Advanced intelligent networks
Authorization key
Annual loss expectancy
Application layer gateway
Automatic number identification
Artificial neural network
Access point
Application protocol data unit
Application programming interface
Address resolution protocol
Authentication server/authentication service/autonomous system
American standard code for information interchange
Active server page
Advanced technology attachment
Asynchronous transfer mode/automated teller machine
Anti-virus
Attribute-value par
B
Business-to-business electronic commerce model
Business-to-business-to-consumer electronic commerce model
Business-to-consumer electronic commerce model
Business-to-employees electronic commerce model
Business continuity plan
Border gateway protocol
Business impact analysis
Basic input/output system
Bump-in-the-stack
Bootstrap protocol
Business process improvement
Business process reengineering
Business recovery (resumption) plan
Base station
Basic service set
C
Consumer-to-business electronic commerce model
Consumer-to-consumer electronic commerce model
Certification and accreditation
Certification authority
Common access card
Campus-area network
Computer-aided software engineering
Cipher block chaining
Cipher block chaining-message authentication code
Common Criteria
Common configuration enumeration
Cipher block chaining message authentication code protocol
Closed circuit television
Code division multiple access
Content delivery network
Chief executive officer
Crossover error rate (biometrics)
Computer emergency response team
Cipher feedback
Common gateway interface
Challenge-handshake authentication protocol
Clearing house interbank payment system
Classless inter-domain routing
Chief information officer
Computer incident response center
Computer incident response team
Corporate information security officer
Cryptographic key management systems
Configuration management
Cipher-based method authentication code
Capability maturity model
Configuration management system
Cryptographic module validation program
Concept of operations (i.e., only one document)
Continuity of operations
Commercial off-the-shelf
Certificate policy
Common platform enumeration
Certification practice statement
Central processing unit
Challenge-response authentication mechanism
Cyclic redundancy check
Certificate revocation list
Customer relationship management
Client/server
Computer security incident response capability
Computer security incident response team
Carrier sense multiple access with collision avoidance
Carrier sense multiple access with collision detection
Computer security resource center
Chief security officer
Credentials service provider/critical security parameter
Chief technology officer
Counter mode encryption
Common vulnerabilities and exposures
Common vulnerability scoring system
D
Data administration/administrator/destination address
Designated approving authority/designated accrediting authority
Discretionary access control
Duplicate address detection
Direct access storage device
Database administrator
Database management system
Domain controller
Distributed computing environment/data circuit terminating equipment
Data control language
Data dictionary
Data definition language
Distributed data processing
Distributed denial-of-service
Data encryption algorithm
Data encryption standard
Extended data encryption standard
Data flow diagram
Diffie-Hellman
Dynamic host configuration protocol
Direct inward system access/U.S. Defense Information Systems Agency
Data manipulation language
Demilitarized zone
Domain name system
Distributed network protocol
Domain name system
Document object model
Denial-of-service
Denial-of-quality
Differential power analysis
Disaster recovery plan
Digital signature algorithm
Digital subscriber line
Digital signal processors
Digital signature standard
Distance vector multicast routing protocol
E
Exchange-to-exchange electronic commerce model
Evaluation assurance level
Extensible authentication protocol
Extended binary coded decimal interchange code
Exterior border gateway protocol
Electronic benefit transfer system
Electronic commerce
Elliptic curve cryptography
Elliptic curve digital signature algorithm
Elliptic curve Diffie-Hellman