<Glossary>
	<Section Letter="A">
<Entry><Term>AA</Term><Definition>Accreditation Authority</Definition></Entry>	
<Entry><Term>AS&W</Term><Definition>Attack Sensing and warning</Definition></Entry>	
<Entry><Term>ATO</Term><Definition>Approval to Operate</Definition></Entry>
	</Section>
	<Section Letter="C">
<Entry><Term>CA</Term><Definition>Certifying Authority</Definition></Entry>	
<Entry><Term>CAP</Term><Definition>connection approval process</Definition></Entry>
<Entry><Term>CCTL</Term><Definition>Common Criteria Testing Laboratory</Definition></Entry>
<Entry><Term>CE</Term><Definition>Computing Environment: Includes local area network(s) server host and its operating system, peripherals, and applications.  Source: DoD 8570.01-M, Appendix 1.</Definition></Entry>
<Entry><Term>CDS</Term><Definition>cross domain solution</Definition></Entry>
<Entry><Term>CGI</Term><Definition>Common Gateway Interface</Definition></Entry>
<Entry><Term>CIO</Term><Definition>Chief Information Officer</Definition></Entry>
<Entry><Term>CIFS</Term><Definition>Common Internet File System</Definition></Entry>
<Entry><Term>CISA</Term><Definition>Certified Information Security Auditor</Definition></Entry>
<Entry><Term>CISM</Term><Definition>Certified Information Security Manager</Definition></Entry>
<Entry><Term>CISSP</Term><Definition>Certified Information Systems Security Professional</Definition></Entry>
<Entry><Term>CISSP-ISSMP</Term><Definition>Certified Information Systems Security Professional-Information Systems Security Management Professional</Definition></Entry>
<Entry><Term>CJCSM</Term><Definition>Chairman of the Joint Chiefs of Staff Manual</Definition></Entry>
<Entry><Term>CND</Term><Definition>Computer Network Defense</Definition></Entry>
<Entry><Term>CND-A</Term><Definition>Computer Network Defense-Analyst</Definition></Entry>
<Entry><Term>CND-AU</Term><Definition>Computer Network Defense-Auditor</Definition></Entry>
<Entry><Term>CND-IR</Term><Definition>Computer Network Defense-Incident Responder</Definition></Entry>
<Entry><Term>CND-IS</Term><Definition>Computer Network Defense-Infrastructure Support</Definition></Entry>
<Entry><Term>CND-SPM</Term><Definition>Computer Network Defense-Service Provider Manager</Definition></Entry>
<Entry><Term>CND SP</Term><Definition>Computer Network Defense Service Provider</Definition></Entry>
<Entry><Term>CNSSI</Term><Definition>Committee on National Security Systems</Definition></Entry>
<Entry><Term>COA</Term><Definition>Courses of Action</Definition></Entry>
<Entry><Term>COI</Term><Definition>Community of Interest</Definition></Entry>
<Entry><Term>COP</Term><Definition>Common Operational Picture</Definition></Entry>
<Entry><Term>CSIH</Term><Definition>Computer Security Incident Handler</Definition></Entry>
<Entry><Term>CVE</Term><Definition>Common Vulnerabilities Exposures</Definition></Entry>
	</Section>
	<Section Letter="D">
<Entry>
	<Term>DAA</Term>
	<Definition>Designated Approving Authority: Official with the authority to formally assume responsibility for operating a system at an acceptable level of risk. This term is synonymous with designated approving authority and delegated accrediting authority.</Definition>
    <Source>CNSS Instruction No. 4009</Source>
</Entry>
<Entry><Term>DBMS</Term><Definition>Data Base Management System</Definition></Entry>
<Entry><Term>DCII</Term><Definition>Defense Clearance and Investigations Index</Definition></Entry>
<Entry><Term>DCIO</Term><Definition>Defense Criminal Investigative Office</Definition></Entry>
<Entry><Term>DIA</Term><Definition>Defense Intelligence Agency</Definition></Entry>
<Entry><Term>DIACAP</Term><Definition>Department of Defense Information Assurance Certification and Accreditation Process</Definition></Entry>
<Entry><Term>DII</Term><Definition>Defense Information Infrastructure</Definition></Entry>
<Entry><Term>DISA</Term><Definition>Defense Information Systems Agency</Definition></Entry>
<Entry><Term>DMCA</Term><Definition>Digital Millenium Copyright Act</Definition></Entry>
<Entry><Term>DNI</Term><Definition>Director of National Intelligence</Definition></Entry>
<Entry><Term>DoDD</Term><Definition>Department of Defense Directive</Definition></Entry>
<Entry><Term>DoDI</Term><Definition>Department of Defense Instruction</Definition></Entry>
<Entry><Term>DoDIIS</Term><Definition>Department of Defense Intelligence Information Systems</Definition></Entry>
<Entry><Term>DSAWG</Term><Definition>DISN Security and Accreditation Working Group </Definition></Entry>
	</Section>
	<Section Letter="E">	
<Entry><Term>Enclave</Term><Definition>A collection of CE connected by one or more internal networks under the control of a single authority and security policy, including personnel and physical security. Enclaves provide standard IA capabilities such as boundary defense, incident detection and response, and key management, and also deliver common applications such as office automation and electronic mail. Enclaves are analogous to general support systems, as defined in OMB A-130 (Reference (il)). Enclaves may be specific to an organization or a mission and the CE may be organized by physical proximity or by function, independent of location. Examples of enclaves include local area networks and the applications they host, backbone networks, and data processing centers.  Source: DoD 8570.01-M, Appendix 1.</Definition></Entry>
<Entry><Term>ETA</Term><Definition>Education, Training and Awareness</Definition></Entry>
	</Section>
	<Section Letter="F">
<Entry><Term>FARA</Term><Definition>Federal Acquisitions Reform Act</Definition></Entry>
<Entry><Term>FISMA</Term><Definition>Federal Information Security Management Act</Definition></Entry>
<Entry><Term>FLN</Term><Definition>Foreign Local National</Definition></Entry>
<Entry><Term>FN </Term><Definition>Foreign National</Definition></Entry>
<Entry><Term>FOIA</Term><Definition>Freedom of Information Act</Definition></Entry>
	</Section>
	<Section Letter="G">
<Entry><Term>GCIA</Term><Definition>GIAC Certified Intrusion Analyst</Definition></Entry>
<Entry><Term>GCIH</Term><Definition>GIAC Certified Incident Handler</Definition></Entry>
<Entry><Term>GEM</Term><Definition>GIG Enterprise Management</Definition></Entry>
<Entry><Term>GIAC</Term><Definition>Global Information Assurance Certification</Definition></Entry>
<Entry><Term>GIG</Term><Definition>global information grid</Definition></Entry>
<Entry><Term>GND</Term><Definition>GIG Network Defense</Definition></Entry>
<Entry><Term>Gold Disks</Term><Definition>A series of operating system baseline security configuration management tools that implement the applicable Security Technical Implementation Guides (STIGs).</Definition></Entry>
<Entry><Term>GSNA</Term><Definition>GIAC Systems and Network Auditor</Definition></Entry>	
	</Section>	
	<Section Letter="H">
<Entry><Term>HBBS</Term><Definition>Host-Based Security Systems</Definition></Entry>
<Entry><Term>HIDS</Term><Definition>Host-Based Intrusion Detection System</Definition></Entry>
<Entry><Term>HIPAA</Term><Definition>Health Insurance Portability and Accountability Act</Definition></Entry>
<Entry><Term>Host-Based Security Systems (HBSS)</Term><Definition>A DoD enterprise-wide Information Assurance (IA) tool available to support the IAVM program and ensure secure network operations. HBSS provides centralized management of host-based capabilities and enforcing standard configurations of host machines, monitors and blocks intrusions, provides automatic signature updates, and provides capability to monitor security status from centralized console.</Definition></Entry>
<Entry><Term>HR</Term><Definition>Human Resources</Definition></Entry>
<Entry><Term>HSPD</Term><Definition>Homeland Security Presidential Directive</Definition></Entry>
<Entry><Term>HTML</Term><Definition>Hyper Text Markup Language</Definition></Entry>
	</Section>
	<Section Letter="I">
<Entry>
	<Term>IA</Term>
	<Definition>Information Assurance: Measures that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. These measures include providing for, restoration of information systems by incorporating protection, detection, and reaction capabilities.</Definition>
    <Source>CNSS Instruction No. 4009</Source>	
</Entry>
<Entry><Term>I&amp;W</Term><Definition>indications and Warnings</Definition></Entry>
<Entry><Term>IAM</Term><Definition>Information Assurance Manager</Definition></Entry>
<Entry><Term>IAO</Term><Definition>Information Assurance Officer</Definition></Entry>
<Entry><Term>IASAE</Term><Definition>Information Assurance System Architect and Engineer</Definition></Entry>
<Entry><Term>IAT</Term><Definition>Information Assurance Technical</Definition></Entry>
<Entry><Term>IAT-I</Term><Definition>Information Assurance Technical - Level 1</Definition></Entry>
<Entry><Term>IATO</Term><Definition>Interim Approval to Operate</Definition></Entry>
<Entry><Term>IAVA</Term><Definition>Information Assurance Vulnerabillity Alert</Definition></Entry>
<Entry><Term>IAVB</Term><Definition>Information Assurance Vulnerabillity Bulletin</Definition></Entry>
<Entry><Term>IAVM</Term><Definition>The Information Assurance Vulnerability Management</Definition></Entry>
<Entry><Term>IC</Term><Definition>Intelligence Community</Definition></Entry>
<Entry><Term>IDM/CS</Term><Definition>Information Dissemination Management/Content Staging</Definition></Entry>
<Entry><Term>IDS</Term><Definition>Intrusion detection system</Definition></Entry>
<Entry><Term>IE</Term><Definition>Internet Explorer</Definition></Entry>
<Entry><Term>IM</Term><Definition>Instant Messaging</Definition></Entry>
<Entry><Term>INFOCON</Term><Definition>information Operations Condition</Definition></Entry>
<Entry><Term>Information Assurance Vulnerability Management (IAVM)</Term><Definition>The IAVM Program provides the ability to quickly notify services, combatant commands, defense agencies, and other DoD components of vulnerabilities and the actions needed to correct those vulnerabilities.</Definition></Entry>
<Entry><Term>IPS</Term><Definition>Intrusion Protection System</Definition></Entry>
<Entry><Term>ISC2</Term><Definition>International Information Systems Security Certifications Consortium</Definition></Entry>
<Entry><Term>ISSAP</Term><Definition>Information Systems Security Architecture Professional</Definition></Entry>
<Entry><Term>ISSEP</Term><Definition>Information Systems Security Engineering Professional</Definition></Entry>
<Entry><Term>ISSMP</Term><Definition>Information Systems Security Management Professional</Definition></Entry>
	</Section>
	<Section Letter="J">
<Entry><Term>JTF-GNO</Term><Definition>Joint Task Force - Global Network Operations</Definition></Entry>
	</Section>
	<Section Letter="M">
<Entry><Term>MAC</Term><Definition>1. Mission Assurance Category (Source: DoDI 8500.2) 2. Mandatory Access Control (Source: CNSS Instruction No. 4009)</Definition></Entry>
<Entry><Term>MoA</Term><Definition>Memorandum of Agreement</Definition></Entry>
<Entry><Term>MoU</Term><Definition>Memorandum of Understanding</Definition></Entry>
<Entry><Term>MS</Term><Definition>Microsoft</Definition></Entry>
	</Section>
	<Section Letter="N">
<Entry><Term>NACI</Term><Definition>National Agency Check with Inquiries</Definition></Entry>
<Entry><Term>NACLC</Term><Definition>National Agency Check with Local Agency Check and Credit Check</Definition></Entry>
<Entry><Term>NII</Term><Definition>National Information Infrastructure</Definition></Entry>
<Entry><Term>NE</Term><Definition>Network Environment: The constituent element of an enclave responsible for connecting CE by providing short haul data transport capabilities, such as local or campus area networks, or long haul data transport capabilities, such as operational, metropolitan, or wide area and backbone networks that provides for the application of IA controls.  Source DoD 8570.01-M, Appendix 1.</Definition></Entry>
<Entry><Term>NIPRNET</Term><Definition>Non-secure Internet Protocol Router Network</Definition></Entry>
<Entry><Term>NNTP</Term><Definition>Network News Transfer Protocol</Definition></Entry>
<Entry><Term>NSTISSC</Term><Definition>National Security Telecommunications and Information Systems Security Committee</Definition></Entry>
	</Section>
	<Section Letter="O">
<Entry><Term>OMB</Term><Definition>Office of Management and Budget</Definition></Entry>
	</Section>
	<Section Letter="P">
<Entry><Term>PAA</Term><Definition>Principal Accrediting Authority Source: Interim DoD Certification and Accreditation Guidance, 6 July 2006</Definition></Entry>
<Entry><Term>PDD</Term><Definition>Presidential Decision Directive</Definition></Entry>	
<Entry><Term>PII</Term><Definition>Personally Identifiable Information</Definition></Entry>	
<Entry><Term>PIR</Term><Definition>priority intelligence requirements</Definition></Entry>	
<Entry><Term>POA&M</Term><Definition>Plan of Action and Milestones</Definition></Entry>
<Entry><Term>PPS</Term><Definition>Ports, protocols, and services</Definition></Entry>
<Entry><Term>P2P</Term><Definition>Peer-to-Peer</Definition></Entry>
	</Section>
	<Section Letter="R">
<Entry><Term>RFP</Term><Definition>Request for Proposal</Definition></Entry>
<Entry><Term>RPC</Term><Definition>Remote Procedure Calls</Definition></Entry>
	</Section>	
	<Section Letter="S">
<Entry><Term>SA</Term><Definition>System Administrator</Definition></Entry>
<Entry><Term>SABI</Term><Definition>secret and below interoperability</Definition></Entry>
<Entry><Term>SCCVI</Term><Definition>Secure Configuration Compliance Validation Initiative</Definition></Entry>
<Entry><Term>SCM</Term><Definition>Service Control Manager</Definition></Entry>
<Entry><Term>SCRI</Term><Definition>Secure Configuration Remediation Initiative</Definition></Entry>
<Entry><Term>SDEP</Term><Definition>Spyware Detection, Eradication and Protection</Definition></Entry>
<Entry><Term>Secure Configuration Compliance Validation Initiative (SCCVI)</Term><Definition>A DoD enterprise-wide Information Assurance (IA) tool available to support the IAVM program and ensure secure network operations. SCCVI utilizes eEye Digital Security’s Retina® Network Security Scanner and its Remote Enterprise Management (REM) console to provide vulnerability assessment capability.</Definition></Entry>
<Entry><Term>Secure Configuration Remediation Initiative (SCRI)</Term><Definition>A DoD enterprise-wide Information Assurance (IA) tool available to support the IAVM program and ensure secure network operations. SCRI utilizes Citadel Hercules®  to provide automated vulnerability remediation capability and apply patches, upgrades, fixes, or custom changes to systems affected by IAVM notices.</Definition></Entry>
<Entry><Term>SIAO</Term><Definition>Senior Information Assurance Officer</Definition></Entry>
<Entry><Term>SII</Term><Definition>Security/Suitability Index</Definition></Entry>
<Entry><Term>SIPRNET</Term><Definition>Secret Internet Protocol Router Network</Definition></Entry>
<Entry><Term>SMS</Term><Definition>Short Message Service</Definition></Entry>
<Entry><Term>SMTP</Term><Definition>Simple Mail Transfer Protocol</Definition></Entry>
<Entry><Term>SPC</Term><Definition>Service Control Program</Definition></Entry>
<Entry><Term>Spyware Detection, Eradication and Protection (SDEP)</Term><Definition>A DoD enterprise-wide Information Assurance (IA) tool available to support the IAVM program and ensure secure network operations. SDEP is an enterprise-wide anti-spyware solution that utilizes CA etrust® PestPatrol® and CleverPath™ Forest & Trees®. SDEP detects and removes spyware, adware, trojans, hacker tools, and peer-to-peer (P2P ) and provides a monitoring and reporting capability.</Definition></Entry>
<Entry><Term>SQL</Term><Definition>Structured Query Language</Definition></Entry>
<Entry><Term>SSBI</Term><Definition>Single Scope Background Investigation</Definition></Entry>
<Entry><Term>SSCP</Term><Definition>System Security Certified Practitioner</Definition></Entry>
	</Section>
	<Section Letter="T">
<Entry><Term>TA</Term><Definition>Technical Advisory </Definition></Entry>
<Entry><Term>TASO</Term><Definition>Terminal Area Security Officer</Definition></Entry>
<Entry><Term>TCP</Term><Definition>Transmission Control Protocol</Definition></Entry>
<Entry><Term>TCP/UDP</Term><Definition>Transmission Control Protocol/ User Diagram Protocol</Definition></Entry>
	</Section>	
	<Section Letter="U">
<Entry><Term>UDP</Term><Definition>User Diagram Protocol</Definition></Entry>
<Entry><Term>UNIX</Term><Definition>UNIX System</Definition></Entry>
<Entry><Term>USSTRATCOM</Term><Definition>United States Strategic Command</Definition></Entry>
	</Section>	
	<Section Letter="V">
<Entry><Term>VA</Term><Definition>Vulnerability Assessment</Definition></Entry>
<Entry><Term>VLAN</Term><Definition>Virtual LAN</Definition></Entry>
<Entry><Term>VMS</Term><Definition>Vulnerability Management System</Definition></Entry>
	</Section>
	<Section Letter="W">
<Entry><Term>WAN</Term><Definition>Wide Area Network</Definition></Entry>
<Entry><Term>WSUS</Term><Definition>Windows Server Update Services</Definition></Entry>
<Entry><Term>Windows Server Update Services (WSUS)</Term><Definition>A DoD enterprise-wide Information Assurance (IA) tool available to support the IAVM program and ensure secure network operations. WSUS is a Microsoft automated patching system that is implemented on the NIPRNet and SIPRNet.</Definition></Entry>
	</Section>
	<Section Letter="X">
<Entry><Term>XP</Term><Definition>Windows XP</Definition></Entry>
	</Section>	
</Glossary>



