Abbreviations: Difference between revisions

From ETI
(Created page with "; 3GPP: 3rd Generation Partnership Project ;AC: Authentication Code (TCG) ;ACDC: Advanced Cyber Defence Centre ;AIK: Attestation Identity Key (TCG) AIOTI Alliance of IOT Innov...")
 
No edit summary
 
(2 intermediate revisions by the same user not shown)
Line 3: Line 3:
;ACDC: Advanced Cyber Defence Centre
;ACDC: Advanced Cyber Defence Centre
;AIK: Attestation Identity Key (TCG)
;AIK: Attestation Identity Key (TCG)
AIOTI Alliance of IOT Innovation
;AIOTI: Alliance of IOT Innovation
AMSS Anti-Malware Support Services Working Group (IEEE)
;AMSS: Anti-Malware Support Services Working Group (IEEE)
ANS Autorité Nationale de Sécurité (Belgium)
;ANS: Autorité Nationale de Sécurité (Belgium)
ANSSI Agence Nationale de la Sécurité des Systèmes d'Information (France)
;ANSSI: Agence Nationale de la Sécurité des Systèmes d'Information (France)
APT Advanced Persistent Threat
;APT: Advanced Persistent Threat
ARIB Association of Radio Industries and Businesses (Japan)
;ARIB: Association of Radio Industries and Businesses (Japan)
ATT&CK™ Adversarial Tactics Techniques and Common Knowledge (MITRE)
;ATT&CK™: Adversarial Tactics Techniques and Common Knowledge (MITRE)
BLOB Binary Large OBject (TCG)
;BLOB: Binary Large OBject (TCG)
BORE Break Once Run Everywhere (TCG)
;BORE: Break Once Run Everywhere (TCG)
BYOD Bring Your Own Device
;BYOD: Bring Your Own Device
CA Certification Authority
;CA: Certification Authority
CA/B Certificate of Authority/Browser Forum
;CA/B: Certificate of Authority/Browser Forum
CACAO Collaborative Automated Course of Action Operations (OASIS)
;CACAO: Collaborative Automated Course of Action Operations (OASIS)
CAPEC Common Attack Pattern Enumeration and Classification
;CAPEC: Common Attack Pattern Enumeration and Classification
CBM Confidence Building Measures
;CBM: Confidence Building Measures
CCC Chaos Computer Club
;CCC: Chaos Computer Club
CCDB Common Criteria Development Board
;CCDB: Common Criteria Development Board
CCDCOE NATO Cooperation Cyber Defence Center of Excellence
;CCDCOE: NATO Cooperation Cyber Defence Center of Excellence
CCE Common Configuration Enumeration
;CCE: Common Configuration Enumeration
CCRA Common Criteria Recognition Agreement
;CCRA: Common Criteria Recognition Agreement
CCSA China Communications Standards Association
;CCSA: China Communications Standards Association
CCSB Centre pour Cyber Securité Belgique (Belgium)
;CCSB: Centre pour Cyber Securité Belgique (Belgium)
CD Cyber Defense
;CD: Cyber Defense
CDT Centres for Doctoral Training (UK)
;CDT: Centres for Doctoral Training (UK)
CEEE Common Event Expression Exchange
;CEEE: Common Event Expression Exchange
CEN Comité Européen de Normalisation
;CEN: Comité Européen de Normalisation
CENELEC European Committee for Electrotechnical Standardization
;CENELEC: European Committee for Electrotechnical Standardization
CEPOL European POLice College
;CEPOL: European POLice College
CESG Communications-Electronics Security Group (UK) (now NCSC)
;CESG: Communications-Electronics Security Group (UK) (now NCSC)
CFRG Crypto Forum Research Group
;CFRG: Crypto Forum Research Group
CI Critical Infrastructure
;CI: Critical Infrastructure
CIO Chief Information Officer
;CIO: Chief Information Officer
CIP Critical Infrastructure Protection
;CIP: Critical Infrastructure Protection
CIRT Computer Incident Response Team
;CIRT: Computer Incident Response Team
CIS Center for Internet Security
;CIS: Center for Internet Security
CloudAuthZ Cloud Authorization (OASIS)
;CloudAuthZ: Cloud Authorization (OASIS)
CMK Certified Migration Key (TCG)
;CMK: Certified Migration Key (TCG)
CN subcommittee on Core Network (3GPP)
;CN: subcommittee on Core Network (3GPP)
CONNECT Directorate on Communications Networks, Content and Technology (EC)
;CONNECT: Directorate on Communications Networks, Content and Technology (EC)
CPE Common Platform Enumeration
;CPE: Common Platform Enumeration
CRTM Core Root of Trust for Measurement (TCG)
;CRTM: Core Root of Trust for Measurement (TCG)
CSA Cloud Security Association
;CSA: Cloud Security Association
CSAF Common Security Advisory Framework (OASIS)
;CSAF: Common Security Advisory Framework (OASIS)
CTI Cyber Threat Intelligence (OASIS)
;CTI: Cyber Threat Intelligence (OASIS)
CVE Common Vulnerabilities and Exposures
;CVE: Common Vulnerabilities and Exposures
CVE-ID CVE IDentifier
;CVE-ID: CVE IDentifier
CVRF Common Vulnerability Reporting Format
;CVRF: Common Vulnerability Reporting Format
CVSS Common Vulnerability Scoring System
;CVSS: Common Vulnerability Scoring System
CWE Common Weakness Enumeration
;CWE: Common Weakness Enumeration
CWRAF Common Weakness Risk Analysis Framework
;CWRAF: Common Weakness Risk Analysis Framework
CWSS Common Weakness Scoring System
;CWSS: Common Weakness Scoring System
CYBER Cybersecurity Technical Committee (ETSI)
;CYBER: Cybersecurity Technical Committee (ETSI)
CYBEX Cybersecurity Information Exchange (ITU-T)
;CYBEX: Cybersecurity Information Exchange (ITU-T)
CybOX Cyber Observable Expression
;CybOX: Cyber Observable Expression
CYIQL Cybersecurity Information Query Language
;CYIQL: Cybersecurity Information Query Language
DAA Direct Anonymous Attestation (TCG)
;DAA: Direct Anonymous Attestation (TCG)
DCE Dynamic root of trust for measurement Configuration Environment (TCG)
;DCE: Dynamic root of trust for measurement Configuration Environment (TCG)
D-CRTM Dynamic Core Root of Trust for Measurement (TCG)
;D-CRTM: Dynamic Core Root of Trust for Measurement (TCG)
DDoS Distributed Denial of Service
;DDoS: Distributed Denial of Service
DL Dynamic Launch (TCG)
;DL: Dynamic Launch (TCG)
DLME Dynamically Launched Measured Environment (TCG)
;DLME: Dynamically Launched Measured Environment (TCG)
DNS Domain Name System
;DNS: Domain Name System
DoS Denial of Service
;DoS: Denial of Service
dots DDoS open threat signaling (IETF)
;dots: DDoS open threat signaling (IETF)
D-RTM Dynamic Root of Trust Measurement (TCG)
;D-RTM: Dynamic Root of Trust Measurement (TCG)
DSS-X Digital Signature Services eXtended (OASIS)
;DSS-X: Digital Signature Services eXtended (OASIS)
E2NA End-to-End Network Architectures (ETSI)
;E2NA: End-to-End Network Architectures (ETSI)
EAP Extensible Authentication Protocol
;EAP: Extensible Authentication Protocol
EBIOS Expression of Needs and Identification of Security Objectives
;EBIOS: Expression of Needs and Identification of Security Objectives
EC European Commission
;EC: European Commission
ECI European Critical Infrastructure
;ECI: European Critical Infrastructure
EI-ISAC Elections Infrastructure Information Sharing and Analysis Center
;EI-ISAC: Elections Infrastructure Information Sharing and Analysis Center
ECRG Electronic Communications Reference Group (EC)
;ECRG: Electronic Communications Reference Group (EC)
ENFSI European Network of Forensic Institutes
;ENFSI: European Network of Forensic Institutes
ENISA European Network and Information Security Agency
;ENISA: European Network and Information Security Agency
EPCIP European Programme for Critical Infrastructure Protection
;EPCIP: European Programme for Critical Infrastructure Protection
ESI Electronic Signatures and Infrastructures (ETSI)
;ESI: Electronic Signatures and Infrastructures (ETSI)
ESRIM European Security Research & Innovation forum
;ESRIM: European Security Research & Innovation forum
ETI Encrypted Traffic Inspection working group (IEEE)
;ETI: Encrypted Traffic Inspection working group (IEEE)
ETSI European Telecommunication Standards Institute
;ETSI: European Telecommunication Standards Institute
EU European Union
;EU: European Union
EU CSS EU CyberSecurity Strategy (EU)
;EU CSS: EU CyberSecurity Strategy (EU)
Europol European Police Office
;Europol: European Police Office
EVCERT Extended Validation Certificate
;EVCERT: Extended Validation Certificate
FASG GSM Association Fraud and Security Working Group
;FASG: GSM Association Fraud and Security Working Group
FIDO Fast IDentity Online
;FIDO: Fast IDentity Online
FIPS Federal Information Processing Standards (USA)
;FIPS: Federal Information Processing Standards (USA)
FIRST Forum of Incident Response and Security Teams
;FIRST: Forum of Incident Response and Security Teams
GFCE Global Forum on Cyber Expertise
;GFCE: Global Forum on Cyber Expertise
GSMA GSM Association
;GSMA: GSM Association
H2020 Horizon 2020
;H2020: Horizon 2020
HOME Directorate on Migration and Home Affairs (EC)
;HOME: Directorate on Migration and Home Affairs (EC)
HR Directorate on Human Resources and Security (EC)
;HR: Directorate on Human Resources and Security (EC)
i2nsf interface to network security functions (IETF)
;i2nsf: interface to network security functions (IETF)
IA Information Assurance
;IA: Information Assurance
IAB Internet Architecture Board
;IAB: Internet Architecture Board
IANA Internet Assigned Numbers Authority
;IANA: Internet Assigned Numbers Authority
ICANN Internet Corporation for Assigned Names and Numbers
;ICANN: Internet Corporation for Assigned Names and Numbers
ICASI Industry Consortium for Advancement of Security on the Internet
;ICASI: Industry Consortium for Advancement of Security on the Internet
ICE European Critical Infrastructure
;ICE: European Critical Infrastructure
ICSG Industry Connections Security Group (IEEE)
;ICSG: Industry Connections Security Group (IEEE)
ICT Information and Communication Technology
;ICT: Information and Communication Technology
IE Internet Explorer
;IE: Internet Explorer
IEEE Institute for Electrical and Electronic Engineers
;IEEE: Institute for Electrical and Electronic Engineers
IETF Internet Engineering Task Force
;IETF: Internet Engineering Task Force
IMEI International Mobile station Equipment Identity
;IMEI: International Mobile station Equipment Identity
IMS IP Multimedia Subsystem (3GPP)
;IMS: IP Multimedia Subsystem (3GPP)
INRIA Institut national de recherche en sciences et technologies du numérique (France)
;INRIA: Institut national de recherche en sciences et technologies du numérique (France)
IODEF Incident Object Description Exchange Format
;IODEF: Incident Object Description Exchange Format
IP Internet Protocol
;IP: Internet Protocol
ipsecme IP security maintenance and extensions working group (IETF)
;ipsecme: IP security maintenance and extensions working group (IETF)
IRAP Information security Registered Assessors Program (Australia)
;IRAP: Information security Registered Assessors Program (Australia)
IRTF Internet Research Task Force
;IRTF: Internet Research Task Force
ISF Information Security Forum
;ISF: Information Security Forum
ISO International Organization for Standardization
;ISO: International Organization for Standardization
IT Information Technology
;IT: Information Technology
ITU International Telecommunication Union
;ITU: International Telecommunication Union
ITU-T International Telecommunication Union - Telecommunication Standardization sector
;ITU-T: International Telecommunication Union - Telecommunication Standardization sector
IXP Internet eXchange Point
;IXP: Internet eXchange Point
J-CAT Cybercrime Action Task Force (Europol)
;J-CAT: Cybercrime Action Task Force (Europol)
JRC Directorate on Joint Research Centre (EC)
;JRC: Directorate on Joint Research Centre (EC)
JSON JavaScript Object Notation
;JSON: JavaScript Object Notation
JUST Directorate on Justice and Consumers (EC)
;JUST: Directorate on Justice and Consumers (EC)
kitten common authentication technology next generation working group (IETF)
;kitten: common authentication technology next generation working group (IETF)
KMIP Key Management Interoperability Protocol (OASIS)
;KMIP: Key Management Interoperability Protocol (OASIS)
LECC Law Enforcement/CSIRT Cooperation (FIRST)
;LECC: Law Enforcement/CSIRT Cooperation (FIRST)
LI Lawful Interception
;LI: Lawful Interception
lisp locator/ID separation protocol (IETF)
;lisp: locator/ID separation protocol (IETF)
MACCSA Multinational Alliance for Collaborative Cyber Situational Awareness
;MACCSA: Multinational Alliance for Collaborative Cyber Situational Awareness
MAEC Malware Attribute Enumeration and Characterization
;MAEC: Malware Attribute Enumeration and Characterization
mile Managed incident lightweight exchange working group (IETF)
;mile: Managed incident lightweight exchange working group (IETF)
MMDEF Malware Metadata Exchange Format Working Group (IEEE)
;MMDEF: Malware Metadata Exchange Format Working Group (IEEE)
MTS Methods for Testing and Specification (ETSI)
;MTS: Methods for Testing and Specification (ETSI)
NATO North Atlantic Treaty Organization
;NATO: North Atlantic Treaty Organization
NCP National Checklist Program
;NCP: National Checklist Program
NCSS National Encrypted traffic integration Strategies
;NCSS: National Encrypted traffic integration Strategies
NCIRC NATO Communications and Information Agency
;NCIRC: NATO Communications and Information Agency
NESAG Network Equipment Security Assurance Group (3GPP)
;NESAG: Network Equipment Security Assurance Group (3GPP)
NFV Network Functions Virtualisation (ETSI)
;NFV: Network Functions Virtualisation (ETSI)
NIS Network and Information Security (EU)
;NIS: Network and Information Security (EU)
NIST National Institute of Standards and Technology (USA)
;NIST: National Institute of Standards and Technology (USA)
NTECH Network Technologies (ETSI)
;NTECH: Network Technologies (ETSI)
NV (Storage) Non-Volatile (shielded location) (TCG)
;NV (Storage): Non-Volatile (shielded location) (TCG)
NVD National Vulnerability Database (USA)
;NVD: National Vulnerability Database (USA)
nvo3 network virtualization overlays working group (IETF)
;nvo3: network virtualization overlays working group (IETF)
OASIS Organization for the Advancement of Structured Information Standards
;OASIS: Organization for the Advancement of Structured Information Standards
oauth web authorization protocol working group (IETF)
;oauth: web authorization protocol working group (IETF)
OMG Object Management Group
;OMG: Object Management Group
OpenC2 Open Command and Control (OASIS)
;OpenC2: Open Command and Control (OASIS)
opsec operational security capabilities for IP network infrastructure working group (IETF)
;opsec: operational security capabilities for IP network infrastructure working group (IETF)
OS Operating System
;OS: Operating System
PC Personal Computer
;PC: Personal Computer
PCA Privacy CA (TCG)
;PCA: Privacy CA (TCG)
PCR Platform Configuration Register (TCG)
;PCR: Platform Configuration Register (TCG)
PKCS Public-Key Cryptography Standards
;PKCS: Public-Key Cryptography Standards
PKI Public Key Infrastructure
;PKI: Public Key Infrastructure
PMRM Privacy Management Reference Model (OASIS)
;PMRM: Privacy Management Reference Model (OASIS)
PrivEK Private Endorsement Key (TCG)
;PrivEK: Private Endorsement Key (TCG)
PSN Public Sector Network
;PSN: Public Sector Network
PubEK Public Endorsement Key (TCG)
;PubEK: Public Endorsement Key (TCG)
RAN subcommittee on Radio Access Network (3GPP)
;RAN: subcommittee on Radio Access Network (3GPP)
RID Real-time Inter-network Defense
;RID: Real-time Inter-network Defense
RoT Root of Trust (component) (TCG)
;RoT: Root of Trust (component) (TCG)
RTD Directorate on Research and Innovation (EC)
;RTD: Directorate on Research and Innovation (EC)
RTM Root of Trust for Measurement (TCG)
;RTM: Root of Trust for Measurement (TCG)
RTR Root of Trust for Reporting (TCG)
;RTR: Root of Trust for Reporting (TCG)
RTS Root of Trust for Storage (TCG)
;RTS: Root of Trust for Storage (TCG)
SA2 Subcommittee on Architecture (3GPP)
;SA2: Subcommittee on Architecture (3GPP)
SA3 Subcommittee on Security (3GPP)
;SA3: Subcommittee on Security (3GPP)
SA5 Subcommittee on Telecom Management (3GPP)
;SA5: Subcommittee on Telecom Management (3GPP)
sacm security automation and continuous monitoring working group (IETF)
;sacm: security automation and continuous monitoring working group (IETF)
SAGE Security Algorithms Group of Experts (ETSI)
;SAGE: Security Algorithms Group of Experts (ETSI)
SAI Securing Artificial Intelligence (ETSI)
;SAI: Securing Artificial Intelligence (ETSI)
SAML Security Services (OASIS)
;SAML: Security Services (OASIS)
SANS SysAdmin, Audit, Networking, and Security
;SANS: SysAdmin, Audit, Networking, and Security
SAS Security Assurance Specification (3GPP)
;SAS: Security Assurance Specification (3GPP)
SC27 ISO/IEC JTC1 Committee on Security techniques
;SC27: ISO/IEC JTC1 Committee on Security techniques
SC6 ISO/IEC JTC1 Committee on Telecommunications and information exchange between systems
;SC6: ISO/IEC JTC1 Committee on Telecommunications and information exchange between systems
SC7 ISO/IEC JTC1 Committee on Software and systems engineering
;SC7: ISO/IEC JTC1 Committee on Software and systems engineering
SCADA Supervisory Control And Data Acquisition
;SCADA: Supervisory Control And Data Acquisition
SCAP Security Content Automation Protocol
;SCAP: Security Content Automation Protocol
SCP Smart Card Platform
;SCP: Smart Card Platform
SIG Special Interest Group
;SIG: Special Interest Group
SE Secure Element
;SE: Secure Element
SECAM Study on Security Assurance Methodology (3GPP)
;SECAM: Study on Security Assurance Methodology (3GPP)
SG 2 Study Group on Operational aspects (ITU-T)
;SG 2: Study Group on Operational aspects (ITU-T)
SG11 Study Group on Protocols and test specifications (ITU-T)
;SG11: Study Group on Protocols and test specifications (ITU-T)
SG13 Study Group on Future networks (ITU-T)
;SG13: Study Group on Future networks (ITU-T)
SG17 Study Group on Security (ITU-T)
;SG17: Study Group on Security (ITU-T)
SGDSN Secrétariat Général de la Défense et de la Sécurité Nationale (France)
;SGDSN: Secrétariat Général de la Défense et de la Sécurité Nationale (France)
sidr secure inter-domain routing working group (IETF)
;sidr: secure inter-domain routing working group (IETF)
SIEM Security Information and Event Management
;SIEM: Security Information and Event Management
SIM Subscriber Identity Module, including USIM and ISIM (ETSI, 3GPP)
;SIM: Subscriber Identity Module, including USIM and ISIM (ETSI, 3GPP)
SOC Security Operations Centre
;SOC: Security Operations Centre
SPOC Single Point of Contact
;SPOC: Single Point of Contact
SRK Storage Root Key (TCG)
;SRK: Storage Root Key (TCG)
SSP Smart Secure Platform
;SSP: Smart Secure Platform
stir secure telephone identity revisited working group (IETF)
;stir: secure telephone identity revisited working group (IETF)
STIX Structured Threat Information eXpression
;STIX: Structured Threat Information eXpression
TAXII Trusted Automated eXchange of Indicator Information
;TAXII: Trusted Automated eXchange of Indicator Information
TBB Trusted Building Block (TCG)
;TBB: Trusted Building Block (TCG)
TC Technical Committee
;TC: Technical Committee
TCG Trusted Computing Group
;TCG: Trusted Computing Group
TCP Transmission Control Protocol
;TCP: Transmission Control Protocol
tcpinc TCP increased security working group (IETF)
;tcpinc: TCP increased security working group (IETF)
TEE Trusted Execution Environment
;TEE: Trusted Execution Environment
TLP Traffic Light Protocol
;TLP: Traffic Light Protocol
TLS Transport Layer Security
;TLS: Transport Layer Security
tls transport layer security working group (IETF)
;tls: transport layer security working group (IETF)
TMI Trusted Multi-tenant Infrastructure (TCG)
;TMI: Trusted Multi-tenant Infrastructure (TCG)
TNC Trusted Network Connect (TCG)
;TNC: Trusted Network Connect (TCG)
TPM Trusted Platform Module (TCG)
;TPM: Trusted Platform Module (TCG)
TPS Trusted Platform Support services (TCG)
;TPS: Trusted Platform Support services (TCG)
trans public notary transparency (IETF)
;trans: public notary transparency (IETF)
Trust Elevation electronic identity credential trust elevation methods (OASIS)
;Trust Elevation: electronic identity credential trust elevation methods (OASIS)
TSS TPM Software Stack -or- TCG Software Stack (TCG)
;TSS: TPM Software Stack -or- TCG Software Stack (TCG)
URI Uniform Resource Identifier
;URI: Uniform Resource Identifier
uta using TLS in applications (IETF)
;uta: using TLS in applications (IETF)
VDRX Vulnerability Reporting and Data eXchange SIG (FIRST)
;VDRX: Vulnerability Reporting and Data eXchange SIG (FIRST)
W3C World Wide Web Consortium
;W3C: World Wide Web Consortium
websec web security working group (IETF)
;websec: web security working group (IETF)
wpkops web PKI OPS working group (IETF)
;wpkops: web PKI OPS working group (IETF)
WS-SX Web Services Secure eXchange (OASIS)
;WS-SX: Web Services Secure eXchange (OASIS)
XCCDF eXtensible Configuration Checklist Description Format
;XCCDF: eXtensible Configuration Checklist Description Format
XDI XRI Data Interchange (OASIS)
;XDI: XRI Data Interchange (OASIS)
XML eXtensible Markup Language
;XML: eXtensible Markup Language
XSPA Cross-Enterprise Security and Privacy Authorization (OASIS)
;XSPA: Cross-Enterprise Security and Privacy Authorization (OASIS)

Latest revision as of 13:26, 30 July 2021

3GPP
3rd Generation Partnership Project
AC
Authentication Code (TCG)
ACDC
Advanced Cyber Defence Centre
AIK
Attestation Identity Key (TCG)
AIOTI
Alliance of IOT Innovation
AMSS
Anti-Malware Support Services Working Group (IEEE)
ANS
Autorité Nationale de Sécurité (Belgium)
ANSSI
Agence Nationale de la Sécurité des Systèmes d'Information (France)
APT
Advanced Persistent Threat
ARIB
Association of Radio Industries and Businesses (Japan)
ATT&CK™
Adversarial Tactics Techniques and Common Knowledge (MITRE)
BLOB
Binary Large OBject (TCG)
BORE
Break Once Run Everywhere (TCG)
BYOD
Bring Your Own Device
CA
Certification Authority
CA/B
Certificate of Authority/Browser Forum
CACAO
Collaborative Automated Course of Action Operations (OASIS)
CAPEC
Common Attack Pattern Enumeration and Classification
CBM
Confidence Building Measures
CCC
Chaos Computer Club
CCDB
Common Criteria Development Board
CCDCOE
NATO Cooperation Cyber Defence Center of Excellence
CCE
Common Configuration Enumeration
CCRA
Common Criteria Recognition Agreement
CCSA
China Communications Standards Association
CCSB
Centre pour Cyber Securité Belgique (Belgium)
CD
Cyber Defense
CDT
Centres for Doctoral Training (UK)
CEEE
Common Event Expression Exchange
CEN
Comité Européen de Normalisation
CENELEC
European Committee for Electrotechnical Standardization
CEPOL
European POLice College
CESG
Communications-Electronics Security Group (UK) (now NCSC)
CFRG
Crypto Forum Research Group
CI
Critical Infrastructure
CIO
Chief Information Officer
CIP
Critical Infrastructure Protection
CIRT
Computer Incident Response Team
CIS
Center for Internet Security
CloudAuthZ
Cloud Authorization (OASIS)
CMK
Certified Migration Key (TCG)
CN
subcommittee on Core Network (3GPP)
CONNECT
Directorate on Communications Networks, Content and Technology (EC)
CPE
Common Platform Enumeration
CRTM
Core Root of Trust for Measurement (TCG)
CSA
Cloud Security Association
CSAF
Common Security Advisory Framework (OASIS)
CTI
Cyber Threat Intelligence (OASIS)
CVE
Common Vulnerabilities and Exposures
CVE-ID
CVE IDentifier
CVRF
Common Vulnerability Reporting Format
CVSS
Common Vulnerability Scoring System
CWE
Common Weakness Enumeration
CWRAF
Common Weakness Risk Analysis Framework
CWSS
Common Weakness Scoring System
CYBER
Cybersecurity Technical Committee (ETSI)
CYBEX
Cybersecurity Information Exchange (ITU-T)
CybOX
Cyber Observable Expression
CYIQL
Cybersecurity Information Query Language
DAA
Direct Anonymous Attestation (TCG)
DCE
Dynamic root of trust for measurement Configuration Environment (TCG)
D-CRTM
Dynamic Core Root of Trust for Measurement (TCG)
DDoS
Distributed Denial of Service
DL
Dynamic Launch (TCG)
DLME
Dynamically Launched Measured Environment (TCG)
DNS
Domain Name System
DoS
Denial of Service
dots
DDoS open threat signaling (IETF)
D-RTM
Dynamic Root of Trust Measurement (TCG)
DSS-X
Digital Signature Services eXtended (OASIS)
E2NA
End-to-End Network Architectures (ETSI)
EAP
Extensible Authentication Protocol
EBIOS
Expression of Needs and Identification of Security Objectives
EC
European Commission
ECI
European Critical Infrastructure
EI-ISAC
Elections Infrastructure Information Sharing and Analysis Center
ECRG
Electronic Communications Reference Group (EC)
ENFSI
European Network of Forensic Institutes
ENISA
European Network and Information Security Agency
EPCIP
European Programme for Critical Infrastructure Protection
ESI
Electronic Signatures and Infrastructures (ETSI)
ESRIM
European Security Research & Innovation forum
ETI
Encrypted Traffic Inspection working group (IEEE)
ETSI
European Telecommunication Standards Institute
EU
European Union
EU CSS
EU CyberSecurity Strategy (EU)
Europol
European Police Office
EVCERT
Extended Validation Certificate
FASG
GSM Association Fraud and Security Working Group
FIDO
Fast IDentity Online
FIPS
Federal Information Processing Standards (USA)
FIRST
Forum of Incident Response and Security Teams
GFCE
Global Forum on Cyber Expertise
GSMA
GSM Association
H2020
Horizon 2020
HOME
Directorate on Migration and Home Affairs (EC)
HR
Directorate on Human Resources and Security (EC)
i2nsf
interface to network security functions (IETF)
IA
Information Assurance
IAB
Internet Architecture Board
IANA
Internet Assigned Numbers Authority
ICANN
Internet Corporation for Assigned Names and Numbers
ICASI
Industry Consortium for Advancement of Security on the Internet
ICE
European Critical Infrastructure
ICSG
Industry Connections Security Group (IEEE)
ICT
Information and Communication Technology
IE
Internet Explorer
IEEE
Institute for Electrical and Electronic Engineers
IETF
Internet Engineering Task Force
IMEI
International Mobile station Equipment Identity
IMS
IP Multimedia Subsystem (3GPP)
INRIA
Institut national de recherche en sciences et technologies du numérique (France)
IODEF
Incident Object Description Exchange Format
IP
Internet Protocol
ipsecme
IP security maintenance and extensions working group (IETF)
IRAP
Information security Registered Assessors Program (Australia)
IRTF
Internet Research Task Force
ISF
Information Security Forum
ISO
International Organization for Standardization
IT
Information Technology
ITU
International Telecommunication Union
ITU-T
International Telecommunication Union - Telecommunication Standardization sector
IXP
Internet eXchange Point
J-CAT
Cybercrime Action Task Force (Europol)
JRC
Directorate on Joint Research Centre (EC)
JSON
JavaScript Object Notation
JUST
Directorate on Justice and Consumers (EC)
kitten
common authentication technology next generation working group (IETF)
KMIP
Key Management Interoperability Protocol (OASIS)
LECC
Law Enforcement/CSIRT Cooperation (FIRST)
LI
Lawful Interception
lisp
locator/ID separation protocol (IETF)
MACCSA
Multinational Alliance for Collaborative Cyber Situational Awareness
MAEC
Malware Attribute Enumeration and Characterization
mile
Managed incident lightweight exchange working group (IETF)
MMDEF
Malware Metadata Exchange Format Working Group (IEEE)
MTS
Methods for Testing and Specification (ETSI)
NATO
North Atlantic Treaty Organization
NCP
National Checklist Program
NCSS
National Encrypted traffic integration Strategies
NCIRC
NATO Communications and Information Agency
NESAG
Network Equipment Security Assurance Group (3GPP)
NFV
Network Functions Virtualisation (ETSI)
NIS
Network and Information Security (EU)
NIST
National Institute of Standards and Technology (USA)
NTECH
Network Technologies (ETSI)
NV (Storage)
Non-Volatile (shielded location) (TCG)
NVD
National Vulnerability Database (USA)
nvo3
network virtualization overlays working group (IETF)
OASIS
Organization for the Advancement of Structured Information Standards
oauth
web authorization protocol working group (IETF)
OMG
Object Management Group
OpenC2
Open Command and Control (OASIS)
opsec
operational security capabilities for IP network infrastructure working group (IETF)
OS
Operating System
PC
Personal Computer
PCA
Privacy CA (TCG)
PCR
Platform Configuration Register (TCG)
PKCS
Public-Key Cryptography Standards
PKI
Public Key Infrastructure
PMRM
Privacy Management Reference Model (OASIS)
PrivEK
Private Endorsement Key (TCG)
PSN
Public Sector Network
PubEK
Public Endorsement Key (TCG)
RAN
subcommittee on Radio Access Network (3GPP)
RID
Real-time Inter-network Defense
RoT
Root of Trust (component) (TCG)
RTD
Directorate on Research and Innovation (EC)
RTM
Root of Trust for Measurement (TCG)
RTR
Root of Trust for Reporting (TCG)
RTS
Root of Trust for Storage (TCG)
SA2
Subcommittee on Architecture (3GPP)
SA3
Subcommittee on Security (3GPP)
SA5
Subcommittee on Telecom Management (3GPP)
sacm
security automation and continuous monitoring working group (IETF)
SAGE
Security Algorithms Group of Experts (ETSI)
SAI
Securing Artificial Intelligence (ETSI)
SAML
Security Services (OASIS)
SANS
SysAdmin, Audit, Networking, and Security
SAS
Security Assurance Specification (3GPP)
SC27
ISO/IEC JTC1 Committee on Security techniques
SC6
ISO/IEC JTC1 Committee on Telecommunications and information exchange between systems
SC7
ISO/IEC JTC1 Committee on Software and systems engineering
SCADA
Supervisory Control And Data Acquisition
SCAP
Security Content Automation Protocol
SCP
Smart Card Platform
SIG
Special Interest Group
SE
Secure Element
SECAM
Study on Security Assurance Methodology (3GPP)
SG 2
Study Group on Operational aspects (ITU-T)
SG11
Study Group on Protocols and test specifications (ITU-T)
SG13
Study Group on Future networks (ITU-T)
SG17
Study Group on Security (ITU-T)
SGDSN
Secrétariat Général de la Défense et de la Sécurité Nationale (France)
sidr
secure inter-domain routing working group (IETF)
SIEM
Security Information and Event Management
SIM
Subscriber Identity Module, including USIM and ISIM (ETSI, 3GPP)
SOC
Security Operations Centre
SPOC
Single Point of Contact
SRK
Storage Root Key (TCG)
SSP
Smart Secure Platform
stir
secure telephone identity revisited working group (IETF)
STIX
Structured Threat Information eXpression
TAXII
Trusted Automated eXchange of Indicator Information
TBB
Trusted Building Block (TCG)
TC
Technical Committee
TCG
Trusted Computing Group
TCP
Transmission Control Protocol
tcpinc
TCP increased security working group (IETF)
TEE
Trusted Execution Environment
TLP
Traffic Light Protocol
TLS
Transport Layer Security
tls
transport layer security working group (IETF)
TMI
Trusted Multi-tenant Infrastructure (TCG)
TNC
Trusted Network Connect (TCG)
TPM
Trusted Platform Module (TCG)
TPS
Trusted Platform Support services (TCG)
trans
public notary transparency (IETF)
Trust Elevation
electronic identity credential trust elevation methods (OASIS)
TSS
TPM Software Stack -or- TCG Software Stack (TCG)
URI
Uniform Resource Identifier
uta
using TLS in applications (IETF)
VDRX
Vulnerability Reporting and Data eXchange SIG (FIRST)
W3C
World Wide Web Consortium
websec
web security working group (IETF)
wpkops
web PKI OPS working group (IETF)
WS-SX
Web Services Secure eXchange (OASIS)
XCCDF
eXtensible Configuration Checklist Description Format
XDI
XRI Data Interchange (OASIS)
XML
eXtensible Markup Language
XSPA
Cross-Enterprise Security and Privacy Authorization (OASIS)