THIS IS A SAMPLE! Feel free to use or modify it for your own use! Want a Policies and Procedures Wiki like this? Sign up for a Staff.Wiki trial by clicking here.

CMMC Glossary

The following terms are used throughout the Cybersecurity Maturity Model Compliance standards:

ACAccess Control
AESAdvanced Encryption Standard
APIApplication Programming Interface
ATAwareness and Training
AUAudit and Accountability
C3PAOCMMC Third-Party Assessment Organization
CASecurity Assessment
CD-ROMCompact Disk Read-Only Memory
CIOChief Information Officer
CMConfiguration Management
CMMCCybersecurity Maturity Model Certification
CMVPCryptographic Module Validation Program
CUIControlled Unclassified Information
CVECommon Vulnerabilities and Exposures
CWECommon Weakness Enumeration
DFARSDefense Federal Acquisition Regulation Supplement
DHCDevice Health Check
DIBDefense Industrial Base
DMZDemilitarized Zone
DoDDepartment of Defense
DVDDigital Versatile Disc or Digital Video Disc
ESPExternal Service Provider
FAQFrequently Asked Question
FARFederal Acquisition Regulation
FBIFederal Bureau of Investigation
FCIFederal Contract Information
FDDIFiber Distributed Data Interface
FDEFull Disk Encryption
FIPSFederal Information Processing Standard
FTPFile Transfer Protocol
IAIdentification and Authentication
IDSIntrusion Detection System
IIoTIndustrial Internet of Things
IoTInternet of Things
IPInternet Protocol
IPSecInternet Protocol Security
IRIncident Response
ISACInformation Sharing and Analysis Center
ISDNIntegrated Services Digital Network
ITInformation Technology
LANLocal Area Network
MACMedia Access Control
MDMMobile Device Management
MEPManufacturing Extension Partnership
MFAMultifactor Authentication
MPMedia Protection
NARANational Archives and Records Administration
NASNetworked Attached Storage
NISTNational Institute of Standards and Technology
NSANational Security Agency
NTPNetwork Time Protocol
OSOperating System
OTOperational Technology
PDAPersonal Digital Assistant
PEPhysical Protection
PIVPersonal Identity Verification
PKIPublic Key Infrastructure
POTSPlain Old Telephone Service
PSPersonnel Security
RADIUSRemote Authentication Dial-in User Service
RARisk Assessment
SCSystem and Communications Protection
SISystem and Information Integrity
SMSShort Message Service
SOCSecurity Operations Center
SPSpecial Publication
SSPSystem Security Plan
TLSTransport Layer Security
URLUniversal Resource Locator (aka Uniform Resource Locator)
USBUniversal Serial Bus
UTCCoordinated Universal Time
UUENCODEUnix-to-Unix Encode
VLANVirtual Local Area Network
VoIPVoice over Internet Protocol
VPNVirtual Private Network
WPA2-PSKWiFi Protected Access-Pre-shared Key

Want a Policies & Procedures Wiki like this? Sign up and try Staff.Wiki by clicking here.

Next Topic:
Up Since 5/26/2023 10:59:02 PM