Abbreviations: Difference between revisions
No edit summary |
No edit summary |
||
(One intermediate revision by the same user not shown) | |||
Line 5: | Line 5: | ||
;AIOTI: Alliance of IOT Innovation | ;AIOTI: Alliance of IOT Innovation | ||
;AMSS: Anti-Malware Support Services Working Group (IEEE) | ;AMSS: Anti-Malware Support Services Working Group (IEEE) | ||
;ANS Autorité Nationale de Sécurité (Belgium) | ;ANS: Autorité Nationale de Sécurité (Belgium) | ||
;ANSSI Agence Nationale de la Sécurité des Systèmes d'Information (France) | ;ANSSI: Agence Nationale de la Sécurité des Systèmes d'Information (France) | ||
;APT Advanced Persistent Threat | ;APT: Advanced Persistent Threat | ||
;ARIB Association of Radio Industries and Businesses (Japan) | ;ARIB: Association of Radio Industries and Businesses (Japan) | ||
;ATT&CK™ Adversarial Tactics Techniques and Common Knowledge (MITRE) | ;ATT&CK™: Adversarial Tactics Techniques and Common Knowledge (MITRE) | ||
;BLOB Binary Large OBject (TCG) | ;BLOB: Binary Large OBject (TCG) | ||
;BORE Break Once Run Everywhere (TCG) | ;BORE: Break Once Run Everywhere (TCG) | ||
;BYOD Bring Your Own Device | ;BYOD: Bring Your Own Device | ||
;CA Certification Authority | ;CA: Certification Authority | ||
;CA/B Certificate of Authority/Browser Forum | ;CA/B: Certificate of Authority/Browser Forum | ||
;CACAO Collaborative Automated Course of Action Operations (OASIS) | ;CACAO: Collaborative Automated Course of Action Operations (OASIS) | ||
;CAPEC Common Attack Pattern Enumeration and Classification | ;CAPEC: Common Attack Pattern Enumeration and Classification | ||
;CBM Confidence Building Measures | ;CBM: Confidence Building Measures | ||
;CCC Chaos Computer Club | ;CCC: Chaos Computer Club | ||
;CCDB Common Criteria Development Board | ;CCDB: Common Criteria Development Board | ||
;CCDCOE NATO Cooperation Cyber Defence Center of Excellence | ;CCDCOE: NATO Cooperation Cyber Defence Center of Excellence | ||
;CCE Common Configuration Enumeration | ;CCE: Common Configuration Enumeration | ||
;CCRA Common Criteria Recognition Agreement | ;CCRA: Common Criteria Recognition Agreement | ||
;CCSA China Communications Standards Association | ;CCSA: China Communications Standards Association | ||
;CCSB Centre pour Cyber Securité Belgique (Belgium) | ;CCSB: Centre pour Cyber Securité Belgique (Belgium) | ||
;CD Cyber Defense | ;CD: Cyber Defense | ||
;CDT Centres for Doctoral Training (UK) | ;CDT: Centres for Doctoral Training (UK) | ||
;CEEE Common Event Expression Exchange | ;CEEE: Common Event Expression Exchange | ||
;CEN Comité Européen de Normalisation | ;CEN: Comité Européen de Normalisation | ||
;CENELEC European Committee for Electrotechnical Standardization | ;CENELEC: European Committee for Electrotechnical Standardization | ||
;CEPOL European POLice College | ;CEPOL: European POLice College | ||
;CESG Communications-Electronics Security Group (UK) (now NCSC) | ;CESG: Communications-Electronics Security Group (UK) (now NCSC) | ||
;CFRG Crypto Forum Research Group | ;CFRG: Crypto Forum Research Group | ||
;CI Critical Infrastructure | ;CI: Critical Infrastructure | ||
;CIO Chief Information Officer | ;CIO: Chief Information Officer | ||
;CIP Critical Infrastructure Protection | ;CIP: Critical Infrastructure Protection | ||
;CIRT Computer Incident Response Team | ;CIRT: Computer Incident Response Team | ||
;CIS Center for Internet Security | ;CIS: Center for Internet Security | ||
;CloudAuthZ Cloud Authorization (OASIS) | ;CloudAuthZ: Cloud Authorization (OASIS) | ||
;CMK Certified Migration Key (TCG) | ;CMK: Certified Migration Key (TCG) | ||
;CN subcommittee on Core Network (3GPP) | ;CN: subcommittee on Core Network (3GPP) | ||
;CONNECT Directorate on Communications Networks, Content and Technology (EC) | ;CONNECT: Directorate on Communications Networks, Content and Technology (EC) | ||
;CPE Common Platform Enumeration | ;CPE: Common Platform Enumeration | ||
;CRTM Core Root of Trust for Measurement (TCG) | ;CRTM: Core Root of Trust for Measurement (TCG) | ||
;CSA Cloud Security Association | ;CSA: Cloud Security Association | ||
;CSAF Common Security Advisory Framework (OASIS) | ;CSAF: Common Security Advisory Framework (OASIS) | ||
;CTI Cyber Threat Intelligence (OASIS) | ;CTI: Cyber Threat Intelligence (OASIS) | ||
;CVE Common Vulnerabilities and Exposures | ;CVE: Common Vulnerabilities and Exposures | ||
;CVE-ID CVE IDentifier | ;CVE-ID: CVE IDentifier | ||
;CVRF Common Vulnerability Reporting Format | ;CVRF: Common Vulnerability Reporting Format | ||
;CVSS Common Vulnerability Scoring System | ;CVSS: Common Vulnerability Scoring System | ||
;CWE Common Weakness Enumeration | ;CWE: Common Weakness Enumeration | ||
;CWRAF Common Weakness Risk Analysis Framework | ;CWRAF: Common Weakness Risk Analysis Framework | ||
;CWSS Common Weakness Scoring System | ;CWSS: Common Weakness Scoring System | ||
;CYBER Cybersecurity Technical Committee (ETSI) | ;CYBER: Cybersecurity Technical Committee (ETSI) | ||
;CYBEX Cybersecurity Information Exchange (ITU-T) | ;CYBEX: Cybersecurity Information Exchange (ITU-T) | ||
;CybOX Cyber Observable Expression | ;CybOX: Cyber Observable Expression | ||
;CYIQL Cybersecurity Information Query Language | ;CYIQL: Cybersecurity Information Query Language | ||
;DAA Direct Anonymous Attestation (TCG) | ;DAA: Direct Anonymous Attestation (TCG) | ||
;DCE Dynamic root of trust for measurement Configuration Environment (TCG) | ;DCE: Dynamic root of trust for measurement Configuration Environment (TCG) | ||
;D-CRTM Dynamic Core Root of Trust for Measurement (TCG) | ;D-CRTM: Dynamic Core Root of Trust for Measurement (TCG) | ||
;DDoS Distributed Denial of Service | ;DDoS: Distributed Denial of Service | ||
;DL Dynamic Launch (TCG) | ;DL: Dynamic Launch (TCG) | ||
;DLME Dynamically Launched Measured Environment (TCG) | ;DLME: Dynamically Launched Measured Environment (TCG) | ||
;DNS Domain Name System | ;DNS: Domain Name System | ||
;DoS Denial of Service | ;DoS: Denial of Service | ||
;dots DDoS open threat signaling (IETF) | ;dots: DDoS open threat signaling (IETF) | ||
;D-RTM Dynamic Root of Trust Measurement (TCG) | ;D-RTM: Dynamic Root of Trust Measurement (TCG) | ||
;DSS-X Digital Signature Services eXtended (OASIS) | ;DSS-X: Digital Signature Services eXtended (OASIS) | ||
;E2NA End-to-End Network Architectures (ETSI) | ;E2NA: End-to-End Network Architectures (ETSI) | ||
;EAP Extensible Authentication Protocol | ;EAP: Extensible Authentication Protocol | ||
;EBIOS Expression of Needs and Identification of Security Objectives | ;EBIOS: Expression of Needs and Identification of Security Objectives | ||
;EC European Commission | ;EC: European Commission | ||
;ECI European Critical Infrastructure | ;ECI: European Critical Infrastructure | ||
;EI-ISAC Elections Infrastructure Information Sharing and Analysis Center | ;EI-ISAC: Elections Infrastructure Information Sharing and Analysis Center | ||
;ECRG Electronic Communications Reference Group (EC) | ;ECRG: Electronic Communications Reference Group (EC) | ||
;ENFSI European Network of Forensic Institutes | ;ENFSI: European Network of Forensic Institutes | ||
;ENISA European Network and Information Security Agency | ;ENISA: European Network and Information Security Agency | ||
;EPCIP European Programme for Critical Infrastructure Protection | ;EPCIP: European Programme for Critical Infrastructure Protection | ||
;ESI Electronic Signatures and Infrastructures (ETSI) | ;ESI: Electronic Signatures and Infrastructures (ETSI) | ||
;ESRIM European Security Research & Innovation forum | ;ESRIM: European Security Research & Innovation forum | ||
;ETI Encrypted Traffic Inspection working group (IEEE) | ;ETI: Encrypted Traffic Inspection working group (IEEE) | ||
;ETSI European Telecommunication Standards Institute | ;ETSI: European Telecommunication Standards Institute | ||
;EU European Union | ;EU: European Union | ||
;EU CSS EU CyberSecurity Strategy (EU) | ;EU CSS: EU CyberSecurity Strategy (EU) | ||
;Europol European Police Office | ;Europol: European Police Office | ||
;EVCERT Extended Validation Certificate | ;EVCERT: Extended Validation Certificate | ||
;FASG GSM Association Fraud and Security Working Group | ;FASG: GSM Association Fraud and Security Working Group | ||
;FIDO Fast IDentity Online | ;FIDO: Fast IDentity Online | ||
;FIPS Federal Information Processing Standards (USA) | ;FIPS: Federal Information Processing Standards (USA) | ||
;FIRST Forum of Incident Response and Security Teams | ;FIRST: Forum of Incident Response and Security Teams | ||
;GFCE Global Forum on Cyber Expertise | ;GFCE: Global Forum on Cyber Expertise | ||
;GSMA GSM Association | ;GSMA: GSM Association | ||
;H2020 Horizon 2020 | ;H2020: Horizon 2020 | ||
;HOME Directorate on Migration and Home Affairs (EC) | ;HOME: Directorate on Migration and Home Affairs (EC) | ||
;HR Directorate on Human Resources and Security (EC) | ;HR: Directorate on Human Resources and Security (EC) | ||
;i2nsf interface to network security functions (IETF) | ;i2nsf: interface to network security functions (IETF) | ||
;IA Information Assurance | ;IA: Information Assurance | ||
;IAB Internet Architecture Board | ;IAB: Internet Architecture Board | ||
;IANA Internet Assigned Numbers Authority | ;IANA: Internet Assigned Numbers Authority | ||
;ICANN Internet Corporation for Assigned Names and Numbers | ;ICANN: Internet Corporation for Assigned Names and Numbers | ||
;ICASI Industry Consortium for Advancement of Security on the Internet | ;ICASI: Industry Consortium for Advancement of Security on the Internet | ||
;ICE European Critical Infrastructure | ;ICE: European Critical Infrastructure | ||
;ICSG Industry Connections Security Group (IEEE) | ;ICSG: Industry Connections Security Group (IEEE) | ||
;ICT Information and Communication Technology | ;ICT: Information and Communication Technology | ||
;IE Internet Explorer | ;IE: Internet Explorer | ||
;IEEE Institute for Electrical and Electronic Engineers | ;IEEE: Institute for Electrical and Electronic Engineers | ||
;IETF Internet Engineering Task Force | ;IETF: Internet Engineering Task Force | ||
;IMEI International Mobile station Equipment Identity | ;IMEI: International Mobile station Equipment Identity | ||
;IMS IP Multimedia Subsystem (3GPP) | ;IMS: IP Multimedia Subsystem (3GPP) | ||
;INRIA Institut national de recherche en sciences et technologies du numérique (France) | ;INRIA: Institut national de recherche en sciences et technologies du numérique (France) | ||
;IODEF Incident Object Description Exchange Format | ;IODEF: Incident Object Description Exchange Format | ||
;IP Internet Protocol | ;IP: Internet Protocol | ||
;ipsecme IP security maintenance and extensions working group (IETF) | ;ipsecme: IP security maintenance and extensions working group (IETF) | ||
;IRAP Information security Registered Assessors Program (Australia) | ;IRAP: Information security Registered Assessors Program (Australia) | ||
;IRTF Internet Research Task Force | ;IRTF: Internet Research Task Force | ||
;ISF Information Security Forum | ;ISF: Information Security Forum | ||
;ISO International Organization for Standardization | ;ISO: International Organization for Standardization | ||
;IT Information Technology | ;IT: Information Technology | ||
;ITU International Telecommunication Union | ;ITU: International Telecommunication Union | ||
;ITU-T International Telecommunication Union - Telecommunication Standardization sector | ;ITU-T: International Telecommunication Union - Telecommunication Standardization sector | ||
;IXP Internet eXchange Point | ;IXP: Internet eXchange Point | ||
;J-CAT Cybercrime Action Task Force (Europol) | ;J-CAT: Cybercrime Action Task Force (Europol) | ||
;JRC Directorate on Joint Research Centre (EC) | ;JRC: Directorate on Joint Research Centre (EC) | ||
;JSON JavaScript Object Notation | ;JSON: JavaScript Object Notation | ||
;JUST Directorate on Justice and Consumers (EC) | ;JUST: Directorate on Justice and Consumers (EC) | ||
;kitten common authentication technology next generation working group (IETF) | ;kitten: common authentication technology next generation working group (IETF) | ||
;KMIP Key Management Interoperability Protocol (OASIS) | ;KMIP: Key Management Interoperability Protocol (OASIS) | ||
;LECC Law Enforcement/CSIRT Cooperation (FIRST) | ;LECC: Law Enforcement/CSIRT Cooperation (FIRST) | ||
;LI Lawful Interception | ;LI: Lawful Interception | ||
;lisp locator/ID separation protocol (IETF) | ;lisp: locator/ID separation protocol (IETF) | ||
;MACCSA Multinational Alliance for Collaborative Cyber Situational Awareness | ;MACCSA: Multinational Alliance for Collaborative Cyber Situational Awareness | ||
;MAEC Malware Attribute Enumeration and Characterization | ;MAEC: Malware Attribute Enumeration and Characterization | ||
;mile Managed incident lightweight exchange working group (IETF) | ;mile: Managed incident lightweight exchange working group (IETF) | ||
;MMDEF Malware Metadata Exchange Format Working Group (IEEE) | ;MMDEF: Malware Metadata Exchange Format Working Group (IEEE) | ||
;MTS Methods for Testing and Specification (ETSI) | ;MTS: Methods for Testing and Specification (ETSI) | ||
;NATO North Atlantic Treaty Organization | ;NATO: North Atlantic Treaty Organization | ||
;NCP National Checklist Program | ;NCP: National Checklist Program | ||
;NCSS National Encrypted traffic integration Strategies | ;NCSS: National Encrypted traffic integration Strategies | ||
;NCIRC NATO Communications and Information Agency | ;NCIRC: NATO Communications and Information Agency | ||
;NESAG Network Equipment Security Assurance Group (3GPP) | ;NESAG: Network Equipment Security Assurance Group (3GPP) | ||
;NFV Network Functions Virtualisation (ETSI) | ;NFV: Network Functions Virtualisation (ETSI) | ||
;NIS Network and Information Security (EU) | ;NIS: Network and Information Security (EU) | ||
;NIST National Institute of Standards and Technology (USA) | ;NIST: National Institute of Standards and Technology (USA) | ||
;NTECH Network Technologies (ETSI) | ;NTECH: Network Technologies (ETSI) | ||
;NV (Storage) Non-Volatile (shielded location) (TCG) | ;NV (Storage): Non-Volatile (shielded location) (TCG) | ||
;NVD National Vulnerability Database (USA) | ;NVD: National Vulnerability Database (USA) | ||
;nvo3 network virtualization overlays working group (IETF) | ;nvo3: network virtualization overlays working group (IETF) | ||
;OASIS Organization for the Advancement of Structured Information Standards | ;OASIS: Organization for the Advancement of Structured Information Standards | ||
;oauth web authorization protocol working group (IETF) | ;oauth: web authorization protocol working group (IETF) | ||
;OMG Object Management Group | ;OMG: Object Management Group | ||
;OpenC2 Open Command and Control (OASIS) | ;OpenC2: Open Command and Control (OASIS) | ||
;opsec operational security capabilities for IP network infrastructure working group (IETF) | ;opsec: operational security capabilities for IP network infrastructure working group (IETF) | ||
;OS Operating System | ;OS: Operating System | ||
;PC Personal Computer | ;PC: Personal Computer | ||
;PCA Privacy CA (TCG) | ;PCA: Privacy CA (TCG) | ||
;PCR Platform Configuration Register (TCG) | ;PCR: Platform Configuration Register (TCG) | ||
;PKCS Public-Key Cryptography Standards | ;PKCS: Public-Key Cryptography Standards | ||
;PKI Public Key Infrastructure | ;PKI: Public Key Infrastructure | ||
;PMRM Privacy Management Reference Model (OASIS) | ;PMRM: Privacy Management Reference Model (OASIS) | ||
;PrivEK Private Endorsement Key (TCG) | ;PrivEK: Private Endorsement Key (TCG) | ||
;PSN Public Sector Network | ;PSN: Public Sector Network | ||
;PubEK Public Endorsement Key (TCG) | ;PubEK: Public Endorsement Key (TCG) | ||
;RAN subcommittee on Radio Access Network (3GPP) | ;RAN: subcommittee on Radio Access Network (3GPP) | ||
;RID Real-time Inter-network Defense | ;RID: Real-time Inter-network Defense | ||
;RoT Root of Trust (component) (TCG) | ;RoT: Root of Trust (component) (TCG) | ||
;RTD Directorate on Research and Innovation (EC) | ;RTD: Directorate on Research and Innovation (EC) | ||
;RTM Root of Trust for Measurement (TCG) | ;RTM: Root of Trust for Measurement (TCG) | ||
;RTR Root of Trust for Reporting (TCG) | ;RTR: Root of Trust for Reporting (TCG) | ||
;RTS Root of Trust for Storage (TCG) | ;RTS: Root of Trust for Storage (TCG) | ||
;SA2 Subcommittee on Architecture (3GPP) | ;SA2: Subcommittee on Architecture (3GPP) | ||
;SA3 Subcommittee on Security (3GPP) | ;SA3: Subcommittee on Security (3GPP) | ||
;SA5 Subcommittee on Telecom Management (3GPP) | ;SA5: Subcommittee on Telecom Management (3GPP) | ||
;sacm security automation and continuous monitoring working group (IETF) | ;sacm: security automation and continuous monitoring working group (IETF) | ||
;SAGE Security Algorithms Group of Experts (ETSI) | ;SAGE: Security Algorithms Group of Experts (ETSI) | ||
;SAI Securing Artificial Intelligence (ETSI) | ;SAI: Securing Artificial Intelligence (ETSI) | ||
;SAML Security Services (OASIS) | ;SAML: Security Services (OASIS) | ||
;SANS SysAdmin, Audit, Networking, and Security | ;SANS: SysAdmin, Audit, Networking, and Security | ||
;SAS Security Assurance Specification (3GPP) | ;SAS: Security Assurance Specification (3GPP) | ||
;SC27 ISO/IEC JTC1 Committee on Security techniques | ;SC27: ISO/IEC JTC1 Committee on Security techniques | ||
;SC6 ISO/IEC JTC1 Committee on Telecommunications and information exchange between systems | ;SC6: ISO/IEC JTC1 Committee on Telecommunications and information exchange between systems | ||
;SC7 ISO/IEC JTC1 Committee on Software and systems engineering | ;SC7: ISO/IEC JTC1 Committee on Software and systems engineering | ||
;SCADA Supervisory Control And Data Acquisition | ;SCADA: Supervisory Control And Data Acquisition | ||
;SCAP Security Content Automation Protocol | ;SCAP: Security Content Automation Protocol | ||
;SCP Smart Card Platform | ;SCP: Smart Card Platform | ||
;SIG Special Interest Group | ;SIG: Special Interest Group | ||
;SE Secure Element | ;SE: Secure Element | ||
;SECAM Study on Security Assurance Methodology (3GPP) | ;SECAM: Study on Security Assurance Methodology (3GPP) | ||
;SG 2 Study Group on Operational aspects (ITU-T) | ;SG 2: Study Group on Operational aspects (ITU-T) | ||
;SG11 Study Group on Protocols and test specifications (ITU-T) | ;SG11: Study Group on Protocols and test specifications (ITU-T) | ||
;SG13 Study Group on Future networks (ITU-T) | ;SG13: Study Group on Future networks (ITU-T) | ||
;SG17 Study Group on Security (ITU-T) | ;SG17: Study Group on Security (ITU-T) | ||
;SGDSN Secrétariat Général de la Défense et de la Sécurité Nationale (France) | ;SGDSN: Secrétariat Général de la Défense et de la Sécurité Nationale (France) | ||
;sidr secure inter-domain routing working group (IETF) | ;sidr: secure inter-domain routing working group (IETF) | ||
;SIEM Security Information and Event Management | ;SIEM: Security Information and Event Management | ||
;SIM Subscriber Identity Module, including USIM and ISIM (ETSI, 3GPP) | ;SIM: Subscriber Identity Module, including USIM and ISIM (ETSI, 3GPP) | ||
;SOC Security Operations Centre | ;SOC: Security Operations Centre | ||
;SPOC Single Point of Contact | ;SPOC: Single Point of Contact | ||
;SRK Storage Root Key (TCG) | ;SRK: Storage Root Key (TCG) | ||
;SSP Smart Secure Platform | ;SSP: Smart Secure Platform | ||
;stir secure telephone identity revisited working group (IETF) | ;stir: secure telephone identity revisited working group (IETF) | ||
;STIX Structured Threat Information eXpression | ;STIX: Structured Threat Information eXpression | ||
;TAXII Trusted Automated eXchange of Indicator Information | ;TAXII: Trusted Automated eXchange of Indicator Information | ||
;TBB Trusted Building Block (TCG) | ;TBB: Trusted Building Block (TCG) | ||
;TC Technical Committee | ;TC: Technical Committee | ||
;TCG Trusted Computing Group | ;TCG: Trusted Computing Group | ||
;TCP Transmission Control Protocol | ;TCP: Transmission Control Protocol | ||
;tcpinc TCP increased security working group (IETF) | ;tcpinc: TCP increased security working group (IETF) | ||
;TEE Trusted Execution Environment | ;TEE: Trusted Execution Environment | ||
;TLP Traffic Light Protocol | ;TLP: Traffic Light Protocol | ||
;TLS Transport Layer Security | ;TLS: Transport Layer Security | ||
;tls transport layer security working group (IETF) | ;tls: transport layer security working group (IETF) | ||
;TMI Trusted Multi-tenant Infrastructure (TCG) | ;TMI: Trusted Multi-tenant Infrastructure (TCG) | ||
;TNC Trusted Network Connect (TCG) | ;TNC: Trusted Network Connect (TCG) | ||
;TPM Trusted Platform Module (TCG) | ;TPM: Trusted Platform Module (TCG) | ||
;TPS Trusted Platform Support services (TCG) | ;TPS: Trusted Platform Support services (TCG) | ||
;trans public notary transparency (IETF) | ;trans: public notary transparency (IETF) | ||
;Trust Elevation electronic identity credential trust elevation methods (OASIS) | ;Trust Elevation: electronic identity credential trust elevation methods (OASIS) | ||
;TSS TPM Software Stack -or- TCG Software Stack (TCG) | ;TSS: TPM Software Stack -or- TCG Software Stack (TCG) | ||
;URI Uniform Resource Identifier | ;URI: Uniform Resource Identifier | ||
;uta using TLS in applications (IETF) | ;uta: using TLS in applications (IETF) | ||
;VDRX Vulnerability Reporting and Data eXchange SIG (FIRST) | ;VDRX: Vulnerability Reporting and Data eXchange SIG (FIRST) | ||
;W3C World Wide Web Consortium | ;W3C: World Wide Web Consortium | ||
;websec web security working group (IETF) | ;websec: web security working group (IETF) | ||
;wpkops web PKI OPS working group (IETF) | ;wpkops: web PKI OPS working group (IETF) | ||
;WS-SX Web Services Secure eXchange (OASIS) | ;WS-SX: Web Services Secure eXchange (OASIS) | ||
;XCCDF eXtensible Configuration Checklist Description Format | ;XCCDF: eXtensible Configuration Checklist Description Format | ||
;XDI XRI Data Interchange (OASIS) | ;XDI: XRI Data Interchange (OASIS) | ||
;XML eXtensible Markup Language | ;XML: eXtensible Markup Language | ||
;XSPA Cross-Enterprise Security and Privacy Authorization (OASIS) | ;XSPA: Cross-Enterprise Security and Privacy Authorization (OASIS) |
Latest revision as of 14:26, 30 July 2021
- 3GPP
- 3rd Generation Partnership Project
- AC
- Authentication Code (TCG)
- ACDC
- Advanced Cyber Defence Centre
- AIK
- Attestation Identity Key (TCG)
- AIOTI
- Alliance of IOT Innovation
- AMSS
- Anti-Malware Support Services Working Group (IEEE)
- ANS
- Autorité Nationale de Sécurité (Belgium)
- ANSSI
- Agence Nationale de la Sécurité des Systèmes d'Information (France)
- APT
- Advanced Persistent Threat
- ARIB
- Association of Radio Industries and Businesses (Japan)
- ATT&CK™
- Adversarial Tactics Techniques and Common Knowledge (MITRE)
- BLOB
- Binary Large OBject (TCG)
- BORE
- Break Once Run Everywhere (TCG)
- BYOD
- Bring Your Own Device
- CA
- Certification Authority
- CA/B
- Certificate of Authority/Browser Forum
- CACAO
- Collaborative Automated Course of Action Operations (OASIS)
- CAPEC
- Common Attack Pattern Enumeration and Classification
- CBM
- Confidence Building Measures
- CCC
- Chaos Computer Club
- CCDB
- Common Criteria Development Board
- CCDCOE
- NATO Cooperation Cyber Defence Center of Excellence
- CCE
- Common Configuration Enumeration
- CCRA
- Common Criteria Recognition Agreement
- CCSA
- China Communications Standards Association
- CCSB
- Centre pour Cyber Securité Belgique (Belgium)
- CD
- Cyber Defense
- CDT
- Centres for Doctoral Training (UK)
- CEEE
- Common Event Expression Exchange
- CEN
- Comité Européen de Normalisation
- CENELEC
- European Committee for Electrotechnical Standardization
- CEPOL
- European POLice College
- CESG
- Communications-Electronics Security Group (UK) (now NCSC)
- CFRG
- Crypto Forum Research Group
- CI
- Critical Infrastructure
- CIO
- Chief Information Officer
- CIP
- Critical Infrastructure Protection
- CIRT
- Computer Incident Response Team
- CIS
- Center for Internet Security
- CloudAuthZ
- Cloud Authorization (OASIS)
- CMK
- Certified Migration Key (TCG)
- CN
- subcommittee on Core Network (3GPP)
- CONNECT
- Directorate on Communications Networks, Content and Technology (EC)
- CPE
- Common Platform Enumeration
- CRTM
- Core Root of Trust for Measurement (TCG)
- CSA
- Cloud Security Association
- CSAF
- Common Security Advisory Framework (OASIS)
- CTI
- Cyber Threat Intelligence (OASIS)
- CVE
- Common Vulnerabilities and Exposures
- CVE-ID
- CVE IDentifier
- CVRF
- Common Vulnerability Reporting Format
- CVSS
- Common Vulnerability Scoring System
- CWE
- Common Weakness Enumeration
- CWRAF
- Common Weakness Risk Analysis Framework
- CWSS
- Common Weakness Scoring System
- CYBER
- Cybersecurity Technical Committee (ETSI)
- CYBEX
- Cybersecurity Information Exchange (ITU-T)
- CybOX
- Cyber Observable Expression
- CYIQL
- Cybersecurity Information Query Language
- DAA
- Direct Anonymous Attestation (TCG)
- DCE
- Dynamic root of trust for measurement Configuration Environment (TCG)
- D-CRTM
- Dynamic Core Root of Trust for Measurement (TCG)
- DDoS
- Distributed Denial of Service
- DL
- Dynamic Launch (TCG)
- DLME
- Dynamically Launched Measured Environment (TCG)
- DNS
- Domain Name System
- DoS
- Denial of Service
- dots
- DDoS open threat signaling (IETF)
- D-RTM
- Dynamic Root of Trust Measurement (TCG)
- DSS-X
- Digital Signature Services eXtended (OASIS)
- E2NA
- End-to-End Network Architectures (ETSI)
- EAP
- Extensible Authentication Protocol
- EBIOS
- Expression of Needs and Identification of Security Objectives
- EC
- European Commission
- ECI
- European Critical Infrastructure
- EI-ISAC
- Elections Infrastructure Information Sharing and Analysis Center
- ECRG
- Electronic Communications Reference Group (EC)
- ENFSI
- European Network of Forensic Institutes
- ENISA
- European Network and Information Security Agency
- EPCIP
- European Programme for Critical Infrastructure Protection
- ESI
- Electronic Signatures and Infrastructures (ETSI)
- ESRIM
- European Security Research & Innovation forum
- ETI
- Encrypted Traffic Inspection working group (IEEE)
- ETSI
- European Telecommunication Standards Institute
- EU
- European Union
- EU CSS
- EU CyberSecurity Strategy (EU)
- Europol
- European Police Office
- EVCERT
- Extended Validation Certificate
- FASG
- GSM Association Fraud and Security Working Group
- FIDO
- Fast IDentity Online
- FIPS
- Federal Information Processing Standards (USA)
- FIRST
- Forum of Incident Response and Security Teams
- GFCE
- Global Forum on Cyber Expertise
- GSMA
- GSM Association
- H2020
- Horizon 2020
- HOME
- Directorate on Migration and Home Affairs (EC)
- HR
- Directorate on Human Resources and Security (EC)
- i2nsf
- interface to network security functions (IETF)
- IA
- Information Assurance
- IAB
- Internet Architecture Board
- IANA
- Internet Assigned Numbers Authority
- ICANN
- Internet Corporation for Assigned Names and Numbers
- ICASI
- Industry Consortium for Advancement of Security on the Internet
- ICE
- European Critical Infrastructure
- ICSG
- Industry Connections Security Group (IEEE)
- ICT
- Information and Communication Technology
- IE
- Internet Explorer
- IEEE
- Institute for Electrical and Electronic Engineers
- IETF
- Internet Engineering Task Force
- IMEI
- International Mobile station Equipment Identity
- IMS
- IP Multimedia Subsystem (3GPP)
- INRIA
- Institut national de recherche en sciences et technologies du numérique (France)
- IODEF
- Incident Object Description Exchange Format
- IP
- Internet Protocol
- ipsecme
- IP security maintenance and extensions working group (IETF)
- IRAP
- Information security Registered Assessors Program (Australia)
- IRTF
- Internet Research Task Force
- ISF
- Information Security Forum
- ISO
- International Organization for Standardization
- IT
- Information Technology
- ITU
- International Telecommunication Union
- ITU-T
- International Telecommunication Union - Telecommunication Standardization sector
- IXP
- Internet eXchange Point
- J-CAT
- Cybercrime Action Task Force (Europol)
- JRC
- Directorate on Joint Research Centre (EC)
- JSON
- JavaScript Object Notation
- JUST
- Directorate on Justice and Consumers (EC)
- kitten
- common authentication technology next generation working group (IETF)
- KMIP
- Key Management Interoperability Protocol (OASIS)
- LECC
- Law Enforcement/CSIRT Cooperation (FIRST)
- LI
- Lawful Interception
- lisp
- locator/ID separation protocol (IETF)
- MACCSA
- Multinational Alliance for Collaborative Cyber Situational Awareness
- MAEC
- Malware Attribute Enumeration and Characterization
- mile
- Managed incident lightweight exchange working group (IETF)
- MMDEF
- Malware Metadata Exchange Format Working Group (IEEE)
- MTS
- Methods for Testing and Specification (ETSI)
- NATO
- North Atlantic Treaty Organization
- NCP
- National Checklist Program
- NCSS
- National Encrypted traffic integration Strategies
- NCIRC
- NATO Communications and Information Agency
- NESAG
- Network Equipment Security Assurance Group (3GPP)
- NFV
- Network Functions Virtualisation (ETSI)
- NIS
- Network and Information Security (EU)
- NIST
- National Institute of Standards and Technology (USA)
- NTECH
- Network Technologies (ETSI)
- NV (Storage)
- Non-Volatile (shielded location) (TCG)
- NVD
- National Vulnerability Database (USA)
- nvo3
- network virtualization overlays working group (IETF)
- OASIS
- Organization for the Advancement of Structured Information Standards
- oauth
- web authorization protocol working group (IETF)
- OMG
- Object Management Group
- OpenC2
- Open Command and Control (OASIS)
- opsec
- operational security capabilities for IP network infrastructure working group (IETF)
- OS
- Operating System
- PC
- Personal Computer
- PCA
- Privacy CA (TCG)
- PCR
- Platform Configuration Register (TCG)
- PKCS
- Public-Key Cryptography Standards
- PKI
- Public Key Infrastructure
- PMRM
- Privacy Management Reference Model (OASIS)
- PrivEK
- Private Endorsement Key (TCG)
- PSN
- Public Sector Network
- PubEK
- Public Endorsement Key (TCG)
- RAN
- subcommittee on Radio Access Network (3GPP)
- RID
- Real-time Inter-network Defense
- RoT
- Root of Trust (component) (TCG)
- RTD
- Directorate on Research and Innovation (EC)
- RTM
- Root of Trust for Measurement (TCG)
- RTR
- Root of Trust for Reporting (TCG)
- RTS
- Root of Trust for Storage (TCG)
- SA2
- Subcommittee on Architecture (3GPP)
- SA3
- Subcommittee on Security (3GPP)
- SA5
- Subcommittee on Telecom Management (3GPP)
- sacm
- security automation and continuous monitoring working group (IETF)
- SAGE
- Security Algorithms Group of Experts (ETSI)
- SAI
- Securing Artificial Intelligence (ETSI)
- SAML
- Security Services (OASIS)
- SANS
- SysAdmin, Audit, Networking, and Security
- SAS
- Security Assurance Specification (3GPP)
- SC27
- ISO/IEC JTC1 Committee on Security techniques
- SC6
- ISO/IEC JTC1 Committee on Telecommunications and information exchange between systems
- SC7
- ISO/IEC JTC1 Committee on Software and systems engineering
- SCADA
- Supervisory Control And Data Acquisition
- SCAP
- Security Content Automation Protocol
- SCP
- Smart Card Platform
- SIG
- Special Interest Group
- SE
- Secure Element
- SECAM
- Study on Security Assurance Methodology (3GPP)
- SG 2
- Study Group on Operational aspects (ITU-T)
- SG11
- Study Group on Protocols and test specifications (ITU-T)
- SG13
- Study Group on Future networks (ITU-T)
- SG17
- Study Group on Security (ITU-T)
- SGDSN
- Secrétariat Général de la Défense et de la Sécurité Nationale (France)
- sidr
- secure inter-domain routing working group (IETF)
- SIEM
- Security Information and Event Management
- SIM
- Subscriber Identity Module, including USIM and ISIM (ETSI, 3GPP)
- SOC
- Security Operations Centre
- SPOC
- Single Point of Contact
- SRK
- Storage Root Key (TCG)
- SSP
- Smart Secure Platform
- stir
- secure telephone identity revisited working group (IETF)
- STIX
- Structured Threat Information eXpression
- TAXII
- Trusted Automated eXchange of Indicator Information
- TBB
- Trusted Building Block (TCG)
- TC
- Technical Committee
- TCG
- Trusted Computing Group
- TCP
- Transmission Control Protocol
- tcpinc
- TCP increased security working group (IETF)
- TEE
- Trusted Execution Environment
- TLP
- Traffic Light Protocol
- TLS
- Transport Layer Security
- tls
- transport layer security working group (IETF)
- TMI
- Trusted Multi-tenant Infrastructure (TCG)
- TNC
- Trusted Network Connect (TCG)
- TPM
- Trusted Platform Module (TCG)
- TPS
- Trusted Platform Support services (TCG)
- trans
- public notary transparency (IETF)
- Trust Elevation
- electronic identity credential trust elevation methods (OASIS)
- TSS
- TPM Software Stack -or- TCG Software Stack (TCG)
- URI
- Uniform Resource Identifier
- uta
- using TLS in applications (IETF)
- VDRX
- Vulnerability Reporting and Data eXchange SIG (FIRST)
- W3C
- World Wide Web Consortium
- websec
- web security working group (IETF)
- wpkops
- web PKI OPS working group (IETF)
- WS-SX
- Web Services Secure eXchange (OASIS)
- XCCDF
- eXtensible Configuration Checklist Description Format
- XDI
- XRI Data Interchange (OASIS)
- XML
- eXtensible Markup Language
- XSPA
- Cross-Enterprise Security and Privacy Authorization (OASIS)