Abbreviations: Difference between revisions

From ETI
(Created page with "; 3GPP: 3rd Generation Partnership Project ;AC: Authentication Code (TCG) ;ACDC: Advanced Cyber Defence Centre ;AIK: Attestation Identity Key (TCG) AIOTI Alliance of IOT Innov...")
 
No edit summary
Line 3: Line 3:
;ACDC: Advanced Cyber Defence Centre
;ACDC: Advanced Cyber Defence Centre
;AIK: Attestation Identity Key (TCG)
;AIK: Attestation Identity Key (TCG)
AIOTI Alliance of IOT Innovation
;AIOTI: Alliance of IOT Innovation
AMSS Anti-Malware Support Services Working Group (IEEE)
;AMSS: Anti-Malware Support Services Working Group (IEEE)
ANS Autorité Nationale de Sécurité (Belgium)
;ANS Autorité Nationale de Sécurité (Belgium)
ANSSI Agence Nationale de la Sécurité des Systèmes d'Information (France)
;ANSSI Agence Nationale de la Sécurité des Systèmes d'Information (France)
APT Advanced Persistent Threat
;APT Advanced Persistent Threat
ARIB Association of Radio Industries and Businesses (Japan)
;ARIB Association of Radio Industries and Businesses (Japan)
ATT&CK™ Adversarial Tactics Techniques and Common Knowledge (MITRE)
;ATT&CK™ Adversarial Tactics Techniques and Common Knowledge (MITRE)
BLOB Binary Large OBject (TCG)
;BLOB Binary Large OBject (TCG)
BORE Break Once Run Everywhere (TCG)
;BORE Break Once Run Everywhere (TCG)
BYOD Bring Your Own Device
;BYOD Bring Your Own Device
CA Certification Authority
;CA Certification Authority
CA/B Certificate of Authority/Browser Forum
;CA/B Certificate of Authority/Browser Forum
CACAO Collaborative Automated Course of Action Operations (OASIS)
;CACAO Collaborative Automated Course of Action Operations (OASIS)
CAPEC Common Attack Pattern Enumeration and Classification
;CAPEC Common Attack Pattern Enumeration and Classification
CBM Confidence Building Measures
;CBM Confidence Building Measures
CCC Chaos Computer Club
;CCC Chaos Computer Club
CCDB Common Criteria Development Board
;CCDB Common Criteria Development Board
CCDCOE NATO Cooperation Cyber Defence Center of Excellence
;CCDCOE NATO Cooperation Cyber Defence Center of Excellence
CCE Common Configuration Enumeration
;CCE Common Configuration Enumeration
CCRA Common Criteria Recognition Agreement
;CCRA Common Criteria Recognition Agreement
CCSA China Communications Standards Association
;CCSA China Communications Standards Association
CCSB Centre pour Cyber Securité Belgique (Belgium)
;CCSB Centre pour Cyber Securité Belgique (Belgium)
CD Cyber Defense
;CD Cyber Defense
CDT Centres for Doctoral Training (UK)
;CDT Centres for Doctoral Training (UK)
CEEE Common Event Expression Exchange
;CEEE Common Event Expression Exchange
CEN Comité Européen de Normalisation
;CEN Comité Européen de Normalisation
CENELEC European Committee for Electrotechnical Standardization
;CENELEC European Committee for Electrotechnical Standardization
CEPOL European POLice College
;CEPOL European POLice College
CESG Communications-Electronics Security Group (UK) (now NCSC)
;CESG Communications-Electronics Security Group (UK) (now NCSC)
CFRG Crypto Forum Research Group
;CFRG Crypto Forum Research Group
CI Critical Infrastructure
;CI Critical Infrastructure
CIO Chief Information Officer
;CIO Chief Information Officer
CIP Critical Infrastructure Protection
;CIP Critical Infrastructure Protection
CIRT Computer Incident Response Team
;CIRT Computer Incident Response Team
CIS Center for Internet Security
;CIS Center for Internet Security
CloudAuthZ Cloud Authorization (OASIS)
;CloudAuthZ Cloud Authorization (OASIS)
CMK Certified Migration Key (TCG)
;CMK Certified Migration Key (TCG)
CN subcommittee on Core Network (3GPP)
;CN subcommittee on Core Network (3GPP)
CONNECT Directorate on Communications Networks, Content and Technology (EC)
;CONNECT Directorate on Communications Networks, Content and Technology (EC)
CPE Common Platform Enumeration
;CPE Common Platform Enumeration
CRTM Core Root of Trust for Measurement (TCG)
;CRTM Core Root of Trust for Measurement (TCG)
CSA Cloud Security Association
;CSA Cloud Security Association
CSAF Common Security Advisory Framework (OASIS)
;CSAF Common Security Advisory Framework (OASIS)
CTI Cyber Threat Intelligence (OASIS)
;CTI Cyber Threat Intelligence (OASIS)
CVE Common Vulnerabilities and Exposures
;CVE Common Vulnerabilities and Exposures
CVE-ID CVE IDentifier
;CVE-ID CVE IDentifier
CVRF Common Vulnerability Reporting Format
;CVRF Common Vulnerability Reporting Format
CVSS Common Vulnerability Scoring System
;CVSS Common Vulnerability Scoring System
CWE Common Weakness Enumeration
;CWE Common Weakness Enumeration
CWRAF Common Weakness Risk Analysis Framework
;CWRAF Common Weakness Risk Analysis Framework
CWSS Common Weakness Scoring System
;CWSS Common Weakness Scoring System
CYBER Cybersecurity Technical Committee (ETSI)
;CYBER Cybersecurity Technical Committee (ETSI)
CYBEX Cybersecurity Information Exchange (ITU-T)
;CYBEX Cybersecurity Information Exchange (ITU-T)
CybOX Cyber Observable Expression
;CybOX Cyber Observable Expression
CYIQL Cybersecurity Information Query Language
;CYIQL Cybersecurity Information Query Language
DAA Direct Anonymous Attestation (TCG)
;DAA Direct Anonymous Attestation (TCG)
DCE Dynamic root of trust for measurement Configuration Environment (TCG)
;DCE Dynamic root of trust for measurement Configuration Environment (TCG)
D-CRTM Dynamic Core Root of Trust for Measurement (TCG)
;D-CRTM Dynamic Core Root of Trust for Measurement (TCG)
DDoS Distributed Denial of Service
;DDoS Distributed Denial of Service
DL Dynamic Launch (TCG)
;DL Dynamic Launch (TCG)
DLME Dynamically Launched Measured Environment (TCG)
;DLME Dynamically Launched Measured Environment (TCG)
DNS Domain Name System
;DNS Domain Name System
DoS Denial of Service
;DoS Denial of Service
dots DDoS open threat signaling (IETF)
;dots DDoS open threat signaling (IETF)
D-RTM Dynamic Root of Trust Measurement (TCG)
;D-RTM Dynamic Root of Trust Measurement (TCG)
DSS-X Digital Signature Services eXtended (OASIS)
;DSS-X Digital Signature Services eXtended (OASIS)
E2NA End-to-End Network Architectures (ETSI)
;E2NA End-to-End Network Architectures (ETSI)
EAP Extensible Authentication Protocol
;EAP Extensible Authentication Protocol
EBIOS Expression of Needs and Identification of Security Objectives
;EBIOS Expression of Needs and Identification of Security Objectives
EC European Commission
;EC European Commission
ECI European Critical Infrastructure
;ECI European Critical Infrastructure
EI-ISAC Elections Infrastructure Information Sharing and Analysis Center
;EI-ISAC Elections Infrastructure Information Sharing and Analysis Center
ECRG Electronic Communications Reference Group (EC)
;ECRG Electronic Communications Reference Group (EC)
ENFSI European Network of Forensic Institutes
;ENFSI European Network of Forensic Institutes
ENISA European Network and Information Security Agency
;ENISA European Network and Information Security Agency
EPCIP European Programme for Critical Infrastructure Protection
;EPCIP European Programme for Critical Infrastructure Protection
ESI Electronic Signatures and Infrastructures (ETSI)
;ESI Electronic Signatures and Infrastructures (ETSI)
ESRIM European Security Research & Innovation forum
;ESRIM European Security Research & Innovation forum
ETI Encrypted Traffic Inspection working group (IEEE)
;ETI Encrypted Traffic Inspection working group (IEEE)
ETSI European Telecommunication Standards Institute
;ETSI European Telecommunication Standards Institute
EU European Union
;EU European Union
EU CSS EU CyberSecurity Strategy (EU)
;EU CSS EU CyberSecurity Strategy (EU)
Europol European Police Office
;Europol European Police Office
EVCERT Extended Validation Certificate
;EVCERT Extended Validation Certificate
FASG GSM Association Fraud and Security Working Group
;FASG GSM Association Fraud and Security Working Group
FIDO Fast IDentity Online
;FIDO Fast IDentity Online
FIPS Federal Information Processing Standards (USA)
;FIPS Federal Information Processing Standards (USA)
FIRST Forum of Incident Response and Security Teams
;FIRST Forum of Incident Response and Security Teams
GFCE Global Forum on Cyber Expertise
;GFCE Global Forum on Cyber Expertise
GSMA GSM Association
;GSMA GSM Association
H2020 Horizon 2020
;H2020 Horizon 2020
HOME Directorate on Migration and Home Affairs (EC)
;HOME Directorate on Migration and Home Affairs (EC)
HR Directorate on Human Resources and Security (EC)
;HR Directorate on Human Resources and Security (EC)
i2nsf interface to network security functions (IETF)
;i2nsf interface to network security functions (IETF)
IA Information Assurance
;IA Information Assurance
IAB Internet Architecture Board
;IAB Internet Architecture Board
IANA Internet Assigned Numbers Authority
;IANA Internet Assigned Numbers Authority
ICANN Internet Corporation for Assigned Names and Numbers
;ICANN Internet Corporation for Assigned Names and Numbers
ICASI Industry Consortium for Advancement of Security on the Internet
;ICASI Industry Consortium for Advancement of Security on the Internet
ICE European Critical Infrastructure
;ICE European Critical Infrastructure
ICSG Industry Connections Security Group (IEEE)
;ICSG Industry Connections Security Group (IEEE)
ICT Information and Communication Technology
;ICT Information and Communication Technology
IE Internet Explorer
;IE Internet Explorer
IEEE Institute for Electrical and Electronic Engineers
;IEEE Institute for Electrical and Electronic Engineers
IETF Internet Engineering Task Force
;IETF Internet Engineering Task Force
IMEI International Mobile station Equipment Identity
;IMEI International Mobile station Equipment Identity
IMS IP Multimedia Subsystem (3GPP)
;IMS IP Multimedia Subsystem (3GPP)
INRIA Institut national de recherche en sciences et technologies du numérique (France)
;INRIA Institut national de recherche en sciences et technologies du numérique (France)
IODEF Incident Object Description Exchange Format
;IODEF Incident Object Description Exchange Format
IP Internet Protocol
;IP Internet Protocol
ipsecme IP security maintenance and extensions working group (IETF)
;ipsecme IP security maintenance and extensions working group (IETF)
IRAP Information security Registered Assessors Program (Australia)
;IRAP Information security Registered Assessors Program (Australia)
IRTF Internet Research Task Force
;IRTF Internet Research Task Force
ISF Information Security Forum
;ISF Information Security Forum
ISO International Organization for Standardization
;ISO International Organization for Standardization
IT Information Technology
;IT Information Technology
ITU International Telecommunication Union
;ITU International Telecommunication Union
ITU-T International Telecommunication Union - Telecommunication Standardization sector
;ITU-T International Telecommunication Union - Telecommunication Standardization sector
IXP Internet eXchange Point
;IXP Internet eXchange Point
J-CAT Cybercrime Action Task Force (Europol)
;J-CAT Cybercrime Action Task Force (Europol)
JRC Directorate on Joint Research Centre (EC)
;JRC Directorate on Joint Research Centre (EC)
JSON JavaScript Object Notation
;JSON JavaScript Object Notation
JUST Directorate on Justice and Consumers (EC)
;JUST Directorate on Justice and Consumers (EC)
kitten common authentication technology next generation working group (IETF)
;kitten common authentication technology next generation working group (IETF)
KMIP Key Management Interoperability Protocol (OASIS)
;KMIP Key Management Interoperability Protocol (OASIS)
LECC Law Enforcement/CSIRT Cooperation (FIRST)
;LECC Law Enforcement/CSIRT Cooperation (FIRST)
LI Lawful Interception
;LI Lawful Interception
lisp locator/ID separation protocol (IETF)
;lisp locator/ID separation protocol (IETF)
MACCSA Multinational Alliance for Collaborative Cyber Situational Awareness
;MACCSA Multinational Alliance for Collaborative Cyber Situational Awareness
MAEC Malware Attribute Enumeration and Characterization
;MAEC Malware Attribute Enumeration and Characterization
mile Managed incident lightweight exchange working group (IETF)
;mile Managed incident lightweight exchange working group (IETF)
MMDEF Malware Metadata Exchange Format Working Group (IEEE)
;MMDEF Malware Metadata Exchange Format Working Group (IEEE)
MTS Methods for Testing and Specification (ETSI)
;MTS Methods for Testing and Specification (ETSI)
NATO North Atlantic Treaty Organization
;NATO North Atlantic Treaty Organization
NCP National Checklist Program
;NCP National Checklist Program
NCSS National Encrypted traffic integration Strategies
;NCSS National Encrypted traffic integration Strategies
NCIRC NATO Communications and Information Agency
;NCIRC NATO Communications and Information Agency
NESAG Network Equipment Security Assurance Group (3GPP)
;NESAG Network Equipment Security Assurance Group (3GPP)
NFV Network Functions Virtualisation (ETSI)
;NFV Network Functions Virtualisation (ETSI)
NIS Network and Information Security (EU)
;NIS Network and Information Security (EU)
NIST National Institute of Standards and Technology (USA)
;NIST National Institute of Standards and Technology (USA)
NTECH Network Technologies (ETSI)
;NTECH Network Technologies (ETSI)
NV (Storage) Non-Volatile (shielded location) (TCG)
;NV (Storage) Non-Volatile (shielded location) (TCG)
NVD National Vulnerability Database (USA)
;NVD National Vulnerability Database (USA)
nvo3 network virtualization overlays working group (IETF)
;nvo3 network virtualization overlays working group (IETF)
OASIS Organization for the Advancement of Structured Information Standards
;OASIS Organization for the Advancement of Structured Information Standards
oauth web authorization protocol working group (IETF)
;oauth web authorization protocol working group (IETF)
OMG Object Management Group
;OMG Object Management Group
OpenC2 Open Command and Control (OASIS)
;OpenC2 Open Command and Control (OASIS)
opsec operational security capabilities for IP network infrastructure working group (IETF)
;opsec operational security capabilities for IP network infrastructure working group (IETF)
OS Operating System
;OS Operating System
PC Personal Computer
;PC Personal Computer
PCA Privacy CA (TCG)
;PCA Privacy CA (TCG)
PCR Platform Configuration Register (TCG)
;PCR Platform Configuration Register (TCG)
PKCS Public-Key Cryptography Standards
;PKCS Public-Key Cryptography Standards
PKI Public Key Infrastructure
;PKI Public Key Infrastructure
PMRM Privacy Management Reference Model (OASIS)
;PMRM Privacy Management Reference Model (OASIS)
PrivEK Private Endorsement Key (TCG)
;PrivEK Private Endorsement Key (TCG)
PSN Public Sector Network
;PSN Public Sector Network
PubEK Public Endorsement Key (TCG)
;PubEK Public Endorsement Key (TCG)
RAN subcommittee on Radio Access Network (3GPP)
;RAN subcommittee on Radio Access Network (3GPP)
RID Real-time Inter-network Defense
;RID Real-time Inter-network Defense
RoT Root of Trust (component) (TCG)
;RoT Root of Trust (component) (TCG)
RTD Directorate on Research and Innovation (EC)
;RTD Directorate on Research and Innovation (EC)
RTM Root of Trust for Measurement (TCG)
;RTM Root of Trust for Measurement (TCG)
RTR Root of Trust for Reporting (TCG)
;RTR Root of Trust for Reporting (TCG)
RTS Root of Trust for Storage (TCG)
;RTS Root of Trust for Storage (TCG)
SA2 Subcommittee on Architecture (3GPP)
;SA2 Subcommittee on Architecture (3GPP)
SA3 Subcommittee on Security (3GPP)
;SA3 Subcommittee on Security (3GPP)
SA5 Subcommittee on Telecom Management (3GPP)
;SA5 Subcommittee on Telecom Management (3GPP)
sacm security automation and continuous monitoring working group (IETF)
;sacm security automation and continuous monitoring working group (IETF)
SAGE Security Algorithms Group of Experts (ETSI)
;SAGE Security Algorithms Group of Experts (ETSI)
SAI Securing Artificial Intelligence (ETSI)
;SAI Securing Artificial Intelligence (ETSI)
SAML Security Services (OASIS)
;SAML Security Services (OASIS)
SANS SysAdmin, Audit, Networking, and Security
;SANS SysAdmin, Audit, Networking, and Security
SAS Security Assurance Specification (3GPP)
;SAS Security Assurance Specification (3GPP)
SC27 ISO/IEC JTC1 Committee on Security techniques
;SC27 ISO/IEC JTC1 Committee on Security techniques
SC6 ISO/IEC JTC1 Committee on Telecommunications and information exchange between systems
;SC6 ISO/IEC JTC1 Committee on Telecommunications and information exchange between systems
SC7 ISO/IEC JTC1 Committee on Software and systems engineering
;SC7 ISO/IEC JTC1 Committee on Software and systems engineering
SCADA Supervisory Control And Data Acquisition
;SCADA Supervisory Control And Data Acquisition
SCAP Security Content Automation Protocol
;SCAP Security Content Automation Protocol
SCP Smart Card Platform
;SCP Smart Card Platform
SIG Special Interest Group
;SIG Special Interest Group
SE Secure Element
;SE Secure Element
SECAM Study on Security Assurance Methodology (3GPP)
;SECAM Study on Security Assurance Methodology (3GPP)
SG 2 Study Group on Operational aspects (ITU-T)
;SG 2 Study Group on Operational aspects (ITU-T)
SG11 Study Group on Protocols and test specifications (ITU-T)
;SG11 Study Group on Protocols and test specifications (ITU-T)
SG13 Study Group on Future networks (ITU-T)
;SG13 Study Group on Future networks (ITU-T)
SG17 Study Group on Security (ITU-T)
;SG17 Study Group on Security (ITU-T)
SGDSN Secrétariat Général de la Défense et de la Sécurité Nationale (France)
;SGDSN Secrétariat Général de la Défense et de la Sécurité Nationale (France)
sidr secure inter-domain routing working group (IETF)
;sidr secure inter-domain routing working group (IETF)
SIEM Security Information and Event Management
;SIEM Security Information and Event Management
SIM Subscriber Identity Module, including USIM and ISIM (ETSI, 3GPP)
;SIM Subscriber Identity Module, including USIM and ISIM (ETSI, 3GPP)
SOC Security Operations Centre
;SOC Security Operations Centre
SPOC Single Point of Contact
;SPOC Single Point of Contact
SRK Storage Root Key (TCG)
;SRK Storage Root Key (TCG)
SSP Smart Secure Platform
;SSP Smart Secure Platform
stir secure telephone identity revisited working group (IETF)
;stir secure telephone identity revisited working group (IETF)
STIX Structured Threat Information eXpression
;STIX Structured Threat Information eXpression
TAXII Trusted Automated eXchange of Indicator Information
;TAXII Trusted Automated eXchange of Indicator Information
TBB Trusted Building Block (TCG)
;TBB Trusted Building Block (TCG)
TC Technical Committee
;TC Technical Committee
TCG Trusted Computing Group
;TCG Trusted Computing Group
TCP Transmission Control Protocol
;TCP Transmission Control Protocol
tcpinc TCP increased security working group (IETF)
;tcpinc TCP increased security working group (IETF)
TEE Trusted Execution Environment
;TEE Trusted Execution Environment
TLP Traffic Light Protocol
;TLP Traffic Light Protocol
TLS Transport Layer Security
;TLS Transport Layer Security
tls transport layer security working group (IETF)
;tls transport layer security working group (IETF)
TMI Trusted Multi-tenant Infrastructure (TCG)
;TMI Trusted Multi-tenant Infrastructure (TCG)
TNC Trusted Network Connect (TCG)
;TNC Trusted Network Connect (TCG)
TPM Trusted Platform Module (TCG)
;TPM Trusted Platform Module (TCG)
TPS Trusted Platform Support services (TCG)
;TPS Trusted Platform Support services (TCG)
trans public notary transparency (IETF)
;trans public notary transparency (IETF)
Trust Elevation electronic identity credential trust elevation methods (OASIS)
;Trust Elevation electronic identity credential trust elevation methods (OASIS)
TSS TPM Software Stack -or- TCG Software Stack (TCG)
;TSS TPM Software Stack -or- TCG Software Stack (TCG)
URI Uniform Resource Identifier
;URI Uniform Resource Identifier
uta using TLS in applications (IETF)
;uta using TLS in applications (IETF)
VDRX Vulnerability Reporting and Data eXchange SIG (FIRST)
;VDRX Vulnerability Reporting and Data eXchange SIG (FIRST)
W3C World Wide Web Consortium
;W3C World Wide Web Consortium
websec web security working group (IETF)
;websec web security working group (IETF)
wpkops web PKI OPS working group (IETF)
;wpkops web PKI OPS working group (IETF)
WS-SX Web Services Secure eXchange (OASIS)
;WS-SX Web Services Secure eXchange (OASIS)
XCCDF eXtensible Configuration Checklist Description Format
;XCCDF eXtensible Configuration Checklist Description Format
XDI XRI Data Interchange (OASIS)
;XDI XRI Data Interchange (OASIS)
XML eXtensible Markup Language
;XML eXtensible Markup Language
XSPA Cross-Enterprise Security and Privacy Authorization (OASIS)
;XSPA Cross-Enterprise Security and Privacy Authorization (OASIS)

Revision as of 14:19, 30 July 2021

3GPP
3rd Generation Partnership Project
AC
Authentication Code (TCG)
ACDC
Advanced Cyber Defence Centre
AIK
Attestation Identity Key (TCG)
AIOTI
Alliance of IOT Innovation
AMSS
Anti-Malware Support Services Working Group (IEEE)
ANS Autorité Nationale de Sécurité (Belgium)
ANSSI Agence Nationale de la Sécurité des Systèmes d'Information (France)
APT Advanced Persistent Threat
ARIB Association of Radio Industries and Businesses (Japan)
ATT&CK™ Adversarial Tactics Techniques and Common Knowledge (MITRE)
BLOB Binary Large OBject (TCG)
BORE Break Once Run Everywhere (TCG)
BYOD Bring Your Own Device
CA Certification Authority
CA/B Certificate of Authority/Browser Forum
CACAO Collaborative Automated Course of Action Operations (OASIS)
CAPEC Common Attack Pattern Enumeration and Classification
CBM Confidence Building Measures
CCC Chaos Computer Club
CCDB Common Criteria Development Board
CCDCOE NATO Cooperation Cyber Defence Center of Excellence
CCE Common Configuration Enumeration
CCRA Common Criteria Recognition Agreement
CCSA China Communications Standards Association
CCSB Centre pour Cyber Securité Belgique (Belgium)
CD Cyber Defense
CDT Centres for Doctoral Training (UK)
CEEE Common Event Expression Exchange
CEN Comité Européen de Normalisation
CENELEC European Committee for Electrotechnical Standardization
CEPOL European POLice College
CESG Communications-Electronics Security Group (UK) (now NCSC)
CFRG Crypto Forum Research Group
CI Critical Infrastructure
CIO Chief Information Officer
CIP Critical Infrastructure Protection
CIRT Computer Incident Response Team
CIS Center for Internet Security
CloudAuthZ Cloud Authorization (OASIS)
CMK Certified Migration Key (TCG)
CN subcommittee on Core Network (3GPP)
CONNECT Directorate on Communications Networks, Content and Technology (EC)
CPE Common Platform Enumeration
CRTM Core Root of Trust for Measurement (TCG)
CSA Cloud Security Association
CSAF Common Security Advisory Framework (OASIS)
CTI Cyber Threat Intelligence (OASIS)
CVE Common Vulnerabilities and Exposures
CVE-ID CVE IDentifier
CVRF Common Vulnerability Reporting Format
CVSS Common Vulnerability Scoring System
CWE Common Weakness Enumeration
CWRAF Common Weakness Risk Analysis Framework
CWSS Common Weakness Scoring System
CYBER Cybersecurity Technical Committee (ETSI)
CYBEX Cybersecurity Information Exchange (ITU-T)
CybOX Cyber Observable Expression
CYIQL Cybersecurity Information Query Language
DAA Direct Anonymous Attestation (TCG)
DCE Dynamic root of trust for measurement Configuration Environment (TCG)
D-CRTM Dynamic Core Root of Trust for Measurement (TCG)
DDoS Distributed Denial of Service
DL Dynamic Launch (TCG)
DLME Dynamically Launched Measured Environment (TCG)
DNS Domain Name System
DoS Denial of Service
dots DDoS open threat signaling (IETF)
D-RTM Dynamic Root of Trust Measurement (TCG)
DSS-X Digital Signature Services eXtended (OASIS)
E2NA End-to-End Network Architectures (ETSI)
EAP Extensible Authentication Protocol
EBIOS Expression of Needs and Identification of Security Objectives
EC European Commission
ECI European Critical Infrastructure
EI-ISAC Elections Infrastructure Information Sharing and Analysis Center
ECRG Electronic Communications Reference Group (EC)
ENFSI European Network of Forensic Institutes
ENISA European Network and Information Security Agency
EPCIP European Programme for Critical Infrastructure Protection
ESI Electronic Signatures and Infrastructures (ETSI)
ESRIM European Security Research & Innovation forum
ETI Encrypted Traffic Inspection working group (IEEE)
ETSI European Telecommunication Standards Institute
EU European Union
EU CSS EU CyberSecurity Strategy (EU)
Europol European Police Office
EVCERT Extended Validation Certificate
FASG GSM Association Fraud and Security Working Group
FIDO Fast IDentity Online
FIPS Federal Information Processing Standards (USA)
FIRST Forum of Incident Response and Security Teams
GFCE Global Forum on Cyber Expertise
GSMA GSM Association
H2020 Horizon 2020
HOME Directorate on Migration and Home Affairs (EC)
HR Directorate on Human Resources and Security (EC)
i2nsf interface to network security functions (IETF)
IA Information Assurance
IAB Internet Architecture Board
IANA Internet Assigned Numbers Authority
ICANN Internet Corporation for Assigned Names and Numbers
ICASI Industry Consortium for Advancement of Security on the Internet
ICE European Critical Infrastructure
ICSG Industry Connections Security Group (IEEE)
ICT Information and Communication Technology
IE Internet Explorer
IEEE Institute for Electrical and Electronic Engineers
IETF Internet Engineering Task Force
IMEI International Mobile station Equipment Identity
IMS IP Multimedia Subsystem (3GPP)
INRIA Institut national de recherche en sciences et technologies du numérique (France)
IODEF Incident Object Description Exchange Format
IP Internet Protocol
ipsecme IP security maintenance and extensions working group (IETF)
IRAP Information security Registered Assessors Program (Australia)
IRTF Internet Research Task Force
ISF Information Security Forum
ISO International Organization for Standardization
IT Information Technology
ITU International Telecommunication Union
ITU-T International Telecommunication Union - Telecommunication Standardization sector
IXP Internet eXchange Point
J-CAT Cybercrime Action Task Force (Europol)
JRC Directorate on Joint Research Centre (EC)
JSON JavaScript Object Notation
JUST Directorate on Justice and Consumers (EC)
kitten common authentication technology next generation working group (IETF)
KMIP Key Management Interoperability Protocol (OASIS)
LECC Law Enforcement/CSIRT Cooperation (FIRST)
LI Lawful Interception
lisp locator/ID separation protocol (IETF)
MACCSA Multinational Alliance for Collaborative Cyber Situational Awareness
MAEC Malware Attribute Enumeration and Characterization
mile Managed incident lightweight exchange working group (IETF)
MMDEF Malware Metadata Exchange Format Working Group (IEEE)
MTS Methods for Testing and Specification (ETSI)
NATO North Atlantic Treaty Organization
NCP National Checklist Program
NCSS National Encrypted traffic integration Strategies
NCIRC NATO Communications and Information Agency
NESAG Network Equipment Security Assurance Group (3GPP)
NFV Network Functions Virtualisation (ETSI)
NIS Network and Information Security (EU)
NIST National Institute of Standards and Technology (USA)
NTECH Network Technologies (ETSI)
NV (Storage) Non-Volatile (shielded location) (TCG)
NVD National Vulnerability Database (USA)
nvo3 network virtualization overlays working group (IETF)
OASIS Organization for the Advancement of Structured Information Standards
oauth web authorization protocol working group (IETF)
OMG Object Management Group
OpenC2 Open Command and Control (OASIS)
opsec operational security capabilities for IP network infrastructure working group (IETF)
OS Operating System
PC Personal Computer
PCA Privacy CA (TCG)
PCR Platform Configuration Register (TCG)
PKCS Public-Key Cryptography Standards
PKI Public Key Infrastructure
PMRM Privacy Management Reference Model (OASIS)
PrivEK Private Endorsement Key (TCG)
PSN Public Sector Network
PubEK Public Endorsement Key (TCG)
RAN subcommittee on Radio Access Network (3GPP)
RID Real-time Inter-network Defense
RoT Root of Trust (component) (TCG)
RTD Directorate on Research and Innovation (EC)
RTM Root of Trust for Measurement (TCG)
RTR Root of Trust for Reporting (TCG)
RTS Root of Trust for Storage (TCG)
SA2 Subcommittee on Architecture (3GPP)
SA3 Subcommittee on Security (3GPP)
SA5 Subcommittee on Telecom Management (3GPP)
sacm security automation and continuous monitoring working group (IETF)
SAGE Security Algorithms Group of Experts (ETSI)
SAI Securing Artificial Intelligence (ETSI)
SAML Security Services (OASIS)
SANS SysAdmin, Audit, Networking, and Security
SAS Security Assurance Specification (3GPP)
SC27 ISO/IEC JTC1 Committee on Security techniques
SC6 ISO/IEC JTC1 Committee on Telecommunications and information exchange between systems
SC7 ISO/IEC JTC1 Committee on Software and systems engineering
SCADA Supervisory Control And Data Acquisition
SCAP Security Content Automation Protocol
SCP Smart Card Platform
SIG Special Interest Group
SE Secure Element
SECAM Study on Security Assurance Methodology (3GPP)
SG 2 Study Group on Operational aspects (ITU-T)
SG11 Study Group on Protocols and test specifications (ITU-T)
SG13 Study Group on Future networks (ITU-T)
SG17 Study Group on Security (ITU-T)
SGDSN Secrétariat Général de la Défense et de la Sécurité Nationale (France)
sidr secure inter-domain routing working group (IETF)
SIEM Security Information and Event Management
SIM Subscriber Identity Module, including USIM and ISIM (ETSI, 3GPP)
SOC Security Operations Centre
SPOC Single Point of Contact
SRK Storage Root Key (TCG)
SSP Smart Secure Platform
stir secure telephone identity revisited working group (IETF)
STIX Structured Threat Information eXpression
TAXII Trusted Automated eXchange of Indicator Information
TBB Trusted Building Block (TCG)
TC Technical Committee
TCG Trusted Computing Group
TCP Transmission Control Protocol
tcpinc TCP increased security working group (IETF)
TEE Trusted Execution Environment
TLP Traffic Light Protocol
TLS Transport Layer Security
tls transport layer security working group (IETF)
TMI Trusted Multi-tenant Infrastructure (TCG)
TNC Trusted Network Connect (TCG)
TPM Trusted Platform Module (TCG)
TPS Trusted Platform Support services (TCG)
trans public notary transparency (IETF)
Trust Elevation electronic identity credential trust elevation methods (OASIS)
TSS TPM Software Stack -or- TCG Software Stack (TCG)
URI Uniform Resource Identifier
uta using TLS in applications (IETF)
VDRX Vulnerability Reporting and Data eXchange SIG (FIRST)
W3C World Wide Web Consortium
websec web security working group (IETF)
wpkops web PKI OPS working group (IETF)
WS-SX Web Services Secure eXchange (OASIS)
XCCDF eXtensible Configuration Checklist Description Format
XDI XRI Data Interchange (OASIS)
XML eXtensible Markup Language
XSPA Cross-Enterprise Security and Privacy Authorization (OASIS)