freedom of Information Act (FOIA)Freight Forwarder (Transportation Agent)FriendFriendlyFunctional Damage AssessmentGaussGeneral Services Administration (GSA)Global Information Grid (GIG)Global Information Infrastructure (GII)Government Accounting Office (GAO)Government-Approved FacilityGovernment Contracting Activity (GCA)Government-Off-The-Shelf (GOTS)Government Program Manager (GPM)Government-to-Government ChannelsGovernment-to-Government Transfer (G2G)GranularityGuardGuest SystemHackerHand CarrierHandle Via Special Access Control Channels OnlyHardcopy DocumentHard DiskHardened Cable PathHomeland Security Act (HSA)Home Office FacilityHostile ActHostile IntentHuman Intelligence (HUMINT)Illegal Drug UseImageryImagery Intelligence (IMINT)Imitative Communications DeceptionImmediate Family MemberImmigrant AlienImmigration Reform and Control Act (IRCA)Inadvertent DisclosureIncidentIncident of Security ConcernIndependent Research and Development (IR&D)IndoctrinationIndustrial EspionageIndustrial SecurityInformationInformation Assurance (IA)Information Assurance (IA) ControlInformation Assurance (IA) -Enabled Information Technology (IT) ProductInformation Assurance (IA) ProductInformation Assurance Manager (IAM)Information Assurance Officer (IAO)Information IntegrityInformation OperationInformation OwnerInformation SecurityInformation Security Oversight Office (ISOO)Information Storage Device (ISD)Information System (IS)Information System Security Engineer (ISSE)Information Systems Security (INFOSEC)Information Systems Security Representative (ISSR)Information Warfare (INFOWAR)InfractionInitial Operating Capability (IOC)InsiderInsider ThreatInspectable Space (IS)Integral File BlockIntegrityIntelligenceIntelligence Activity (IA)Intelligence Collection (INTCOL)Intelligence Community (IC)Intelligence CycleIntelligence InformationIntelligence Sources and MethodsIntelligence Special Access ProgramIntelligence SystemIntending CitizenIntentionInterceptInterconnected NetworkInterim Access Authorization (IAA)Interim Approval to Operate (IAO)Interim Security ClearanceInternal VulnerabilityInternational OrganizationInteroperabilityIntrusionIntrusion Detection System (IDS)InvalidationIsolatorIssue CaseJoint Personnel Adjudication System (JPAS)Joint Use Agreement (JUA)Joint VentureKey Material Identification Number (KMID)Key ResourcesKey Service Unit (KSU)Law Enforcement SensitiveLawful Permanent ResidentLeadLetter of Compelling NeedLetter of IntentLevel of ConcernLimited Access Authorization (LAA)Limited Background Investigation (LBI)Limited Liability Company (LLC)Line SupervisionLocal Agency Check (LAC)Local Area Network (LAN)Logic BombLong-Haul TelecommunicationsLow Probability of Detection (LPD)Low Probability of Intercept (LPI)Malicious CodeMalicious Code ScreeningMandatory Access Control (MAC)Mandatory Declassification ReviewManipulative Communications DeceptionMaster Crypto-Ignition Key CustodianMaterialMeasurement and Signature Intelligence (MASINT)Memorandum of Agreement (MOA)Memory ComponentMerit Systems Protection Board (MSPB)Minimum Background Investigation (MBI)Minor Derogatory InformationMinor Issue InformationMission Assurance CategoryMission EssentialMitigationMobile CodeModulator-Demodulator (MODEM)Motion Detection SensorMultilevel securityMultiple Facility OrganizationMultiple SourcesNational Agency Check (NAC)National Agency Check Plus Written Inquiries (NACI)National Agency Check with Local Agency Checks and Credit Check (NACLC)National Cyber Alert System (NCAS)National Cyber Risk Alert Level (NCRAL)National Information Assurance Partnership (NIAP)National IntelligenceNational Military Strategy for Cyberspace Operations (NMS-CO)National (of the United States)National Security Agency/Central Security Service (NSA/CSS)National Security and Emergency Preparedness (NS/EP) CommunicationsNational Security Information (NSI)Naval Nuclear Propulsion Information (NNPI) InformationNeed for AccessNeed-to-KnowNeed-to-Know DeterminationNetworkNetwork Manager (NETMGR)Network Operations (NetOps) ActivitiesNetwork Security OfficerNetwork SystemNewly Discovered RecordsNicknamesNon-Conductive SectionNon-Disclosure Agreement (NDA)Non-Discussion AreaNon-Record MaterialNon-RepudiationNon-Secure Internet Protocol Router Network (NIPRNET)Non-Volatile Memory (NVM)Non-Volatile Random-Access Memory (NVRAM)North Atlantic Treaty Organization (NATO) Classified InformationObject ReuseObservablesOersted (Oe)Offensive Cyberspace Operations (OCO)Office Information System (OIS)Office of Management and Budget (OMB)Office of Personnel Management (OPM)Office of Special Counsel (OSC)Official Department of Defense InformationOne Time AccessOpen Source InformationOpen Source Intelligence (OSINT)Open Storage AreaOperations and SupportOperations Security (OPSEC)Operations Security (OPSEC) AssessmentOperations Security (OPSEC) IndicatorOperations Security (OPSEC) ProcessOperations Security (OPSEC) ProgramOperations Security (OPSEC) SurveyOperations Security Plan (OSP)Operations Security Working Group (OWG)Optical Storage MediaOral/Visual DisclosureOrganizational-level Commander/Commanding Officer (CO)Original ClassificationOriginal Classification Authority (OCA)Originating Agency Determination Required (OADR)Originating Department of Defense (DoD) ComponentOutsourced Information Technology-Based ProcessOverseas Security Policy Board (OSPB)Overt CollectionOvert OperationOverwriteOverwrite/Re-recording VerificationParent CorporationPass/FailPass PhrasePasswordPassword ShadowingPerimeterPeriodic Reinvestigation (PR)Periods ProcessingPeripheralPeripheral DevicePermanent RecordsPermanent Resident AlienPersonal Computer (PC)Personal Digital Assistant (PDA)Personal Financial Statement (PFS)Personal Identifiable Information (PII)Personnel Security Clearance (PCL)Personnel Security DeterminationPersonnel Security InterviewPersonnel Security Investigation (PSI)Personnel Security (PERSEC)Personnel Security Program (PSP)Personnel Security Questionnaire (PSQ)Phased Periodic Reinvestigation (PPR)Physical Damage AssessmentPhysical Security (PHYSEC)Physical Security WaiverPlatform Information Technology (IT) InterconnectionPortable Computer SystemPortable Electronic Device (PED)PortfolioPotential ThreatPreparednessPresidential Historical Materials and RecordsPreventionPrime ContractPrincipal Accrediting Authority (PAA)Principal Disclosure Authority (PDA)Privacy DataPrivacy (Not Security)Private SectorPrivileged AccessPrivileged UserProfileProgram Access RequestProgram Channels or Program Security ChannelsProgram Executive AgentProgram Executive Office, Enterprise Information Systems (PEO-EIS)Programmable Read-Only Memory (PROM)Program MaterialProgram Office (PO)Program ProtectionProgram Protection PlanProgram Protection SurveyProgram Security Officer (PSO)Program Sensitive InformationProject/Program Manager (PM)Proprietary Information (PROPIN)Protected Distribution System (PDS)Protected InformationProtectionProtective MeasuresProtective Security ServiceProtocolProviderProxyPsychological Operations (PSYOP)Public Domain (PD)Public Domain Software (PDS)Public InformationPublic KeyPublic Key Infrastructure (PKI)PurgingQuestionnaire for National Security Positions (Standard Form 86)Random ProcurementRandom SelectionReciprocityRecordsRecords Having Permanent Historical ValueRecords ManagementRecoveryRecycledRedRedactionRED/BLACK ConceptRED EquipmentRED LineRED Optical Fiber LineRED Wire LineReferenceReference MaterialRegradeReimbursable Suitability InvestigationReinstatementReleaseRemote MaintenanceRemote TerminalRemovable Hard DiskReport of Investigation (RI)Representative of a Foreign InterestResearch and TechnologyResponseResponse ForceRestricted Area (RA)Restricted Data (RD)Revocation of Facility Security Clearance (FCL)RiskRisk AnalysisRisk AssessmentRisk AvoidanceRisk Management (RM)RobustnessRole-Based Access Control (RBAC)Routine ChangesSafeguardingSanitizingScattered CastlesScheduled RecordsScopeSealed Disk DriveSecretSecure CopySecure Data Device (SDD)Secure Telephone Unit (STU)-III/Secure Telephone Equipment (STE)Secure Working AreaSecuritySecurity AssuranceSecurity Classification Guides SecuritySecurity ClearanceSecurity CognizanceSecurity CompromiseSecurity CountermeasuresSecurity Director (SD)Security DomainSecurity Environment ChangesSecurity Environment Threat List (SETL)Security IncidentSecurity-in-Depth (SID)Security InfractionSecurity LevelSecurity OfficerSecurity PolicySecurity Policy Automation Network (SPAN)Security Policy Board (SPB)Security ProfileSecurity/Suitability Investigations Index (SSII)Security TestingSecurity ViolationSelf-InspectionSenior Agency Official (SAO)Senior Foreign Official (SFO)Senior Intelligence Officer (SIO)Senior Official of the Intelligence Community (SOIC)Senior Review Group (SRG)Sensitive ActivitiesSensitive Compartmented Information Facility (SCIF)Sensitive Compartmented Information Facility (SCIF) AccreditationSensitive Compartmented Information Facility (SCIF) (Co-utilization)Sensitive Compartmented Information Facility (SCIF) DatabaseSensitive Compartmented Information (SCI)Sensitive Compartmented Information (SCI) Courier (Certified)Sensitive Compartmented Information (SCI) Courier (Designated)Sensitive PositionSensitivity LabelServiceShared Situational AwarenessShipperSignal FlagsSignals Intelligence (SIGINT)Significant Derogatory InformationSingle Scope Background Investigation-Periodic Reinvestigation (SSBI-PR)Single Scope Background Investigation (SSBI)Site Information Assurance Manager (IAM)Site Security Manager (SSM) (Construction)Situational AwarenessSole ProprietorshipSound AttenuationSound GroupSound Masking SystemSound Transmission ClassSource DocumentSpecial Access Program Central Office (SAPCO)Special Access Program Coordination Office (SAPCO)Special Access Program Facility (SAPF)Special Access Program (SAP)Special Access Program (SAP)/Special Access Required (SAR)Special ActivitySpecial Background Investigation (SBI)Special Investigative Inquiry (SII)Special Program Document Control CenterSpecial Program Review Group (SPRG)Sponsoring AgencyStand-Alone Automated Information System (AIS)Stand-Alone SystemStandard Practice ProceduresStatement of Reason (SOR)Static Random-Access Memory (SRAM)SubcontractSubcontractorSubject Matter Expert (SME)SubsidiarySubstantial Issue InformationSupporting Information Assurance (IA) InfrastructureSurface Deployment and Distribution Command (SDDC)Surreptitious EntrySurveillanceSurvivabilitySuspicious ContactSystemSystem Administrator (SA)Systematic Declassification ReviewSystem Security Authorization Agreement (SSAA)System Security Engineering (SSE)System Security Plan (SSP)System SoftwareTactical Approval to Operate (T-ATO)Tactical Sensitive Compartmented Information Facility (T-SCIF)Tactical Special Access Program Facility (T-SAPF)TargetTear LineTechnical dataTechnical SecurityTechnical Surveillance Countermeasures (TSCM)Technical Surveillance Countermeasures (TSCM) InspectionTechnical Surveillance Countermeasures (TSCM) Surveys and EvaluationsTechnical Threat AnalysisTechnical VulnerabilityTechnologyTechnology Control Plan (TCP)Technology CriticalTechnology TransferTelecommunicationsTelecommunications and Automated Information Systems Security (TISS)TelemetryTelemetry Intelligence (TELINT)TeleworkTemporary Access EligibilityTemporary Help/Job ShopperTemporary RecordsTerrorismThreatThreat AnalysisThreat AssessmentThreat MonitoringTolueneTop SecretTransferred RecordsTransient Electromagnetic Pulse Emanation Standard (TEMPEST)Transient Electromagnetic Pulse Emanation Standard (TEMPEST)Transient Electromagnetic Pulse Emanation Standard (TEMPEST) ZoneTransient Electromagnetic Pulse Emanation Standard (TEMPEST) Zoned EquipmentTransmissionTransmission Security (TRANSEC)Transportation PlanTransshipping ActivityTrapdoorTrigraphTrojan HorseTrusted Computer System (TCS)Trusted Computing Base (TCB)Trusted PathTwo-Person IntegrityType 1 ProductsType Accepted TelephoneUmbrella Special Access Program (SAP)Unacknowledged Special Access Program (SAP)Unauthorized Disclosure (UD)Unauthorized PersonUnclassified Controlled Nuclear Information (UCNI)Unclassified Internet Protocol Router NetworkUnclassified SensitiveUncontrolled Access Area (UAA)Undercover OperationUnfavorable Administrative ActionUnfavorable Personnel Security DeterminationUnified NetworkUnited States Computer Emergency Readiness Team (US-CERT)United States Cyber Command (USCYBERCOM)United States Strategic Command (USSTRATCOM)United States (U.S)United States (U.S) Citizen (Native-Born)United States (U.S) NationalUnscheduled RecordsUpgradeUser IdentificationUsersVaultVendorViolationVirusVolatile MemoryVoting SecuritiesVulnerabilityVulnerability AnalysisVulnerability AssessmentWaived Special Access Program (SAP)WaiverWaiver (Personnel Security)Weapons of Mass Destruction (WMD)Wide Area Network (WAN)Working Paper(s)WorkstationWormWrite-Protect
Loading conversations.
Date
2012-11-01
Related Entities