Abbreviations

From ETI
Revision as of 14:19, 30 July 2021 by Cadzow (talk | contribs)
3GPP
3rd Generation Partnership Project
AC
Authentication Code (TCG)
ACDC
Advanced Cyber Defence Centre
AIK
Attestation Identity Key (TCG)
AIOTI
Alliance of IOT Innovation
AMSS
Anti-Malware Support Services Working Group (IEEE)
ANS Autorité Nationale de Sécurité (Belgium)
ANSSI Agence Nationale de la Sécurité des Systèmes d'Information (France)
APT Advanced Persistent Threat
ARIB Association of Radio Industries and Businesses (Japan)
ATT&CK™ Adversarial Tactics Techniques and Common Knowledge (MITRE)
BLOB Binary Large OBject (TCG)
BORE Break Once Run Everywhere (TCG)
BYOD Bring Your Own Device
CA Certification Authority
CA/B Certificate of Authority/Browser Forum
CACAO Collaborative Automated Course of Action Operations (OASIS)
CAPEC Common Attack Pattern Enumeration and Classification
CBM Confidence Building Measures
CCC Chaos Computer Club
CCDB Common Criteria Development Board
CCDCOE NATO Cooperation Cyber Defence Center of Excellence
CCE Common Configuration Enumeration
CCRA Common Criteria Recognition Agreement
CCSA China Communications Standards Association
CCSB Centre pour Cyber Securité Belgique (Belgium)
CD Cyber Defense
CDT Centres for Doctoral Training (UK)
CEEE Common Event Expression Exchange
CEN Comité Européen de Normalisation
CENELEC European Committee for Electrotechnical Standardization
CEPOL European POLice College
CESG Communications-Electronics Security Group (UK) (now NCSC)
CFRG Crypto Forum Research Group
CI Critical Infrastructure
CIO Chief Information Officer
CIP Critical Infrastructure Protection
CIRT Computer Incident Response Team
CIS Center for Internet Security
CloudAuthZ Cloud Authorization (OASIS)
CMK Certified Migration Key (TCG)
CN subcommittee on Core Network (3GPP)
CONNECT Directorate on Communications Networks, Content and Technology (EC)
CPE Common Platform Enumeration
CRTM Core Root of Trust for Measurement (TCG)
CSA Cloud Security Association
CSAF Common Security Advisory Framework (OASIS)
CTI Cyber Threat Intelligence (OASIS)
CVE Common Vulnerabilities and Exposures
CVE-ID CVE IDentifier
CVRF Common Vulnerability Reporting Format
CVSS Common Vulnerability Scoring System
CWE Common Weakness Enumeration
CWRAF Common Weakness Risk Analysis Framework
CWSS Common Weakness Scoring System
CYBER Cybersecurity Technical Committee (ETSI)
CYBEX Cybersecurity Information Exchange (ITU-T)
CybOX Cyber Observable Expression
CYIQL Cybersecurity Information Query Language
DAA Direct Anonymous Attestation (TCG)
DCE Dynamic root of trust for measurement Configuration Environment (TCG)
D-CRTM Dynamic Core Root of Trust for Measurement (TCG)
DDoS Distributed Denial of Service
DL Dynamic Launch (TCG)
DLME Dynamically Launched Measured Environment (TCG)
DNS Domain Name System
DoS Denial of Service
dots DDoS open threat signaling (IETF)
D-RTM Dynamic Root of Trust Measurement (TCG)
DSS-X Digital Signature Services eXtended (OASIS)
E2NA End-to-End Network Architectures (ETSI)
EAP Extensible Authentication Protocol
EBIOS Expression of Needs and Identification of Security Objectives
EC European Commission
ECI European Critical Infrastructure
EI-ISAC Elections Infrastructure Information Sharing and Analysis Center
ECRG Electronic Communications Reference Group (EC)
ENFSI European Network of Forensic Institutes
ENISA European Network and Information Security Agency
EPCIP European Programme for Critical Infrastructure Protection
ESI Electronic Signatures and Infrastructures (ETSI)
ESRIM European Security Research & Innovation forum
ETI Encrypted Traffic Inspection working group (IEEE)
ETSI European Telecommunication Standards Institute
EU European Union
EU CSS EU CyberSecurity Strategy (EU)
Europol European Police Office
EVCERT Extended Validation Certificate
FASG GSM Association Fraud and Security Working Group
FIDO Fast IDentity Online
FIPS Federal Information Processing Standards (USA)
FIRST Forum of Incident Response and Security Teams
GFCE Global Forum on Cyber Expertise
GSMA GSM Association
H2020 Horizon 2020
HOME Directorate on Migration and Home Affairs (EC)
HR Directorate on Human Resources and Security (EC)
i2nsf interface to network security functions (IETF)
IA Information Assurance
IAB Internet Architecture Board
IANA Internet Assigned Numbers Authority
ICANN Internet Corporation for Assigned Names and Numbers
ICASI Industry Consortium for Advancement of Security on the Internet
ICE European Critical Infrastructure
ICSG Industry Connections Security Group (IEEE)
ICT Information and Communication Technology
IE Internet Explorer
IEEE Institute for Electrical and Electronic Engineers
IETF Internet Engineering Task Force
IMEI International Mobile station Equipment Identity
IMS IP Multimedia Subsystem (3GPP)
INRIA Institut national de recherche en sciences et technologies du numérique (France)
IODEF Incident Object Description Exchange Format
IP Internet Protocol
ipsecme IP security maintenance and extensions working group (IETF)
IRAP Information security Registered Assessors Program (Australia)
IRTF Internet Research Task Force
ISF Information Security Forum
ISO International Organization for Standardization
IT Information Technology
ITU International Telecommunication Union
ITU-T International Telecommunication Union - Telecommunication Standardization sector
IXP Internet eXchange Point
J-CAT Cybercrime Action Task Force (Europol)
JRC Directorate on Joint Research Centre (EC)
JSON JavaScript Object Notation
JUST Directorate on Justice and Consumers (EC)
kitten common authentication technology next generation working group (IETF)
KMIP Key Management Interoperability Protocol (OASIS)
LECC Law Enforcement/CSIRT Cooperation (FIRST)
LI Lawful Interception
lisp locator/ID separation protocol (IETF)
MACCSA Multinational Alliance for Collaborative Cyber Situational Awareness
MAEC Malware Attribute Enumeration and Characterization
mile Managed incident lightweight exchange working group (IETF)
MMDEF Malware Metadata Exchange Format Working Group (IEEE)
MTS Methods for Testing and Specification (ETSI)
NATO North Atlantic Treaty Organization
NCP National Checklist Program
NCSS National Encrypted traffic integration Strategies
NCIRC NATO Communications and Information Agency
NESAG Network Equipment Security Assurance Group (3GPP)
NFV Network Functions Virtualisation (ETSI)
NIS Network and Information Security (EU)
NIST National Institute of Standards and Technology (USA)
NTECH Network Technologies (ETSI)
NV (Storage) Non-Volatile (shielded location) (TCG)
NVD National Vulnerability Database (USA)
nvo3 network virtualization overlays working group (IETF)
OASIS Organization for the Advancement of Structured Information Standards
oauth web authorization protocol working group (IETF)
OMG Object Management Group
OpenC2 Open Command and Control (OASIS)
opsec operational security capabilities for IP network infrastructure working group (IETF)
OS Operating System
PC Personal Computer
PCA Privacy CA (TCG)
PCR Platform Configuration Register (TCG)
PKCS Public-Key Cryptography Standards
PKI Public Key Infrastructure
PMRM Privacy Management Reference Model (OASIS)
PrivEK Private Endorsement Key (TCG)
PSN Public Sector Network
PubEK Public Endorsement Key (TCG)
RAN subcommittee on Radio Access Network (3GPP)
RID Real-time Inter-network Defense
RoT Root of Trust (component) (TCG)
RTD Directorate on Research and Innovation (EC)
RTM Root of Trust for Measurement (TCG)
RTR Root of Trust for Reporting (TCG)
RTS Root of Trust for Storage (TCG)
SA2 Subcommittee on Architecture (3GPP)
SA3 Subcommittee on Security (3GPP)
SA5 Subcommittee on Telecom Management (3GPP)
sacm security automation and continuous monitoring working group (IETF)
SAGE Security Algorithms Group of Experts (ETSI)
SAI Securing Artificial Intelligence (ETSI)
SAML Security Services (OASIS)
SANS SysAdmin, Audit, Networking, and Security
SAS Security Assurance Specification (3GPP)
SC27 ISO/IEC JTC1 Committee on Security techniques
SC6 ISO/IEC JTC1 Committee on Telecommunications and information exchange between systems
SC7 ISO/IEC JTC1 Committee on Software and systems engineering
SCADA Supervisory Control And Data Acquisition
SCAP Security Content Automation Protocol
SCP Smart Card Platform
SIG Special Interest Group
SE Secure Element
SECAM Study on Security Assurance Methodology (3GPP)
SG 2 Study Group on Operational aspects (ITU-T)
SG11 Study Group on Protocols and test specifications (ITU-T)
SG13 Study Group on Future networks (ITU-T)
SG17 Study Group on Security (ITU-T)
SGDSN Secrétariat Général de la Défense et de la Sécurité Nationale (France)
sidr secure inter-domain routing working group (IETF)
SIEM Security Information and Event Management
SIM Subscriber Identity Module, including USIM and ISIM (ETSI, 3GPP)
SOC Security Operations Centre
SPOC Single Point of Contact
SRK Storage Root Key (TCG)
SSP Smart Secure Platform
stir secure telephone identity revisited working group (IETF)
STIX Structured Threat Information eXpression
TAXII Trusted Automated eXchange of Indicator Information
TBB Trusted Building Block (TCG)
TC Technical Committee
TCG Trusted Computing Group
TCP Transmission Control Protocol
tcpinc TCP increased security working group (IETF)
TEE Trusted Execution Environment
TLP Traffic Light Protocol
TLS Transport Layer Security
tls transport layer security working group (IETF)
TMI Trusted Multi-tenant Infrastructure (TCG)
TNC Trusted Network Connect (TCG)
TPM Trusted Platform Module (TCG)
TPS Trusted Platform Support services (TCG)
trans public notary transparency (IETF)
Trust Elevation electronic identity credential trust elevation methods (OASIS)
TSS TPM Software Stack -or- TCG Software Stack (TCG)
URI Uniform Resource Identifier
uta using TLS in applications (IETF)
VDRX Vulnerability Reporting and Data eXchange SIG (FIRST)
W3C World Wide Web Consortium
websec web security working group (IETF)
wpkops web PKI OPS working group (IETF)
WS-SX Web Services Secure eXchange (OASIS)
XCCDF eXtensible Configuration Checklist Description Format
XDI XRI Data Interchange (OASIS)
XML eXtensible Markup Language
XSPA Cross-Enterprise Security and Privacy Authorization (OASIS)