Category:Term
Glossary
Terms defined in source documents.
Pages in category "Term"
The following 200 pages are in this category, out of 4,238 total.
(previous page) (next page)A
- Term:Ability
- Term:Abstract Syntax Notation One
- Term:Acceptable Level of Risk
- Term:Acceptable Risk
- Term:Acceptance
- Term:Acceptance Testing
- Term:Access Approval
- Term:Access Approval Authority
- Term:Access Authentication
- Term:Access Authority
- Term:Access Control
- Term:Access Control List
- Term:Access Control Lists
- Term:Access Control Mechanism
- Term:Access Control Mechanisms
- Term:Access Control Software
- Term:Access Control System
- Term:Access Controls
- Term:Access Eligibility Determination
- Term:Access Evaluation
- Term:Access Level
- Term:Access List (IS)
- Term:Access Method
- Term:Access National Agency Check and Inquiries
- Term:Access Path
- Term:Access Path Diagram
- Term:Access Point
- Term:Access Privileges
- Term:Access Profile
- Term:Access Rights
- Term:Access Roster
- Term:Access Termination
- Term:Access Type
- Term:Accesses
- Term:Accessible
- Term:Accessioned Records
- Term:Account Management
- Term:Account Management, User
- Term:Accountability
- Term:Accounting Legend Code
- Term:Accounting Number
- Term:Accreditation
- Term:Accreditation (of Information System)
- Term:Accreditation Authority
- Term:Accreditation Boundary
- Term:Accreditation Decision
- Term:Accreditation Package
- Term:Accredited Security Parameter
- Term:Accredited Standards Committee X12
- Term:Accrediting Authority
- Term:Accuracy
- Term:Accuracy Control
- Term:Acknowledged Special Access Program
- Term:Acoustic Intelligence
- Term:Acoustic Security
- Term:Acquisition
- Term:Acquisition Initiator
- Term:Acquisition Organization
- Term:Acquisition Planning
- Term:Acquisition Program
- Term:Acquisition Special Access Program
- Term:Acquisition Systems Protection
- Term:Acquisition Technical Evaluation
- Term:Acquisition, Development, and Installation Controls
- Term:Activation Data
- Term:Active Attack
- Term:Active Content
- Term:Active Security Testing
- Term:Active Tag
- Term:ActiveX
- Term:Activities
- Term:Activity
- Term:Activity Security Manager
- Term:Actuator
- Term:Ad Hoc Network
- Term:Add-On Security
- Term:Additional Authenticated Data
- Term:Address of Record
- Term:Address Resolution Protocol
- Term:Addressable
- Term:Adequate Evidence
- Term:Adequate Security
- Term:Adj-RIB-Out
- Term:Adjudication
- Term:Adjudication Authority
- Term:Adjudicative Process
- Term:Adjudicator
- Term:Administrative Access
- Term:Administrative Account
- Term:Administrative Safeguards
- Term:Advanced Encryption Standard
- Term:Advanced Mobile Phone Service
- Term:Adversary
- Term:Adversary Collection Methodology
- Term:Adversary Threat Strategy
- Term:Adverse Action
- Term:Adverse Information
- Term:Advisory
- Term:Advisory and Assistance Services
- Term:Affiliate
- Term:Affiliated Covered Entities
- Term:Affiliates
- Term:After Action Report
- Term:Agency
- Term:Agency CA
- Term:Agency Certification Authority
- Term:Agency Head
- Term:Agent
- Term:Agent of the Government
- Term:Aggregate
- Term:Aggregated Risk
- Term:Aggregation
- Term:Aggressive Mode
- Term:Alarm
- Term:Alert
- Term:Algorithm
- Term:Algorithm Identifier
- Term:Algorithm Originator Usage Period
- Term:Algorithm Security Lifetime
- Term:Alien
- Term:Alternate
- Term:Alternate COMSEC Custodian
- Term:Alternate Work Site
- Term:Alternating Current Drive
- Term:Alternative Compensatory Control Measures
- Term:Alternative Work Site
- Term:Alternatives Analysis
- Term:American National Standards Institute
- Term:Analysis
- Term:Analytic Systems
- Term:Analytical Baseline
- Term:Anomaly-Based Detection
- Term:Anonymity
- Term:Anti-Forensic
- Term:Anti-Jam
- Term:Anti-Spoof
- Term:Anti-Tamper
- Term:Anti-Tamper Executive Agent
- Term:Antispyware Software
- Term:Antivirus Software
- Term:Antivirus Tools
- Term:Appeal
- Term:Applicable Associated Markings
- Term:Applicant
- Term:Application
- Term:Application Content Filtering
- Term:Application Controls
- Term:Application Identifier
- Term:Application Layer
- Term:Application Level Gateway
- Term:Application Level General
- Term:Application Program Interface
- Term:Application Programmer
- Term:Application Programs
- Term:Application Server
- Term:Application Session
- Term:Application System
- Term:Application Translation
- Term:Application-Based Intrusion Detection and Prevention System
- Term:Application-Level Firewall
- Term:Approval to Operate
- Term:Approved
- Term:Approved Access Control Device
- Term:Approved Built-in Combination Lock
- Term:Approved Combination Padlock
- Term:Approved Electronic, Mechanical, or Electro-Mechanical Device
- Term:Approved Hash Algorithms
- Term:Approved Key-Operated Padlock
- Term:Approved Mode of Operation
- Term:Approved Security Container
- Term:Approved Security Function
- Term:Approved Vault
- Term:Approved Vault Door
- Term:Architect-Engineer Services
- Term:Architecture
- Term:Architectures
- Term:Archive
- Term:Artifacts
- Term:Assertion
- Term:Assessment
- Term:Assessment Findings
- Term:Assessment Method
- Term:Assessment Object
- Term:Assessment Objective
- Term:Assessment Procedure
- Term:Assessment Team
- Term:Assessor
- Term:Asset
- Term:Asset Database
- Term:Asset Scanner
- Term:Assigned IA Controls
- Term:Assignment of Claims
- Term:Assisted GPS
- Term:Associated Data
- Term:Associated Markings
- Term:Association
- Term:Assurance
- Term:Assurance Case
- Term:Assurance Level