Abbreviations: Difference between revisions
(Created page with "; 3GPP: 3rd Generation Partnership Project ;AC: Authentication Code (TCG) ;ACDC: Advanced Cyber Defence Centre ;AIK: Attestation Identity Key (TCG) AIOTI Alliance of IOT Innov...") |
No edit summary |
||
Line 3: | Line 3: | ||
;ACDC: Advanced Cyber Defence Centre | ;ACDC: Advanced Cyber Defence Centre | ||
;AIK: Attestation Identity Key (TCG) | ;AIK: Attestation Identity Key (TCG) | ||
AIOTI Alliance of IOT Innovation | ;AIOTI: Alliance of IOT Innovation | ||
AMSS Anti-Malware Support Services Working Group (IEEE) | ;AMSS: Anti-Malware Support Services Working Group (IEEE) | ||
ANS Autorité Nationale de Sécurité (Belgium) | ;ANS Autorité Nationale de Sécurité (Belgium) | ||
ANSSI Agence Nationale de la Sécurité des Systèmes d'Information (France) | ;ANSSI Agence Nationale de la Sécurité des Systèmes d'Information (France) | ||
APT Advanced Persistent Threat | ;APT Advanced Persistent Threat | ||
ARIB Association of Radio Industries and Businesses (Japan) | ;ARIB Association of Radio Industries and Businesses (Japan) | ||
ATT&CK™ Adversarial Tactics Techniques and Common Knowledge (MITRE) | ;ATT&CK™ Adversarial Tactics Techniques and Common Knowledge (MITRE) | ||
BLOB Binary Large OBject (TCG) | ;BLOB Binary Large OBject (TCG) | ||
BORE Break Once Run Everywhere (TCG) | ;BORE Break Once Run Everywhere (TCG) | ||
BYOD Bring Your Own Device | ;BYOD Bring Your Own Device | ||
CA Certification Authority | ;CA Certification Authority | ||
CA/B Certificate of Authority/Browser Forum | ;CA/B Certificate of Authority/Browser Forum | ||
CACAO Collaborative Automated Course of Action Operations (OASIS) | ;CACAO Collaborative Automated Course of Action Operations (OASIS) | ||
CAPEC Common Attack Pattern Enumeration and Classification | ;CAPEC Common Attack Pattern Enumeration and Classification | ||
CBM Confidence Building Measures | ;CBM Confidence Building Measures | ||
CCC Chaos Computer Club | ;CCC Chaos Computer Club | ||
CCDB Common Criteria Development Board | ;CCDB Common Criteria Development Board | ||
CCDCOE NATO Cooperation Cyber Defence Center of Excellence | ;CCDCOE NATO Cooperation Cyber Defence Center of Excellence | ||
CCE Common Configuration Enumeration | ;CCE Common Configuration Enumeration | ||
CCRA Common Criteria Recognition Agreement | ;CCRA Common Criteria Recognition Agreement | ||
CCSA China Communications Standards Association | ;CCSA China Communications Standards Association | ||
CCSB Centre pour Cyber Securité Belgique (Belgium) | ;CCSB Centre pour Cyber Securité Belgique (Belgium) | ||
CD Cyber Defense | ;CD Cyber Defense | ||
CDT Centres for Doctoral Training (UK) | ;CDT Centres for Doctoral Training (UK) | ||
CEEE Common Event Expression Exchange | ;CEEE Common Event Expression Exchange | ||
CEN Comité Européen de Normalisation | ;CEN Comité Européen de Normalisation | ||
CENELEC European Committee for Electrotechnical Standardization | ;CENELEC European Committee for Electrotechnical Standardization | ||
CEPOL European POLice College | ;CEPOL European POLice College | ||
CESG Communications-Electronics Security Group (UK) (now NCSC) | ;CESG Communications-Electronics Security Group (UK) (now NCSC) | ||
CFRG Crypto Forum Research Group | ;CFRG Crypto Forum Research Group | ||
CI Critical Infrastructure | ;CI Critical Infrastructure | ||
CIO Chief Information Officer | ;CIO Chief Information Officer | ||
CIP Critical Infrastructure Protection | ;CIP Critical Infrastructure Protection | ||
CIRT Computer Incident Response Team | ;CIRT Computer Incident Response Team | ||
CIS Center for Internet Security | ;CIS Center for Internet Security | ||
CloudAuthZ Cloud Authorization (OASIS) | ;CloudAuthZ Cloud Authorization (OASIS) | ||
CMK Certified Migration Key (TCG) | ;CMK Certified Migration Key (TCG) | ||
CN subcommittee on Core Network (3GPP) | ;CN subcommittee on Core Network (3GPP) | ||
CONNECT Directorate on Communications Networks, Content and Technology (EC) | ;CONNECT Directorate on Communications Networks, Content and Technology (EC) | ||
CPE Common Platform Enumeration | ;CPE Common Platform Enumeration | ||
CRTM Core Root of Trust for Measurement (TCG) | ;CRTM Core Root of Trust for Measurement (TCG) | ||
CSA Cloud Security Association | ;CSA Cloud Security Association | ||
CSAF Common Security Advisory Framework (OASIS) | ;CSAF Common Security Advisory Framework (OASIS) | ||
CTI Cyber Threat Intelligence (OASIS) | ;CTI Cyber Threat Intelligence (OASIS) | ||
CVE Common Vulnerabilities and Exposures | ;CVE Common Vulnerabilities and Exposures | ||
CVE-ID CVE IDentifier | ;CVE-ID CVE IDentifier | ||
CVRF Common Vulnerability Reporting Format | ;CVRF Common Vulnerability Reporting Format | ||
CVSS Common Vulnerability Scoring System | ;CVSS Common Vulnerability Scoring System | ||
CWE Common Weakness Enumeration | ;CWE Common Weakness Enumeration | ||
CWRAF Common Weakness Risk Analysis Framework | ;CWRAF Common Weakness Risk Analysis Framework | ||
CWSS Common Weakness Scoring System | ;CWSS Common Weakness Scoring System | ||
CYBER Cybersecurity Technical Committee (ETSI) | ;CYBER Cybersecurity Technical Committee (ETSI) | ||
CYBEX Cybersecurity Information Exchange (ITU-T) | ;CYBEX Cybersecurity Information Exchange (ITU-T) | ||
CybOX Cyber Observable Expression | ;CybOX Cyber Observable Expression | ||
CYIQL Cybersecurity Information Query Language | ;CYIQL Cybersecurity Information Query Language | ||
DAA Direct Anonymous Attestation (TCG) | ;DAA Direct Anonymous Attestation (TCG) | ||
DCE Dynamic root of trust for measurement Configuration Environment (TCG) | ;DCE Dynamic root of trust for measurement Configuration Environment (TCG) | ||
D-CRTM Dynamic Core Root of Trust for Measurement (TCG) | ;D-CRTM Dynamic Core Root of Trust for Measurement (TCG) | ||
DDoS Distributed Denial of Service | ;DDoS Distributed Denial of Service | ||
DL Dynamic Launch (TCG) | ;DL Dynamic Launch (TCG) | ||
DLME Dynamically Launched Measured Environment (TCG) | ;DLME Dynamically Launched Measured Environment (TCG) | ||
DNS Domain Name System | ;DNS Domain Name System | ||
DoS Denial of Service | ;DoS Denial of Service | ||
dots DDoS open threat signaling (IETF) | ;dots DDoS open threat signaling (IETF) | ||
D-RTM Dynamic Root of Trust Measurement (TCG) | ;D-RTM Dynamic Root of Trust Measurement (TCG) | ||
DSS-X Digital Signature Services eXtended (OASIS) | ;DSS-X Digital Signature Services eXtended (OASIS) | ||
E2NA End-to-End Network Architectures (ETSI) | ;E2NA End-to-End Network Architectures (ETSI) | ||
EAP Extensible Authentication Protocol | ;EAP Extensible Authentication Protocol | ||
EBIOS Expression of Needs and Identification of Security Objectives | ;EBIOS Expression of Needs and Identification of Security Objectives | ||
EC European Commission | ;EC European Commission | ||
ECI European Critical Infrastructure | ;ECI European Critical Infrastructure | ||
EI-ISAC Elections Infrastructure Information Sharing and Analysis Center | ;EI-ISAC Elections Infrastructure Information Sharing and Analysis Center | ||
ECRG Electronic Communications Reference Group (EC) | ;ECRG Electronic Communications Reference Group (EC) | ||
ENFSI European Network of Forensic Institutes | ;ENFSI European Network of Forensic Institutes | ||
ENISA European Network and Information Security Agency | ;ENISA European Network and Information Security Agency | ||
EPCIP European Programme for Critical Infrastructure Protection | ;EPCIP European Programme for Critical Infrastructure Protection | ||
ESI Electronic Signatures and Infrastructures (ETSI) | ;ESI Electronic Signatures and Infrastructures (ETSI) | ||
ESRIM European Security Research & Innovation forum | ;ESRIM European Security Research & Innovation forum | ||
ETI Encrypted Traffic Inspection working group (IEEE) | ;ETI Encrypted Traffic Inspection working group (IEEE) | ||
ETSI European Telecommunication Standards Institute | ;ETSI European Telecommunication Standards Institute | ||
EU European Union | ;EU European Union | ||
EU CSS EU CyberSecurity Strategy (EU) | ;EU CSS EU CyberSecurity Strategy (EU) | ||
Europol European Police Office | ;Europol European Police Office | ||
EVCERT Extended Validation Certificate | ;EVCERT Extended Validation Certificate | ||
FASG GSM Association Fraud and Security Working Group | ;FASG GSM Association Fraud and Security Working Group | ||
FIDO Fast IDentity Online | ;FIDO Fast IDentity Online | ||
FIPS Federal Information Processing Standards (USA) | ;FIPS Federal Information Processing Standards (USA) | ||
FIRST Forum of Incident Response and Security Teams | ;FIRST Forum of Incident Response and Security Teams | ||
GFCE Global Forum on Cyber Expertise | ;GFCE Global Forum on Cyber Expertise | ||
GSMA GSM Association | ;GSMA GSM Association | ||
H2020 Horizon 2020 | ;H2020 Horizon 2020 | ||
HOME Directorate on Migration and Home Affairs (EC) | ;HOME Directorate on Migration and Home Affairs (EC) | ||
HR Directorate on Human Resources and Security (EC) | ;HR Directorate on Human Resources and Security (EC) | ||
i2nsf interface to network security functions (IETF) | ;i2nsf interface to network security functions (IETF) | ||
IA Information Assurance | ;IA Information Assurance | ||
IAB Internet Architecture Board | ;IAB Internet Architecture Board | ||
IANA Internet Assigned Numbers Authority | ;IANA Internet Assigned Numbers Authority | ||
ICANN Internet Corporation for Assigned Names and Numbers | ;ICANN Internet Corporation for Assigned Names and Numbers | ||
ICASI Industry Consortium for Advancement of Security on the Internet | ;ICASI Industry Consortium for Advancement of Security on the Internet | ||
ICE European Critical Infrastructure | ;ICE European Critical Infrastructure | ||
ICSG Industry Connections Security Group (IEEE) | ;ICSG Industry Connections Security Group (IEEE) | ||
ICT Information and Communication Technology | ;ICT Information and Communication Technology | ||
IE Internet Explorer | ;IE Internet Explorer | ||
IEEE Institute for Electrical and Electronic Engineers | ;IEEE Institute for Electrical and Electronic Engineers | ||
IETF Internet Engineering Task Force | ;IETF Internet Engineering Task Force | ||
IMEI International Mobile station Equipment Identity | ;IMEI International Mobile station Equipment Identity | ||
IMS IP Multimedia Subsystem (3GPP) | ;IMS IP Multimedia Subsystem (3GPP) | ||
INRIA Institut national de recherche en sciences et technologies du numérique (France) | ;INRIA Institut national de recherche en sciences et technologies du numérique (France) | ||
IODEF Incident Object Description Exchange Format | ;IODEF Incident Object Description Exchange Format | ||
IP Internet Protocol | ;IP Internet Protocol | ||
ipsecme IP security maintenance and extensions working group (IETF) | ;ipsecme IP security maintenance and extensions working group (IETF) | ||
IRAP Information security Registered Assessors Program (Australia) | ;IRAP Information security Registered Assessors Program (Australia) | ||
IRTF Internet Research Task Force | ;IRTF Internet Research Task Force | ||
ISF Information Security Forum | ;ISF Information Security Forum | ||
ISO International Organization for Standardization | ;ISO International Organization for Standardization | ||
IT Information Technology | ;IT Information Technology | ||
ITU International Telecommunication Union | ;ITU International Telecommunication Union | ||
ITU-T International Telecommunication Union - Telecommunication Standardization sector | ;ITU-T International Telecommunication Union - Telecommunication Standardization sector | ||
IXP Internet eXchange Point | ;IXP Internet eXchange Point | ||
J-CAT Cybercrime Action Task Force (Europol) | ;J-CAT Cybercrime Action Task Force (Europol) | ||
JRC Directorate on Joint Research Centre (EC) | ;JRC Directorate on Joint Research Centre (EC) | ||
JSON JavaScript Object Notation | ;JSON JavaScript Object Notation | ||
JUST Directorate on Justice and Consumers (EC) | ;JUST Directorate on Justice and Consumers (EC) | ||
kitten common authentication technology next generation working group (IETF) | ;kitten common authentication technology next generation working group (IETF) | ||
KMIP Key Management Interoperability Protocol (OASIS) | ;KMIP Key Management Interoperability Protocol (OASIS) | ||
LECC Law Enforcement/CSIRT Cooperation (FIRST) | ;LECC Law Enforcement/CSIRT Cooperation (FIRST) | ||
LI Lawful Interception | ;LI Lawful Interception | ||
lisp locator/ID separation protocol (IETF) | ;lisp locator/ID separation protocol (IETF) | ||
MACCSA Multinational Alliance for Collaborative Cyber Situational Awareness | ;MACCSA Multinational Alliance for Collaborative Cyber Situational Awareness | ||
MAEC Malware Attribute Enumeration and Characterization | ;MAEC Malware Attribute Enumeration and Characterization | ||
mile Managed incident lightweight exchange working group (IETF) | ;mile Managed incident lightweight exchange working group (IETF) | ||
MMDEF Malware Metadata Exchange Format Working Group (IEEE) | ;MMDEF Malware Metadata Exchange Format Working Group (IEEE) | ||
MTS Methods for Testing and Specification (ETSI) | ;MTS Methods for Testing and Specification (ETSI) | ||
NATO North Atlantic Treaty Organization | ;NATO North Atlantic Treaty Organization | ||
NCP National Checklist Program | ;NCP National Checklist Program | ||
NCSS National Encrypted traffic integration Strategies | ;NCSS National Encrypted traffic integration Strategies | ||
NCIRC NATO Communications and Information Agency | ;NCIRC NATO Communications and Information Agency | ||
NESAG Network Equipment Security Assurance Group (3GPP) | ;NESAG Network Equipment Security Assurance Group (3GPP) | ||
NFV Network Functions Virtualisation (ETSI) | ;NFV Network Functions Virtualisation (ETSI) | ||
NIS Network and Information Security (EU) | ;NIS Network and Information Security (EU) | ||
NIST National Institute of Standards and Technology (USA) | ;NIST National Institute of Standards and Technology (USA) | ||
NTECH Network Technologies (ETSI) | ;NTECH Network Technologies (ETSI) | ||
NV (Storage) Non-Volatile (shielded location) (TCG) | ;NV (Storage) Non-Volatile (shielded location) (TCG) | ||
NVD National Vulnerability Database (USA) | ;NVD National Vulnerability Database (USA) | ||
nvo3 network virtualization overlays working group (IETF) | ;nvo3 network virtualization overlays working group (IETF) | ||
OASIS Organization for the Advancement of Structured Information Standards | ;OASIS Organization for the Advancement of Structured Information Standards | ||
oauth web authorization protocol working group (IETF) | ;oauth web authorization protocol working group (IETF) | ||
OMG Object Management Group | ;OMG Object Management Group | ||
OpenC2 Open Command and Control (OASIS) | ;OpenC2 Open Command and Control (OASIS) | ||
opsec operational security capabilities for IP network infrastructure working group (IETF) | ;opsec operational security capabilities for IP network infrastructure working group (IETF) | ||
OS Operating System | ;OS Operating System | ||
PC Personal Computer | ;PC Personal Computer | ||
PCA Privacy CA (TCG) | ;PCA Privacy CA (TCG) | ||
PCR Platform Configuration Register (TCG) | ;PCR Platform Configuration Register (TCG) | ||
PKCS Public-Key Cryptography Standards | ;PKCS Public-Key Cryptography Standards | ||
PKI Public Key Infrastructure | ;PKI Public Key Infrastructure | ||
PMRM Privacy Management Reference Model (OASIS) | ;PMRM Privacy Management Reference Model (OASIS) | ||
PrivEK Private Endorsement Key (TCG) | ;PrivEK Private Endorsement Key (TCG) | ||
PSN Public Sector Network | ;PSN Public Sector Network | ||
PubEK Public Endorsement Key (TCG) | ;PubEK Public Endorsement Key (TCG) | ||
RAN subcommittee on Radio Access Network (3GPP) | ;RAN subcommittee on Radio Access Network (3GPP) | ||
RID Real-time Inter-network Defense | ;RID Real-time Inter-network Defense | ||
RoT Root of Trust (component) (TCG) | ;RoT Root of Trust (component) (TCG) | ||
RTD Directorate on Research and Innovation (EC) | ;RTD Directorate on Research and Innovation (EC) | ||
RTM Root of Trust for Measurement (TCG) | ;RTM Root of Trust for Measurement (TCG) | ||
RTR Root of Trust for Reporting (TCG) | ;RTR Root of Trust for Reporting (TCG) | ||
RTS Root of Trust for Storage (TCG) | ;RTS Root of Trust for Storage (TCG) | ||
SA2 Subcommittee on Architecture (3GPP) | ;SA2 Subcommittee on Architecture (3GPP) | ||
SA3 Subcommittee on Security (3GPP) | ;SA3 Subcommittee on Security (3GPP) | ||
SA5 Subcommittee on Telecom Management (3GPP) | ;SA5 Subcommittee on Telecom Management (3GPP) | ||
sacm security automation and continuous monitoring working group (IETF) | ;sacm security automation and continuous monitoring working group (IETF) | ||
SAGE Security Algorithms Group of Experts (ETSI) | ;SAGE Security Algorithms Group of Experts (ETSI) | ||
SAI Securing Artificial Intelligence (ETSI) | ;SAI Securing Artificial Intelligence (ETSI) | ||
SAML Security Services (OASIS) | ;SAML Security Services (OASIS) | ||
SANS SysAdmin, Audit, Networking, and Security | ;SANS SysAdmin, Audit, Networking, and Security | ||
SAS Security Assurance Specification (3GPP) | ;SAS Security Assurance Specification (3GPP) | ||
SC27 ISO/IEC JTC1 Committee on Security techniques | ;SC27 ISO/IEC JTC1 Committee on Security techniques | ||
SC6 ISO/IEC JTC1 Committee on Telecommunications and information exchange between systems | ;SC6 ISO/IEC JTC1 Committee on Telecommunications and information exchange between systems | ||
SC7 ISO/IEC JTC1 Committee on Software and systems engineering | ;SC7 ISO/IEC JTC1 Committee on Software and systems engineering | ||
SCADA Supervisory Control And Data Acquisition | ;SCADA Supervisory Control And Data Acquisition | ||
SCAP Security Content Automation Protocol | ;SCAP Security Content Automation Protocol | ||
SCP Smart Card Platform | ;SCP Smart Card Platform | ||
SIG Special Interest Group | ;SIG Special Interest Group | ||
SE Secure Element | ;SE Secure Element | ||
SECAM Study on Security Assurance Methodology (3GPP) | ;SECAM Study on Security Assurance Methodology (3GPP) | ||
SG 2 Study Group on Operational aspects (ITU-T) | ;SG 2 Study Group on Operational aspects (ITU-T) | ||
SG11 Study Group on Protocols and test specifications (ITU-T) | ;SG11 Study Group on Protocols and test specifications (ITU-T) | ||
SG13 Study Group on Future networks (ITU-T) | ;SG13 Study Group on Future networks (ITU-T) | ||
SG17 Study Group on Security (ITU-T) | ;SG17 Study Group on Security (ITU-T) | ||
SGDSN Secrétariat Général de la Défense et de la Sécurité Nationale (France) | ;SGDSN Secrétariat Général de la Défense et de la Sécurité Nationale (France) | ||
sidr secure inter-domain routing working group (IETF) | ;sidr secure inter-domain routing working group (IETF) | ||
SIEM Security Information and Event Management | ;SIEM Security Information and Event Management | ||
SIM Subscriber Identity Module, including USIM and ISIM (ETSI, 3GPP) | ;SIM Subscriber Identity Module, including USIM and ISIM (ETSI, 3GPP) | ||
SOC Security Operations Centre | ;SOC Security Operations Centre | ||
SPOC Single Point of Contact | ;SPOC Single Point of Contact | ||
SRK Storage Root Key (TCG) | ;SRK Storage Root Key (TCG) | ||
SSP Smart Secure Platform | ;SSP Smart Secure Platform | ||
stir secure telephone identity revisited working group (IETF) | ;stir secure telephone identity revisited working group (IETF) | ||
STIX Structured Threat Information eXpression | ;STIX Structured Threat Information eXpression | ||
TAXII Trusted Automated eXchange of Indicator Information | ;TAXII Trusted Automated eXchange of Indicator Information | ||
TBB Trusted Building Block (TCG) | ;TBB Trusted Building Block (TCG) | ||
TC Technical Committee | ;TC Technical Committee | ||
TCG Trusted Computing Group | ;TCG Trusted Computing Group | ||
TCP Transmission Control Protocol | ;TCP Transmission Control Protocol | ||
tcpinc TCP increased security working group (IETF) | ;tcpinc TCP increased security working group (IETF) | ||
TEE Trusted Execution Environment | ;TEE Trusted Execution Environment | ||
TLP Traffic Light Protocol | ;TLP Traffic Light Protocol | ||
TLS Transport Layer Security | ;TLS Transport Layer Security | ||
tls transport layer security working group (IETF) | ;tls transport layer security working group (IETF) | ||
TMI Trusted Multi-tenant Infrastructure (TCG) | ;TMI Trusted Multi-tenant Infrastructure (TCG) | ||
TNC Trusted Network Connect (TCG) | ;TNC Trusted Network Connect (TCG) | ||
TPM Trusted Platform Module (TCG) | ;TPM Trusted Platform Module (TCG) | ||
TPS Trusted Platform Support services (TCG) | ;TPS Trusted Platform Support services (TCG) | ||
trans public notary transparency (IETF) | ;trans public notary transparency (IETF) | ||
Trust Elevation electronic identity credential trust elevation methods (OASIS) | ;Trust Elevation electronic identity credential trust elevation methods (OASIS) | ||
TSS TPM Software Stack -or- TCG Software Stack (TCG) | ;TSS TPM Software Stack -or- TCG Software Stack (TCG) | ||
URI Uniform Resource Identifier | ;URI Uniform Resource Identifier | ||
uta using TLS in applications (IETF) | ;uta using TLS in applications (IETF) | ||
VDRX Vulnerability Reporting and Data eXchange SIG (FIRST) | ;VDRX Vulnerability Reporting and Data eXchange SIG (FIRST) | ||
W3C World Wide Web Consortium | ;W3C World Wide Web Consortium | ||
websec web security working group (IETF) | ;websec web security working group (IETF) | ||
wpkops web PKI OPS working group (IETF) | ;wpkops web PKI OPS working group (IETF) | ||
WS-SX Web Services Secure eXchange (OASIS) | ;WS-SX Web Services Secure eXchange (OASIS) | ||
XCCDF eXtensible Configuration Checklist Description Format | ;XCCDF eXtensible Configuration Checklist Description Format | ||
XDI XRI Data Interchange (OASIS) | ;XDI XRI Data Interchange (OASIS) | ||
XML eXtensible Markup Language | ;XML eXtensible Markup Language | ||
XSPA Cross-Enterprise Security and Privacy Authorization (OASIS) | ;XSPA Cross-Enterprise Security and Privacy Authorization (OASIS) |
Revision as of 14:19, 30 July 2021
- 3GPP
- 3rd Generation Partnership Project
- AC
- Authentication Code (TCG)
- ACDC
- Advanced Cyber Defence Centre
- AIK
- Attestation Identity Key (TCG)
- AIOTI
- Alliance of IOT Innovation
- AMSS
- Anti-Malware Support Services Working Group (IEEE)
- ANS Autorité Nationale de Sécurité (Belgium)
- ANSSI Agence Nationale de la Sécurité des Systèmes d'Information (France)
- APT Advanced Persistent Threat
- ARIB Association of Radio Industries and Businesses (Japan)
- ATT&CK™ Adversarial Tactics Techniques and Common Knowledge (MITRE)
- BLOB Binary Large OBject (TCG)
- BORE Break Once Run Everywhere (TCG)
- BYOD Bring Your Own Device
- CA Certification Authority
- CA/B Certificate of Authority/Browser Forum
- CACAO Collaborative Automated Course of Action Operations (OASIS)
- CAPEC Common Attack Pattern Enumeration and Classification
- CBM Confidence Building Measures
- CCC Chaos Computer Club
- CCDB Common Criteria Development Board
- CCDCOE NATO Cooperation Cyber Defence Center of Excellence
- CCE Common Configuration Enumeration
- CCRA Common Criteria Recognition Agreement
- CCSA China Communications Standards Association
- CCSB Centre pour Cyber Securité Belgique (Belgium)
- CD Cyber Defense
- CDT Centres for Doctoral Training (UK)
- CEEE Common Event Expression Exchange
- CEN Comité Européen de Normalisation
- CENELEC European Committee for Electrotechnical Standardization
- CEPOL European POLice College
- CESG Communications-Electronics Security Group (UK) (now NCSC)
- CFRG Crypto Forum Research Group
- CI Critical Infrastructure
- CIO Chief Information Officer
- CIP Critical Infrastructure Protection
- CIRT Computer Incident Response Team
- CIS Center for Internet Security
- CloudAuthZ Cloud Authorization (OASIS)
- CMK Certified Migration Key (TCG)
- CN subcommittee on Core Network (3GPP)
- CONNECT Directorate on Communications Networks, Content and Technology (EC)
- CPE Common Platform Enumeration
- CRTM Core Root of Trust for Measurement (TCG)
- CSA Cloud Security Association
- CSAF Common Security Advisory Framework (OASIS)
- CTI Cyber Threat Intelligence (OASIS)
- CVE Common Vulnerabilities and Exposures
- CVE-ID CVE IDentifier
- CVRF Common Vulnerability Reporting Format
- CVSS Common Vulnerability Scoring System
- CWE Common Weakness Enumeration
- CWRAF Common Weakness Risk Analysis Framework
- CWSS Common Weakness Scoring System
- CYBER Cybersecurity Technical Committee (ETSI)
- CYBEX Cybersecurity Information Exchange (ITU-T)
- CybOX Cyber Observable Expression
- CYIQL Cybersecurity Information Query Language
- DAA Direct Anonymous Attestation (TCG)
- DCE Dynamic root of trust for measurement Configuration Environment (TCG)
- D-CRTM Dynamic Core Root of Trust for Measurement (TCG)
- DDoS Distributed Denial of Service
- DL Dynamic Launch (TCG)
- DLME Dynamically Launched Measured Environment (TCG)
- DNS Domain Name System
- DoS Denial of Service
- dots DDoS open threat signaling (IETF)
- D-RTM Dynamic Root of Trust Measurement (TCG)
- DSS-X Digital Signature Services eXtended (OASIS)
- E2NA End-to-End Network Architectures (ETSI)
- EAP Extensible Authentication Protocol
- EBIOS Expression of Needs and Identification of Security Objectives
- EC European Commission
- ECI European Critical Infrastructure
- EI-ISAC Elections Infrastructure Information Sharing and Analysis Center
- ECRG Electronic Communications Reference Group (EC)
- ENFSI European Network of Forensic Institutes
- ENISA European Network and Information Security Agency
- EPCIP European Programme for Critical Infrastructure Protection
- ESI Electronic Signatures and Infrastructures (ETSI)
- ESRIM European Security Research & Innovation forum
- ETI Encrypted Traffic Inspection working group (IEEE)
- ETSI European Telecommunication Standards Institute
- EU European Union
- EU CSS EU CyberSecurity Strategy (EU)
- Europol European Police Office
- EVCERT Extended Validation Certificate
- FASG GSM Association Fraud and Security Working Group
- FIDO Fast IDentity Online
- FIPS Federal Information Processing Standards (USA)
- FIRST Forum of Incident Response and Security Teams
- GFCE Global Forum on Cyber Expertise
- GSMA GSM Association
- H2020 Horizon 2020
- HOME Directorate on Migration and Home Affairs (EC)
- HR Directorate on Human Resources and Security (EC)
- i2nsf interface to network security functions (IETF)
- IA Information Assurance
- IAB Internet Architecture Board
- IANA Internet Assigned Numbers Authority
- ICANN Internet Corporation for Assigned Names and Numbers
- ICASI Industry Consortium for Advancement of Security on the Internet
- ICE European Critical Infrastructure
- ICSG Industry Connections Security Group (IEEE)
- ICT Information and Communication Technology
- IE Internet Explorer
- IEEE Institute for Electrical and Electronic Engineers
- IETF Internet Engineering Task Force
- IMEI International Mobile station Equipment Identity
- IMS IP Multimedia Subsystem (3GPP)
- INRIA Institut national de recherche en sciences et technologies du numérique (France)
- IODEF Incident Object Description Exchange Format
- IP Internet Protocol
- ipsecme IP security maintenance and extensions working group (IETF)
- IRAP Information security Registered Assessors Program (Australia)
- IRTF Internet Research Task Force
- ISF Information Security Forum
- ISO International Organization for Standardization
- IT Information Technology
- ITU International Telecommunication Union
- ITU-T International Telecommunication Union - Telecommunication Standardization sector
- IXP Internet eXchange Point
- J-CAT Cybercrime Action Task Force (Europol)
- JRC Directorate on Joint Research Centre (EC)
- JSON JavaScript Object Notation
- JUST Directorate on Justice and Consumers (EC)
- kitten common authentication technology next generation working group (IETF)
- KMIP Key Management Interoperability Protocol (OASIS)
- LECC Law Enforcement/CSIRT Cooperation (FIRST)
- LI Lawful Interception
- lisp locator/ID separation protocol (IETF)
- MACCSA Multinational Alliance for Collaborative Cyber Situational Awareness
- MAEC Malware Attribute Enumeration and Characterization
- mile Managed incident lightweight exchange working group (IETF)
- MMDEF Malware Metadata Exchange Format Working Group (IEEE)
- MTS Methods for Testing and Specification (ETSI)
- NATO North Atlantic Treaty Organization
- NCP National Checklist Program
- NCSS National Encrypted traffic integration Strategies
- NCIRC NATO Communications and Information Agency
- NESAG Network Equipment Security Assurance Group (3GPP)
- NFV Network Functions Virtualisation (ETSI)
- NIS Network and Information Security (EU)
- NIST National Institute of Standards and Technology (USA)
- NTECH Network Technologies (ETSI)
- NV (Storage) Non-Volatile (shielded location) (TCG)
- NVD National Vulnerability Database (USA)
- nvo3 network virtualization overlays working group (IETF)
- OASIS Organization for the Advancement of Structured Information Standards
- oauth web authorization protocol working group (IETF)
- OMG Object Management Group
- OpenC2 Open Command and Control (OASIS)
- opsec operational security capabilities for IP network infrastructure working group (IETF)
- OS Operating System
- PC Personal Computer
- PCA Privacy CA (TCG)
- PCR Platform Configuration Register (TCG)
- PKCS Public-Key Cryptography Standards
- PKI Public Key Infrastructure
- PMRM Privacy Management Reference Model (OASIS)
- PrivEK Private Endorsement Key (TCG)
- PSN Public Sector Network
- PubEK Public Endorsement Key (TCG)
- RAN subcommittee on Radio Access Network (3GPP)
- RID Real-time Inter-network Defense
- RoT Root of Trust (component) (TCG)
- RTD Directorate on Research and Innovation (EC)
- RTM Root of Trust for Measurement (TCG)
- RTR Root of Trust for Reporting (TCG)
- RTS Root of Trust for Storage (TCG)
- SA2 Subcommittee on Architecture (3GPP)
- SA3 Subcommittee on Security (3GPP)
- SA5 Subcommittee on Telecom Management (3GPP)
- sacm security automation and continuous monitoring working group (IETF)
- SAGE Security Algorithms Group of Experts (ETSI)
- SAI Securing Artificial Intelligence (ETSI)
- SAML Security Services (OASIS)
- SANS SysAdmin, Audit, Networking, and Security
- SAS Security Assurance Specification (3GPP)
- SC27 ISO/IEC JTC1 Committee on Security techniques
- SC6 ISO/IEC JTC1 Committee on Telecommunications and information exchange between systems
- SC7 ISO/IEC JTC1 Committee on Software and systems engineering
- SCADA Supervisory Control And Data Acquisition
- SCAP Security Content Automation Protocol
- SCP Smart Card Platform
- SIG Special Interest Group
- SE Secure Element
- SECAM Study on Security Assurance Methodology (3GPP)
- SG 2 Study Group on Operational aspects (ITU-T)
- SG11 Study Group on Protocols and test specifications (ITU-T)
- SG13 Study Group on Future networks (ITU-T)
- SG17 Study Group on Security (ITU-T)
- SGDSN Secrétariat Général de la Défense et de la Sécurité Nationale (France)
- sidr secure inter-domain routing working group (IETF)
- SIEM Security Information and Event Management
- SIM Subscriber Identity Module, including USIM and ISIM (ETSI, 3GPP)
- SOC Security Operations Centre
- SPOC Single Point of Contact
- SRK Storage Root Key (TCG)
- SSP Smart Secure Platform
- stir secure telephone identity revisited working group (IETF)
- STIX Structured Threat Information eXpression
- TAXII Trusted Automated eXchange of Indicator Information
- TBB Trusted Building Block (TCG)
- TC Technical Committee
- TCG Trusted Computing Group
- TCP Transmission Control Protocol
- tcpinc TCP increased security working group (IETF)
- TEE Trusted Execution Environment
- TLP Traffic Light Protocol
- TLS Transport Layer Security
- tls transport layer security working group (IETF)
- TMI Trusted Multi-tenant Infrastructure (TCG)
- TNC Trusted Network Connect (TCG)
- TPM Trusted Platform Module (TCG)
- TPS Trusted Platform Support services (TCG)
- trans public notary transparency (IETF)
- Trust Elevation electronic identity credential trust elevation methods (OASIS)
- TSS TPM Software Stack -or- TCG Software Stack (TCG)
- URI Uniform Resource Identifier
- uta using TLS in applications (IETF)
- VDRX Vulnerability Reporting and Data eXchange SIG (FIRST)
- W3C World Wide Web Consortium
- websec web security working group (IETF)
- wpkops web PKI OPS working group (IETF)
- WS-SX Web Services Secure eXchange (OASIS)
- XCCDF eXtensible Configuration Checklist Description Format
- XDI XRI Data Interchange (OASIS)
- XML eXtensible Markup Language
- XSPA Cross-Enterprise Security and Privacy Authorization (OASIS)