Abbreviations
- 3GPP
- 3rd Generation Partnership Project
- AC
- Authentication Code (TCG)
- ACDC
- Advanced Cyber Defence Centre
- AIK
- Attestation Identity Key (TCG)
- AIOTI
- Alliance of IOT Innovation
- AMSS
- Anti-Malware Support Services Working Group (IEEE)
- ANS
- Autorité Nationale de Sécurité (Belgium)
- ANSSI
- Agence Nationale de la Sécurité des Systèmes d'Information (France)
- APT
- Advanced Persistent Threat
- ARIB
- Association of Radio Industries and Businesses (Japan)
- ATT&CK™
- Adversarial Tactics Techniques and Common Knowledge (MITRE)
- BLOB
- Binary Large OBject (TCG)
- BORE
- Break Once Run Everywhere (TCG)
- BYOD
- Bring Your Own Device
- CA
- Certification Authority
- CA/B
- Certificate of Authority/Browser Forum
- CACAO
- Collaborative Automated Course of Action Operations (OASIS)
- CAPEC
- Common Attack Pattern Enumeration and Classification
- CBM
- Confidence Building Measures
- CCC
- Chaos Computer Club
- CCDB
- Common Criteria Development Board
- CCDCOE
- NATO Cooperation Cyber Defence Center of Excellence
- CCE
- Common Configuration Enumeration
- CCRA
- Common Criteria Recognition Agreement
- CCSA
- China Communications Standards Association
- CCSB
- Centre pour Cyber Securité Belgique (Belgium)
- CD
- Cyber Defense
- CDT
- Centres for Doctoral Training (UK)
- CEEE
- Common Event Expression Exchange
- CEN
- Comité Européen de Normalisation
- CENELEC
- European Committee for Electrotechnical Standardization
- CEPOL
- European POLice College
- CESG
- Communications-Electronics Security Group (UK) (now NCSC)
- CFRG
- Crypto Forum Research Group
- CI
- Critical Infrastructure
- CIO
- Chief Information Officer
- CIP
- Critical Infrastructure Protection
- CIRT
- Computer Incident Response Team
- CIS
- Center for Internet Security
- CloudAuthZ
- Cloud Authorization (OASIS)
- CMK
- Certified Migration Key (TCG)
- CN
- subcommittee on Core Network (3GPP)
- CONNECT
- Directorate on Communications Networks, Content and Technology (EC)
- CPE
- Common Platform Enumeration
- CRTM
- Core Root of Trust for Measurement (TCG)
- CSA
- Cloud Security Association
- CSAF
- Common Security Advisory Framework (OASIS)
- CTI
- Cyber Threat Intelligence (OASIS)
- CVE
- Common Vulnerabilities and Exposures
- CVE-ID
- CVE IDentifier
- CVRF
- Common Vulnerability Reporting Format
- CVSS
- Common Vulnerability Scoring System
- CWE
- Common Weakness Enumeration
- CWRAF
- Common Weakness Risk Analysis Framework
- CWSS
- Common Weakness Scoring System
- CYBER
- Cybersecurity Technical Committee (ETSI)
- CYBEX
- Cybersecurity Information Exchange (ITU-T)
- CybOX
- Cyber Observable Expression
- CYIQL
- Cybersecurity Information Query Language
- DAA
- Direct Anonymous Attestation (TCG)
- DCE
- Dynamic root of trust for measurement Configuration Environment (TCG)
- D-CRTM
- Dynamic Core Root of Trust for Measurement (TCG)
- DDoS
- Distributed Denial of Service
- DL
- Dynamic Launch (TCG)
- DLME
- Dynamically Launched Measured Environment (TCG)
- DNS
- Domain Name System
- DoS
- Denial of Service
- dots
- DDoS open threat signaling (IETF)
- D-RTM
- Dynamic Root of Trust Measurement (TCG)
- DSS-X
- Digital Signature Services eXtended (OASIS)
- E2NA
- End-to-End Network Architectures (ETSI)
- EAP
- Extensible Authentication Protocol
- EBIOS
- Expression of Needs and Identification of Security Objectives
- EC
- European Commission
- ECI
- European Critical Infrastructure
- EI-ISAC
- Elections Infrastructure Information Sharing and Analysis Center
- ECRG
- Electronic Communications Reference Group (EC)
- ENFSI
- European Network of Forensic Institutes
- ENISA
- European Network and Information Security Agency
- EPCIP
- European Programme for Critical Infrastructure Protection
- ESI
- Electronic Signatures and Infrastructures (ETSI)
- ESRIM
- European Security Research & Innovation forum
- ETI
- Encrypted Traffic Inspection working group (IEEE)
- ETSI
- European Telecommunication Standards Institute
- EU
- European Union
- EU CSS
- EU CyberSecurity Strategy (EU)
- Europol
- European Police Office
- EVCERT
- Extended Validation Certificate
- FASG
- GSM Association Fraud and Security Working Group
- FIDO
- Fast IDentity Online
- FIPS
- Federal Information Processing Standards (USA)
- FIRST
- Forum of Incident Response and Security Teams
- GFCE
- Global Forum on Cyber Expertise
- GSMA
- GSM Association
- H2020
- Horizon 2020
- HOME
- Directorate on Migration and Home Affairs (EC)
- HR
- Directorate on Human Resources and Security (EC)
- i2nsf
- interface to network security functions (IETF)
- IA
- Information Assurance
- IAB
- Internet Architecture Board
- IANA
- Internet Assigned Numbers Authority
- ICANN
- Internet Corporation for Assigned Names and Numbers
- ICASI
- Industry Consortium for Advancement of Security on the Internet
- ICE
- European Critical Infrastructure
- ICSG
- Industry Connections Security Group (IEEE)
- ICT
- Information and Communication Technology
- IE
- Internet Explorer
- IEEE
- Institute for Electrical and Electronic Engineers
- IETF
- Internet Engineering Task Force
- IMEI
- International Mobile station Equipment Identity
- IMS IP Multimedia Subsystem (3GPP)
- INRIA Institut national de recherche en sciences et technologies du numérique (France)
- IODEF Incident Object Description Exchange Format
- IP Internet Protocol
- ipsecme IP security maintenance and extensions working group (IETF)
- IRAP Information security Registered Assessors Program (Australia)
- IRTF Internet Research Task Force
- ISF Information Security Forum
- ISO International Organization for Standardization
- IT Information Technology
- ITU International Telecommunication Union
- ITU-T International Telecommunication Union - Telecommunication Standardization sector
- IXP Internet eXchange Point
- J-CAT Cybercrime Action Task Force (Europol)
- JRC Directorate on Joint Research Centre (EC)
- JSON JavaScript Object Notation
- JUST Directorate on Justice and Consumers (EC)
- kitten common authentication technology next generation working group (IETF)
- KMIP Key Management Interoperability Protocol (OASIS)
- LECC Law Enforcement/CSIRT Cooperation (FIRST)
- LI Lawful Interception
- lisp locator/ID separation protocol (IETF)
- MACCSA Multinational Alliance for Collaborative Cyber Situational Awareness
- MAEC Malware Attribute Enumeration and Characterization
- mile Managed incident lightweight exchange working group (IETF)
- MMDEF Malware Metadata Exchange Format Working Group (IEEE)
- MTS Methods for Testing and Specification (ETSI)
- NATO North Atlantic Treaty Organization
- NCP National Checklist Program
- NCSS National Encrypted traffic integration Strategies
- NCIRC NATO Communications and Information Agency
- NESAG Network Equipment Security Assurance Group (3GPP)
- NFV Network Functions Virtualisation (ETSI)
- NIS Network and Information Security (EU)
- NIST National Institute of Standards and Technology (USA)
- NTECH Network Technologies (ETSI)
- NV (Storage) Non-Volatile (shielded location) (TCG)
- NVD National Vulnerability Database (USA)
- nvo3 network virtualization overlays working group (IETF)
- OASIS Organization for the Advancement of Structured Information Standards
- oauth web authorization protocol working group (IETF)
- OMG Object Management Group
- OpenC2 Open Command and Control (OASIS)
- opsec operational security capabilities for IP network infrastructure working group (IETF)
- OS Operating System
- PC Personal Computer
- PCA Privacy CA (TCG)
- PCR Platform Configuration Register (TCG)
- PKCS Public-Key Cryptography Standards
- PKI Public Key Infrastructure
- PMRM Privacy Management Reference Model (OASIS)
- PrivEK Private Endorsement Key (TCG)
- PSN Public Sector Network
- PubEK Public Endorsement Key (TCG)
- RAN subcommittee on Radio Access Network (3GPP)
- RID Real-time Inter-network Defense
- RoT Root of Trust (component) (TCG)
- RTD Directorate on Research and Innovation (EC)
- RTM Root of Trust for Measurement (TCG)
- RTR Root of Trust for Reporting (TCG)
- RTS Root of Trust for Storage (TCG)
- SA2 Subcommittee on Architecture (3GPP)
- SA3 Subcommittee on Security (3GPP)
- SA5 Subcommittee on Telecom Management (3GPP)
- sacm security automation and continuous monitoring working group (IETF)
- SAGE Security Algorithms Group of Experts (ETSI)
- SAI Securing Artificial Intelligence (ETSI)
- SAML Security Services (OASIS)
- SANS SysAdmin, Audit, Networking, and Security
- SAS Security Assurance Specification (3GPP)
- SC27 ISO/IEC JTC1 Committee on Security techniques
- SC6 ISO/IEC JTC1 Committee on Telecommunications and information exchange between systems
- SC7 ISO/IEC JTC1 Committee on Software and systems engineering
- SCADA Supervisory Control And Data Acquisition
- SCAP Security Content Automation Protocol
- SCP Smart Card Platform
- SIG Special Interest Group
- SE Secure Element
- SECAM Study on Security Assurance Methodology (3GPP)
- SG 2 Study Group on Operational aspects (ITU-T)
- SG11 Study Group on Protocols and test specifications (ITU-T)
- SG13 Study Group on Future networks (ITU-T)
- SG17 Study Group on Security (ITU-T)
- SGDSN Secrétariat Général de la Défense et de la Sécurité Nationale (France)
- sidr secure inter-domain routing working group (IETF)
- SIEM Security Information and Event Management
- SIM Subscriber Identity Module, including USIM and ISIM (ETSI, 3GPP)
- SOC Security Operations Centre
- SPOC Single Point of Contact
- SRK Storage Root Key (TCG)
- SSP Smart Secure Platform
- stir secure telephone identity revisited working group (IETF)
- STIX Structured Threat Information eXpression
- TAXII Trusted Automated eXchange of Indicator Information
- TBB Trusted Building Block (TCG)
- TC Technical Committee
- TCG Trusted Computing Group
- TCP Transmission Control Protocol
- tcpinc TCP increased security working group (IETF)
- TEE Trusted Execution Environment
- TLP Traffic Light Protocol
- TLS Transport Layer Security
- tls transport layer security working group (IETF)
- TMI Trusted Multi-tenant Infrastructure (TCG)
- TNC Trusted Network Connect (TCG)
- TPM Trusted Platform Module (TCG)
- TPS Trusted Platform Support services (TCG)
- trans public notary transparency (IETF)
- Trust Elevation electronic identity credential trust elevation methods (OASIS)
- TSS TPM Software Stack -or- TCG Software Stack (TCG)
- URI Uniform Resource Identifier
- uta using TLS in applications (IETF)
- VDRX Vulnerability Reporting and Data eXchange SIG (FIRST)
- W3C World Wide Web Consortium
- websec web security working group (IETF)
- wpkops web PKI OPS working group (IETF)
- WS-SX Web Services Secure eXchange (OASIS)
- XCCDF eXtensible Configuration Checklist Description Format
- XDI XRI Data Interchange (OASIS)
- XML eXtensible Markup Language
- XSPA Cross-Enterprise Security and Privacy Authorization (OASIS)