Acronyms Flashcards
ACAT
Acquisition Category
AO
Authorizing Official
AoA
Analysis of Alternatives
AODR
Authorizing Official’s Designated Representative
APB
Acquisition Program Baseline
APCL
Approved Products Compliance List
APL
Approved Products List
AS
Acquisition Strategy
ASR
Alternative Systems Review
ATC
Approval to Connect
AT&L
Acquisition, Technology and Logistics
ATO
Authorization To Operate
C2
Command and Control
C4ISR
Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance
CA
Criticality Analysis
CAN
Control Area Network
CARD
Cost Analysis Requirements Description
CBT
Computer-Based Training
CCEVS
Common Criteria Evaluation and Validation Scheme
CCI
Control Correlation Identifier
CCTL
Common Criteria Testing Laboratory
CDD
Capability Development Document
CDR
Critical Design Review
CDRL
Contract Data Requirements List
CDS
Cross Domain Solution
CE
Chief Engineer
CGS
Community Gold Standard
C-I-A
Confidentiality, Integrity, and Availability
CIO
Chief Information Officer
CJCSI
Chairman of the Joint Chief of Staff Instruction
CL
Confidentiality Level
CM
Countermeasure
CMVP
Cryptographic Module Validation Program
CNDSP
Computer Network Defense Service Provider
CNSSI
Committee on National Security Systems Instruction
COMSEC
Communications Security
CONOPS
Concept of Operations
COOP
Continuity of Operations Plan
COTS
Commercial off-the-Shelf
CPI
Critical Program Information
CPD
Capability Production Document
CRC
Cyclic Redundancy Check
CTA
Capstone Threat Assessment
CTO
Communications Tasking Order
DAA
Designated Accrediting Authority (older term replaced with Authoring Official)
DAES
Defense Acquisition Executive Summary
DAG
Defense Acquisition Guidebook
DASD
Deputy Assistant Secretary of Defense
DAU
Defense Acquisition University
DBS
Defense Business System
DEMIL
Demilitarization
DFARS
Defense Federal Acquisition Regulation Supplement
DIA
Defense Intelligence Agency
DIACAP
DoD Information Assurance Certification and Accreditation Process
DIB
Defense Industrial Base
DISA
Defense Information Systems Agency
DISN
Defense Information Systems Network
DITPR
DoD IT Portfolio Repository
DoD
Department of Defense
DoDI
Department of Defense Instruction
DoDIN
DoD Information Networks
DOORS
Dynamic Object Oriented Requirements System
DOT&E
Director of Operational Test & Evaluation
DR
Deficiency Report
DSAWG
Defense Information Assurance Security Accreditation Working Group
DSPAV
DoD-specific assignment values
DT&E
Developmental Test and Evaluation
eMASS
Enterprise Mission Assurance Support Service
EMD
Engineering & Manufacturing Development
FCB
Functional Capability Board
FIPS
Federal Information Processing Standards
FISMA
Federal Information Security Management Act
FOUO
For Official Use Only
FRAGO
Fragmentary Orders
FRP
Full Rate Production
FRP/FD
Full Rate Production / Full Deployment
GAO
Government Accountability Office
GOTS
Government off-the-shelf
HBSS
Host-Based Security System
HIDS
Host Intrusion Detection System
IA
Information Assurance
IAS
Information Assurance Strategy (older term, now called Cybersecurity Strategy)
IASE
Information Assurance Support Environment
IATT
Interim Authorization To Test
IAVA
Information Assurance Vulnerability Alert
IC
Intelligence Community
ICD
Initial Capabilities Document
ICS
Industrial Control Systems
ILA
Independent Logistics Assessment
IMP
Integrated Master Plan
IMS
Integrated Master Schedule
IO
Information Owner
IOT&E
Initial Operational Test and Evaluation
IPT
Integrated Product Team
IS
Information System
ISCM
Information Security Continuous Monitoring
ISP
Information Support Plan
ISRMC
Information Security Risk Management Committee
ISSM
Information System Security Manager
ISSO
Information System Security Officer
ISR
In-Service Review
IT
Information Technology
JCIDS
Joint Capabilities Integration and Development System
JROC
Joint Requirements Oversight Council
KPP
Key Performance Parameter
KS
Knowledge Service
KSA
Key System Attribute
LCSP
Life-Cycle Sustainment Plan
LFT&E
Live Fire Test and Evaluation
MAC
Mission Assurance Category
MAIS
Major Automated Information System
MDA
Milestone Decision Authority
MDAP
Major Defense Acquisition Program
MDD
Materiel Development Decision
MO
Mission Owner
MOSA
Modular Open Systems Approach
MS
Milestone
MSA
Materiel Solution Analysis
NIAP
National Information Assurance Partnership
NIPRNet
Non-secure Internet Protocol Router Network
NIST
National Institute of Standards and Technology
NIST SP
National Institute of Standards and Technology Special Publication
NSA
National Security Agency
NSS
National Security System
NTOC
National Threat Operations Center
NVD
National Vulnerability Database
O&S
Operations and Support
ODNI
Office of the Director of National Intelligence
OIG
Office of the Inspector General
OIPT
Overarching Integrated Product Team
OPORD
Operation Order
OSA
Open Systems Architecture
OSD
Office of the Secretary of Defense
OTA
Operational Test Agency
OT&E
Operational T&E
P&D
Production and Deployment
PCA
Physical Configuration Audit
PDR
Preliminary Design Review
PEO
Program Executive Office
PIT
Platform Information Technology
PKI
Public Key Infrastructure
PM
Program Manager
PMO
Program Management Office
POA&M
Plan of Action and Milestones
PPP
Program Protection Plan
RA
Risk Assessment
RAR
Risk Assessment Report
RASCI
Responsible, Accountable, Supportive, Consulted, Informed (one form of a Responsibility Assignment Matrix)
RFP
Request for Proposal
RMF
Risk Management Framework
RMP
Risk Management Plan
RTM
Requirements Traceability Matrix
SAR
Security Assessment Report
SCA
Security Control Assessor (RMF terminology)
SCAP
Security Content Automation Protocol
SCRM
Supply Chain Risk Management
SDD
System Design Document
SDS
System Design Specification
SE
Systems Engineering
SEP
Systems Engineering Plan
SETR
Systems Engineering Technical Review
SFR
System Functional Review
SIPRNet
Secure Internet Protocol Router Network
SLA
Service Level Agreement
SME
Subject Matter Expert
SP
Special Publication
SPS
System Performance Specification
SRD
System Requirements Document
SRG
Security Requirements Guide
SRR
System Requirements Review
SSE
Systems Security Engineering
STAR
System Threat Assessment Report
STIG
Security Technical Implementation Guide
TA
Threat Assessment
TAC
Threat Analysis Center
T&E
Test and Evaluation
TEMP
Test and Evaluation Master Plan
TMRR
Technology Maturation and Risk Reduction
TSN
Trusted Systems and Networks
TTP
Tactics, Techniques, and Procedures
UABS
Unmanned Aerial Bomber System
UC
Unified Capabilities
UCDSMO
Unified Cross Domain Services Management Office
UCR
Unified Capabilities Requirements
USD
Under Secretary of Defense
USD(AT&L)
Under Secretary of Defense for Acquisition, Technology and Logistics
VA
Vulnerability Assessment
VM
Vulnerability Management
WARNORD
Warning Order
WIPT
Working-level Integrated Product Team