<Glossary>
	<Section Letter="A">
<Entry><Term>ATO</Term><Definition>Approval to Operate</Definition></Entry>
	</Section>
	<Section Letter="C">
<Entry><Term>CAP</Term><Definition>connection approval process</Definition></Entry>
<Entry><Term>CCTL</Term><Definition>Common Criteria Testing Laboratory</Definition></Entry>
<Entry><Term>CDS</Term><Definition>cross domain solution</Definition></Entry>
<Entry><Term>CIO</Term><Definition>Chief Information Officer</Definition></Entry>
<Entry><Term>CJCSM</Term><Definition>Chairman of the Joint Chiefs of Staff Manual</Definition></Entry>
<Entry><Term>CNSSI</Term><Definition>Committee on National Security Systems</Definition></Entry>
	</Section>
	<Section Letter="D">
<Entry>
	<Term>DAA</Term>
	<Definition>Designated Approving Authority: Official with the authority to formally assume responsibility for operating a system at an acceptable level of risk. This term is synonymous with designated approving authority and delegated accrediting authority.</Definition>
    <Source>CNSS Instruction No. 4009</Source>
</Entry>
<Entry><Term>DCII</Term><Definition>Defense Clearance and Investigations Index</Definition></Entry>
<Entry><Term>DIA</Term><Definition>Defense Intelligence Agency</Definition></Entry>
<Entry><Term>DII</Term><Definition>Defense Information Infrastructure</Definition></Entry>
<Entry><Term>DISA</Term><Definition>Defense Information Systems Agency</Definition></Entry>
<Entry><Term>DMCA</Term><Definition>Digital Millenium Copyright Act</Definition></Entry>
<Entry><Term>DoDD</Term><Definition>Department of Defense Directive</Definition></Entry>
<Entry><Term>DoDI</Term><Definition>Department of Defense Instruction</Definition></Entry>
<Entry><Term>DoDIIS</Term><Definition>Department of Defense Intelligence Information Systems</Definition></Entry>
<Entry><Term>DSAWG</Term><Definition>DISN Security and Accreditation Working Group </Definition></Entry>
	</Section>
	<Section Letter="F">
<Entry><Term>FARA</Term><Definition>Federal Acquisitions Reform Act</Definition></Entry>
<Entry><Term>FISMA</Term><Definition>Federal Information Security Management Act</Definition></Entry>
<Entry><Term>FLN</Term><Definition>Foreign Local National</Definition></Entry>
<Entry><Term>FN </Term><Definition>Foreign National</Definition></Entry>
<Entry><Term>FOIA</Term><Definition>Freedom of Information Act</Definition></Entry>
	</Section>
	<Section Letter="G">
<Entry><Term>GIG</Term><Definition>global information grid</Definition></Entry>
<Entry><Term>Gold Disks</Term><Definition>A series of operating system baseline security configuration management tools that implement the applicable Security Technical Implementation Guides (STIGs).</Definition></Entry>
	</Section>	
	<Section Letter="H">
<Entry><Term>HBBS</Term><Definition>Host-Based Security Systems</Definition></Entry>
<Entry><Term>HIPAA</Term><Definition>Health Insurance Portability and Accountability Act</Definition></Entry>
<Entry><Term>Host-Based Security Systems (HBSS)</Term><Definition>A DoD enterprise-wide Information Assurance (IA) tool available to support the IAVM program and ensure secure network operations. HBSS provides centralized management of host-based capabilities and enforcing standard configurations of host machines, monitors and blocks intrusions, provides automatic signature updates, and provides capability to monitor security status from centralized console.</Definition></Entry>
<Entry><Term>HR</Term><Definition>Human Resources</Definition></Entry>
<Entry><Term>HSPD</Term><Definition>Homeland Security Presidential Directive</Definition></Entry>
	</Section>
	<Section Letter="I">
<Entry>
	<Term>IA</Term>
	<Definition>Information Assurance: Measures that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. These measures include providing for, restoration of information systems by incorporating protection, detection, and reaction capabilities.</Definition>
    <Source>CNSS Instruction No. 4009</Source>	
</Entry>
<Entry><Term>IAM</Term><Definition>Information Assurance Manager</Definition></Entry>
<Entry><Term>IAO</Term><Definition>Information Assurance Officer</Definition></Entry>
<Entry><Term>IATO</Term><Definition>Interim Approval to Operate</Definition></Entry>
<Entry><Term>IAVA</Term><Definition>Information Assurance Vulnerabillity Alert</Definition></Entry>
<Entry><Term>IAVB</Term><Definition>Information Assurance Vulnerabillity Bulletin</Definition></Entry>
<Entry><Term>IAVM</Term><Definition>The Information Assurance Vulnerability Management</Definition></Entry>
<Entry><Term>Information Assurance Vulnerability Management (IAVM)</Term><Definition>The IAVM Program provides the ability to quickly notify services, combatant commands, defense agencies, and other DoD components of vulnerabilities and the actions needed to correct those vulnerabilities.</Definition></Entry>
	</Section>
	<Section Letter="J">
<Entry><Term>JTF-GNO</Term><Definition>Joint Task Force - Global Network Operations</Definition></Entry>
	</Section>
	<Section Letter="M">
<Entry><Term>MAC</Term><Definition>1. Mission Assurance Category (Source: DoDI 8500.2) 2. Mandatory Access Control (Source: CNSS Instruction No. 4009)</Definition></Entry>
<Entry><Term>MoA</Term><Definition>Memorandum of Agreement</Definition></Entry>
<Entry><Term>MoU</Term><Definition>Memorandum of Understanding</Definition></Entry>
	</Section>
	<Section Letter="N">
<Entry><Term>NACI</Term><Definition>National Agency Check with Inquiries</Definition></Entry>
<Entry><Term>NACLC</Term><Definition>National Agency Check with Local Agency Check and Credit Check</Definition></Entry>
<Entry><Term>NII</Term><Definition>National Information Infrastructure</Definition></Entry>
<Entry><Term>NIPRNET</Term><Definition>Non-secure Internet Protocol Router Network</Definition></Entry>
<Entry><Term>NSTISSC</Term><Definition>National Security Telecommunications and Information Systems Security Committee</Definition></Entry>
	</Section>
	<Section Letter="O">
<Entry><Term>OMB</Term><Definition>Office of Management and Budget</Definition></Entry>
	</Section>
	<Section Letter="P">
<Entry><Term>PDD</Term><Definition>Presidential Decision Directive</Definition></Entry>
<Entry><Term>POA&M</Term><Definition>Plan of Action and Milestones</Definition></Entry>
<Entry><Term>PPS</Term><Definition>Ports, protocols, and services</Definition></Entry>
	</Section>
	<Section Letter="R">
<Entry><Term>RFP</Term><Definition>Request for Proposal</Definition></Entry>
	</Section>	
	<Section Letter="S">
<Entry><Term>SA</Term><Definition>System Administrator</Definition></Entry>
<Entry><Term>SABI</Term><Definition>secret and below interoperability</Definition></Entry>
<Entry><Term>SCCVI</Term><Definition>Secure Configuration Compliance Validation Initiative</Definition></Entry>
<Entry><Term>SCRI</Term><Definition>Secure Configuration Remediation Initiative</Definition></Entry>
<Entry><Term>SDEP</Term><Definition>Spyware Detection, Eradication and Protection</Definition></Entry>
<Entry><Term>Secure Configuration Compliance Validation Initiative (SCCVI)</Term><Definition>A DoD enterprise-wide Information Assurance (IA) tool available to support the IAVM program and ensure secure network operations. SCCVI utilizes eEye Digital Security’s Retina® Network Security Scanner and its Remote Enterprise Management (REM) console to provide vulnerability assessment capability.</Definition></Entry>
<Entry><Term>Secure Configuration Remediation Initiative (SCRI)</Term><Definition>A DoD enterprise-wide Information Assurance (IA) tool available to support the IAVM program and ensure secure network operations. SCRI utilizes Citadel Hercules®  to provide automated vulnerability remediation capability and apply patches, upgrades, fixes, or custom changes to systems affected by IAVM notices.</Definition></Entry>
<Entry><Term>SII</Term><Definition>Security/Suitability Index</Definition></Entry>
<Entry><Term>SIPRNET</Term><Definition>Secret Internet Protocol Router Network</Definition></Entry>
<Entry><Term>Spyware Detection, Eradication and Protection (SDEP)</Term><Definition>A DoD enterprise-wide Information Assurance (IA) tool available to support the IAVM program and ensure secure network operations. SDEP is an enterprise-wide anti-spyware solution that utilizes CA etrust® PestPatrol® and CleverPath™ Forest & Trees®. SDEP detects and removes spyware, adware, trojans, hacker tools, and peer-to-peer (P2P ) and provides a monitoring and reporting capability.</Definition></Entry>
<Entry><Term>SSBI</Term><Definition>Single Scope Background Investigation</Definition></Entry>
	</Section>
	<Section Letter="T">
<Entry><Term>TA</Term><Definition>Technical Advisory </Definition></Entry>
<Entry><Term>TASO</Term><Definition>Terminal Area Security Officer</Definition></Entry>
	</Section>	
	<Section Letter="V">
<Entry><Term>VMS</Term><Definition>Vulnerability Management System</Definition></Entry>
	</Section>
	<Section Letter="W">
<Entry><Term>WSUS</Term><Definition>Windows Server Update Services</Definition></Entry>
<Entry><Term>Windows Server Update Services (WSUS)</Term><Definition>A DoD enterprise-wide Information Assurance (IA) tool available to support the IAVM program and ensure secure network operations. WSUS is a Microsoft automated patching system that is implemented on the NIPRNet and SIPRNet.</Definition></Entry>
	</Section>
</Glossary>



