<Glossary>
	<Section Letter="A">
<Entry><Term>AA</Term><Definition>Accreditation Authority</Definition></Entry>	
<Entry><Term>AS&W</Term><Definition>Attack Sensing and warning</Definition></Entry>	
<Entry><Term>ATO</Term><Definition>Approval to Operate</Definition></Entry>
<Entry><Term>Availability</Term><Definition>The property of being accessible and useable upon demand by an authorized entity. NIST SP 800-53: Ensuring timely and reliable access to and use of information. CNSS Instruction No. 4009</Definition></Entry>
	</Section>
	<Section Letter="C">
<Entry><Term>CA</Term><Definition>Certifying Authority</Definition></Entry>	
<Entry><Term>CAP</Term><Definition>connection approval process</Definition></Entry>
<Entry><Term>CCTL</Term><Definition>Common Criteria Testing Laboratory</Definition></Entry>
<Entry><Term>CDS</Term><Definition>cross domain solution</Definition></Entry>
<Entry><Term>CGI</Term><Definition>Common Gateway Interface</Definition></Entry>
<Entry><Term>CIO</Term><Definition>Chief Information Officer</Definition></Entry>
<Entry><Term>CIFS</Term><Definition>Common Internet File System</Definition></Entry>
<Entry><Term>CJCSM</Term><Definition>Chairman of the Joint Chiefs of Staff Manual</Definition></Entry>
<Entry><Term>CND SP</Term><Definition>Computer Network Defense Service Provider</Definition></Entry>
<Entry><Term>CNSSI</Term><Definition>Committee on National Security Systems</Definition></Entry>
<Entry><Term>COA</Term><Definition>Courses of Action</Definition></Entry>
<Entry><Term>COI</Term><Definition>Community of Interest</Definition></Entry>
<Entry><Term>Confidentiality</Term><Definition>The property that information is not disclosed to system entities (users, processes, devices) unless they have been authorized to access the information. NIST SP 800-53: Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information. CNSS Instruction No. 4009</Definition></Entry>
<Entry><Term>COP</Term><Definition>Common Operational Picture</Definition></Entry>
<Entry><Term>CVE</Term><Definition>Common Vulnerabilities Exposures</Definition></Entry>
	</Section>
	<Section Letter="D">
<Entry>
	<Term>DAA</Term>
	<Definition>Designated Approving Authority: Official with the authority to formally assume responsibility for operating a system at an acceptable level of risk. This term is synonymous with designated approving authority and delegated accrediting authority.</Definition>
    <Source>CNSS Instruction No. 4009</Source>
</Entry>
<Entry><Term>DBMS</Term><Definition>Data Base Management System</Definition></Entry>
<Entry><Term>DCII</Term><Definition>Defense Clearance and Investigations Index</Definition></Entry>
<Entry><Term>DCIO</Term><Definition>Defense Criminal Investigative Office</Definition></Entry>
<Entry><Term>DIA</Term><Definition>Defense Intelligence Agency</Definition></Entry>
<Entry><Term>DIACAP</Term><Definition>Department of Defense Information Assurance Certification and Accreditation Process</Definition></Entry>
<Entry><Term>DII</Term><Definition>Defense Information Infrastructure</Definition></Entry>
<Entry><Term>DISA</Term><Definition>Defense Information Systems Agency</Definition></Entry>
<Entry><Term>DMCA</Term><Definition>Digital Millenium Copyright Act</Definition></Entry>
<Entry><Term>DNI</Term><Definition>Director of National Intelligence</Definition></Entry>
<Entry><Term>DoDD</Term><Definition>Department of Defense Directive</Definition></Entry>
<Entry><Term>DoDI</Term><Definition>Department of Defense Instruction</Definition></Entry>
<Entry><Term>DoDIIS</Term><Definition>Department of Defense Intelligence Information Systems</Definition></Entry>
<Entry><Term>DSAWG</Term><Definition>DISN Security and Accreditation Working Group </Definition></Entry>
	</Section>
	<Section Letter="E">	
		<Entry><Term>ETA</Term><Definition>Education, Training and Awareness</Definition></Entry>
	</Section>
	<Section Letter="F">
<Entry><Term>FARA</Term><Definition>Federal Acquisitions Reform Act</Definition></Entry>
<Entry><Term>FISMA</Term><Definition>Federal Information Security Management Act</Definition></Entry>
<Entry><Term>FLN</Term><Definition>Foreign Local National</Definition></Entry>
<Entry><Term>FN </Term><Definition>Foreign National</Definition></Entry>
<Entry><Term>FOIA</Term><Definition>Freedom of Information Act</Definition></Entry>
	</Section>
	<Section Letter="G">
<Entry><Term>GEM</Term><Definition>GIG Enterprise Management</Definition></Entry>	
<Entry><Term>GIG</Term><Definition>global information grid</Definition></Entry>
<Entry><Term>GND</Term><Definition>GIG Network Defense</Definition></Entry>
<Entry><Term>Gold Disks</Term><Definition>A series of operating system baseline security configuration management tools that implement the applicable Security Technical Implementation Guides (STIGs).</Definition></Entry>
	</Section>	
	<Section Letter="H">
<Entry><Term>HBBS</Term><Definition>Host-Based Security Systems</Definition></Entry>
<Entry><Term>HIDS</Term><Definition>Host-Based Intrusion Detection System</Definition></Entry>
<Entry><Term>HIPAA</Term><Definition>Health Insurance Portability and Accountability Act</Definition></Entry>
<Entry><Term>Host-Based Security Systems (HBSS)</Term><Definition>A DoD enterprise-wide Information Assurance (IA) tool available to support the IAVM program and ensure secure network operations. HBSS provides centralized management of host-based capabilities and enforcing standard configurations of host machines, monitors and blocks intrusions, provides automatic signature updates, and provides capability to monitor security status from centralized console.</Definition></Entry>
<Entry><Term>HR</Term><Definition>Human Resources</Definition></Entry>
<Entry><Term>HSPD</Term><Definition>Homeland Security Presidential Directive</Definition></Entry>
<Entry><Term>HTML</Term><Definition>Hyper Text Markup Language</Definition></Entry>
	</Section>
	<Section Letter="I">
<Entry>
	<Term>IA</Term>
	<Definition>Information Assurance: Measures that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. These measures include providing for, restoration of information systems by incorporating protection, detection, and reaction capabilities.</Definition>
    <Source>CNSS Instruction No. 4009</Source>	
</Entry>
<Entry><Term>I&amp;W</Term><Definition>indications and Warnings</Definition></Entry>
<Entry><Term>IAM</Term><Definition>Information Assurance Manager</Definition></Entry>
<Entry><Term>IAO</Term><Definition>Information Assurance Officer</Definition></Entry>
<Entry><Term>IATO</Term><Definition>Interim Approval to Operate</Definition></Entry>
<Entry><Term>IAVA</Term><Definition>Information Assurance Vulnerabillity Alert</Definition></Entry>
<Entry><Term>IAVB</Term><Definition>Information Assurance Vulnerabillity Bulletin</Definition></Entry>
<Entry><Term>IAVM</Term><Definition>The Information Assurance Vulnerability Management</Definition></Entry>
<Entry><Term>IC</Term><Definition>Intelligence Community</Definition></Entry>
<Entry><Term>IDM/CS</Term><Definition>Information Dissemination Management/Content Staging</Definition></Entry>
<Entry><Term>IE</Term><Definition>Internet Explorer</Definition></Entry>
<Entry><Term>IM</Term><Definition>Instant Messaging</Definition></Entry>
<Entry><Term>INFOCON</Term><Definition>information Operations Condition</Definition></Entry>
<Entry><Term>Information Assurance Vulnerability Management (IAVM)</Term><Definition>The IAVM Program provides the ability to quickly notify services, combatant commands, defense agencies, and other DoD components of vulnerabilities and the actions needed to correct those vulnerabilities.</Definition></Entry>
<Entry><Term>Integrity</Term><Definition>The property whereby an entity has not been modified in an unauthorized manner. NIST SP 800-53: Guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity. CNSS Instruction No. 4009</Definition></Entry>
<Entry><Term>IPS</Term><Definition>Intrusion Protection System</Definition></Entry>
	</Section>
	<Section Letter="J">
<Entry><Term>JTF-GNO</Term><Definition>Joint Task Force - Global Network Operations</Definition></Entry>
	</Section>
	<Section Letter="M">
<Entry><Term>MAC</Term><Definition>1. Mission Assurance Category (Source: DoDI 8500.2) 2. Mandatory Access Control (Source: CNSS Instruction No. 4009)</Definition></Entry>
<Entry><Term>MoA</Term><Definition>Memorandum of Agreement</Definition></Entry>
<Entry><Term>MoU</Term><Definition>Memorandum of Understanding</Definition></Entry>
<Entry><Term>MS</Term><Definition>Microsoft</Definition></Entry>
	</Section>
	<Section Letter="N">
<Entry><Term>NACI</Term><Definition>National Agency Check with Inquiries</Definition></Entry>
<Entry><Term>NACLC</Term><Definition>National Agency Check with Local Agency Check and Credit Check</Definition></Entry>
<Entry><Term>NII</Term><Definition>National Information Infrastructure</Definition></Entry>
<Entry><Term>NIPRNET</Term><Definition>Non-secure Internet Protocol Router Network</Definition></Entry>
<Entry><Term>NIST</Term><Definition>National Institute of Standards and Technology</Definition></Entry>
<Entry><Term>NNTP</Term><Definition>Network News Transfer Protocol</Definition></Entry>
<Entry><Term>NSTISSC</Term><Definition>National Security Telecommunications and Information Systems Security Committee</Definition></Entry>
	</Section>
	<Section Letter="O">
<Entry><Term>OMB</Term><Definition>Office of Management and Budget</Definition></Entry>
	</Section>
	<Section Letter="P">
<Entry><Term>PAA</Term><Definition>Principal Accrediting Authority Source: Interim DoD Certification and Accreditation Guidance, 6 July 2006</Definition></Entry>
<Entry><Term>PDD</Term><Definition>Presidential Decision Directive</Definition></Entry>	
<Entry><Term>PII</Term><Definition>Personally Identifiable Information</Definition></Entry>	
<Entry><Term>PIR</Term><Definition>priority intelligence requirements</Definition></Entry>	
<Entry><Term>POA&M</Term><Definition>Plan of Action and Milestones</Definition></Entry>
<Entry><Term>PPS</Term><Definition>Ports, protocols, and services</Definition></Entry>
<Entry><Term>P2P</Term><Definition>Peer-to-Peer</Definition></Entry>
	</Section>
	<Section Letter="R">
<Entry><Term>RFP</Term><Definition>Request for Proposal</Definition></Entry>
<Entry><Term>RPC</Term><Definition>Remote Procedure Calls</Definition></Entry>
	</Section>	
	<Section Letter="S">
<Entry><Term>SA</Term><Definition>System Administrator</Definition></Entry>
<Entry><Term>SABI</Term><Definition>secret and below interoperability</Definition></Entry>
<Entry><Term>SCCVI</Term><Definition>Secure Configuration Compliance Validation Initiative</Definition></Entry>
<Entry><Term>SCM</Term><Definition>Service Control Manager</Definition></Entry>
<Entry><Term>SCRI</Term><Definition>Secure Configuration Remediation Initiative</Definition></Entry>
<Entry><Term>SDEP</Term><Definition>Spyware Detection, Eradication and Protection</Definition></Entry>
<Entry><Term>Secure Configuration Compliance Validation Initiative (SCCVI)</Term><Definition>A DoD enterprise-wide Information Assurance (IA) tool available to support the IAVM program and ensure secure network operations. SCCVI utilizes eEye Digital Security’s Retina® Network Security Scanner and its Remote Enterprise Management (REM) console to provide vulnerability assessment capability.</Definition></Entry>
<Entry><Term>Secure Configuration Remediation Initiative (SCRI)</Term><Definition>A DoD enterprise-wide Information Assurance (IA) tool available to support the IAVM program and ensure secure network operations. SCRI utilizes Citadel Hercules®  to provide automated vulnerability remediation capability and apply patches, upgrades, fixes, or custom changes to systems affected by IAVM notices.</Definition></Entry>
<Entry><Term>SIAO</Term><Definition>Senior Information Assurance Officer</Definition></Entry>
<Entry><Term>SII</Term><Definition>Security/Suitability Index</Definition></Entry>
<Entry><Term>SIPRNET</Term><Definition>Secret Internet Protocol Router Network</Definition></Entry>
<Entry><Term>SMS</Term><Definition>Short Message Service</Definition></Entry>
<Entry><Term>SMTP</Term><Definition>Simple Mail Transfer Protocol</Definition></Entry>
<Entry><Term>SPC</Term><Definition>Service Control Program</Definition></Entry>
<Entry><Term>Spyware Detection, Eradication and Protection (SDEP)</Term><Definition>A DoD enterprise-wide Information Assurance (IA) tool available to support the IAVM program and ensure secure network operations. SDEP is an enterprise-wide anti-spyware solution that utilizes CA etrust® PestPatrol® and CleverPath™ Forest & Trees®. SDEP detects and removes spyware, adware, trojans, hacker tools, and peer-to-peer (P2P ) and provides a monitoring and reporting capability.</Definition></Entry>
<Entry><Term>SQL</Term><Definition>Structured Query Language</Definition></Entry>
<Entry><Term>SSBI</Term><Definition>Single Scope Background Investigation</Definition></Entry>
	</Section>
	<Section Letter="T">
<Entry><Term>TA</Term><Definition>Technical Advisory </Definition></Entry>
<Entry><Term>TASO</Term><Definition>Terminal Area Security Officer</Definition></Entry>
<Entry><Term>TCP</Term><Definition>Transmission Control Protocol</Definition></Entry>
<Entry><Term>TCP/UDP</Term><Definition>Transmission Control Protocol/ User Diagram Protocol</Definition></Entry>
	</Section>	
	<Section Letter="U">
<Entry><Term>UDP</Term><Definition>User Diagram Protocol</Definition></Entry>
<Entry><Term>UNIX</Term><Definition>UNIX System</Definition></Entry>
<Entry><Term>USSTRATCOM</Term><Definition>United States Strategic Command</Definition></Entry>
	</Section>	
	<Section Letter="V">
<Entry><Term>VA</Term><Definition>Vulnerability Assessment</Definition></Entry>
<Entry><Term>VLAN</Term><Definition>Virtual LAN</Definition></Entry>
<Entry><Term>VMS</Term><Definition>Vulnerability Management System</Definition></Entry>
	</Section>
	<Section Letter="W">
<Entry><Term>WAN</Term><Definition>Wide Area Network</Definition></Entry>
<Entry><Term>WSUS</Term><Definition>Windows Server Update Services</Definition></Entry>
<Entry><Term>Windows Server Update Services (WSUS)</Term><Definition>A DoD enterprise-wide Information Assurance (IA) tool available to support the IAVM program and ensure secure network operations. WSUS is a Microsoft automated patching system that is implemented on the NIPRNet and SIPRNet.</Definition></Entry>
	</Section>
	<Section Letter="X">
<Entry><Term>XP</Term><Definition>Windows XP</Definition></Entry>
	</Section>	
</Glossary>



