There is currently no text in this page. You can search for this page title in other pages, or search the related logs, but you do not have permission to create this page.
Category:NSA IATF 3-1 Terms
Pages in category "NSA IATF 3-1 Terms"
The following 79 pages are in this category, out of 79 total.
T
- Term:Advanced Mobile Phone Service
- Term:Anonymity
- Term:Application Program Interface
- Term:Application-Level Firewall
- Term:Asymmetric Cryptographic Algorithm
- Term:Asynchronous Transfer Mode
- Term:Authentication Header
- Term:Authentication Token
- Term:CERT
- Term:Code Division Multiple Access
- Term:Common Criteria
- Term:Compromised Key List
- Term:Computer Intrusion
- Term:Cryptographic Application Program Interface
- Term:Cryptographic Function
- Term:Customer
- Term:Defense in Depth
- Term:Defense-wide Information Assurance Program
- Term:DoD Information Technology Security Certification and Accreditation Process
- Term:Downgrade
- Term:Eavesdropping
- Term:Effective Key Length
- Term:Encapsulating Security Payload
- Term:Evaluation Assurance Level
- Term:Frequency Division Multiple Access
- Term:Future Narrow Band Digital Terminal
- Term:Global Command and Control System
- Term:Global Information Grid
- Term:Global Network Information Environment
- Term:Host-Based Security
- Term:Identification and Authentication
- Term:Information Protection Policy
- Term:Information Systems Security Engineering
- Term:Information Technology
- Term:Insider Attack
- Term:Internet Control Message Protocol
- Term:Intrusion Detection
- Term:Intrusion Detection System
- Term:Key Management Infrastructure
- Term:Labeling
- Term:Layered Solution
- Term:Local Area Network
- Term:Mission Needs Statement
- Term:Motivation
- Term:Multipurpose Internet Mail Extensions
- Term:National Information Assurance Partnership
- Term:Non-Technical Countermeasure
- Term:Open System Interconnection Model
- Term:Perimeter-Based Security
- Term:Pretty Good Privacy
- Term:Protection Needs Elicitation
- Term:Protection Profile
- Term:Risk Plane
- Term:Robustness
- Term:Sanitization
- Term:Secret Key
- Term:Secure Hash
- Term:Secure Multipurpose Internet Mail Extensions
- Term:Security Management Infrastructure
- Term:Security Policy
- Term:Security Target
- Term:Session Key
- Term:Social Engineering
- Term:SOCKS
- Term:Strength of Mechanism
- Term:Symmetric Algorithm
- Term:System Security Authorization Agreement
- Term:Tamper
- Term:Target of Evaluation
- Term:Technical Countermeasure
- Term:Technology Gap
- Term:Time Division Multiple Access
- Term:Token
- Term:Trusted Computer System
- Term:Trusted Computing Base
- Term:Trusted Operating System
- Term:Tunneling Router
- Term:Virtual Network Perimeter
- Term:Wide Area Network