The Definitive Guide to Security Industry Acronyms

Resources Jan 17, 2020

Whether you’re new to the Security Industry or you’re a seasoned veteran, it’s impossible to keep track of the legions of acronyms thrown around online along with those that are frequently used in your organization. The problem only increases as new terms are added every year due to technology advances and evolving best practices.

That’s why we created this comprehensive guide to Security Industry acronyms - a list that will continually evolve alongside the industry. Put a quick bookmark on this page to use as your personal glossary - no flashcards needed.

Or, use the guide in Polarity and get instant awareness.


The Definitive Guide to Security Industry Acronyms

Acronym Meaning
AAAAAccess Approval Authority
 AAAArmy Audit Agency
 ABCSArmy Battle Command System
 ACAAccess Control Authority
 ACESAutomated Continuing Evaluation System
 ACSIAssistant Chief of Staff for Intelligence (Army)
 ADPAutomated Data Processing
 ADPSOAutomated Data Processing Security Officer
 ADPSSOAutomated Data Processing System Security Officer
 ADRAdjudicative Desk Reference
 ADSAutomated Data System
 AFAir Force
 AFBAir Force Base
 AFCAFAir Force Central Adjudication Facility
 AFIAir Force Instruction
 AFMANAir Force Manual
 AFOSFAir Force Office of Security Forces
 AFOSIAir Force Office of Special Investigations
 AFOSPAir Force Office of Security Police
 AFPCAir Force Personnel Center
 AFPDAir Force Policy Directive
 AFRAir Force Regulation
 AFSCOAir Force Security Clearance Office
 AG/SCMAdvisory Group/Security Countermeasures
 AGSArchitectural Graphic Standards
 AIAAir Intelligence Agency
 AIAArmy Intelligence Agency
 AISAutomated Information Systems
 AISSAutomated Information Systems Security
 AISSPAutomated Information Systems Secuirty Plan‚Äô
 ANACIAccess National Agency Check with Written Inquiries
 AOArea of Operations
 AOAAnalysis of Alternatives
 AOAArea of Application
 APTAdvanced Persistent Threat
 AQ-SAPAcquisition Special Access Program
 AVIENAnti-Virus Information Exchange Network
BBAABusiness Associate Agreement
 BINASBiosafety Information Network Advisory System
 BIOSBasic Input-Output System
 BIPNBackground Investigation plus Current National Agency Check
 BISBureau of Industry and Security
 BISSBase and Installation Security System
 BMSBalanced Magnetic Switch
CCAPTCHACompletely Automated Public Turing Test to Tell Computers and Humans Apart
 CAROComputer Antivirus Research Organization
 CAVPCryptographic Algorithm Validation Program
 CBCCipher Block Chaining
 CBC-MACCipher Block Chaining Message Authentication Code
 CERIASCenter for Education and Research in Information Assurance and Security
 CERTComputer Emergency Response Team
 CHAPChallenge-Handshake Authentication Protocol
 CIRTComputer Incident Response Team
 CISCenter for Internet Security
 CISACertified Information Systems Auditor
 CISMCertified Information Systems Security Manager
 CISOChief Information Security Officer
 CISSPCertified Information Systems Security Professional
 CNAPCybersecurity National Action Plan
 CNCIComprehensive National Cybersecurity Initiative
 CNDComputer Network Defense
 COBITControl Objectives for Information and Related Technologies
 CS&Office of Cybersecurity and Communications
 CSACognizant Security Agency
 CSACloud Security Alliance
 CSCSContract Security Classification Specification
 CSECenter for Security Evaluation
 CSECCyber Security Education Consortium
 CSEACyber Security Enhancement Act
 CSILCritical and Sensitive Information List
 CSISMCommunications Security (COMSEC) Supplement to the Industrial Security Manual
 CSOCognizant Security Office
 CSOChief Security Officer
 CSSCentral Security Service
 CSSConstant Surveillance Service
 CSSIACenter for Systems Security and Information Assurance
 CSSMCommunications-Computer System Security Manager
 CSTConstruction Surveillance Technician
 CTCounter Terrorism
 CTCCounterterrorist Center
 CTSComputerized Telephone System
 CTTACertified Transient Electromagnetic Pulse Emanation Standard (TEMPEST) Technical Authority
 CVSSCommon Vulnerability Scoring System
 CWCode Word
 CWCyber Warfare
DDARPADefense Advanced Research Projects Agency
 DCCDefensive Counter-Cyber
 DCFLDefense Computer Forensics Lab
 DCHCDefense Counterintelligence and Human Intelligence Center
 DCI SSCDirector of Central Intelligence Special Security Center
 DCSDefense Clandestine Service
 DCSINTDeputy Chief of Staff for Intelligence Army
 DDDefense Department
 DDADesignated Disclosure Authority
 DDALDelegation of Disclosure Authority Letter
 DDEPDefense Data Exchange Program
 DDoSDistributed Denial of Service
 DIADefense Intelligence Agency
 DIACDefense Intelligence Analysis Center
 DIACAPDepartment of Defense (DoD) Information Assurance Certification and Accreditation Process
 DIAMDefense Intelligence Agency Manual
 DICDefense Intelligence Community
 DICOBDefense Industrial Security Clearance Oversight Board
 DIDODesignated Intelligence Disclosure Official
 DIIDefense Information Infrastructure
 DIRNSADirector, National Security Agency
 DISDefense Investigative Service
 DISADefense Information Systems Agency
 DISNDefense Information Systems Network
 DISPDepartment of Defense (DoD) Industrial Security Program
 DITSCAPDepartment of Defense (DoD) Information Technology Security Certification and Accreditation Process
 DLPData Loss Prevention
 DMDCDefense Manpower Data Center
 DMFData Management Facility
 DMNSData Management Notification System
 DMSData Management System
 DMSDefense Messaging System
 DNIDirector of National Intelligence
 DNIDirector of Naval Intelligence
 DNSDomain Name Server
 DoDIISDepartment of Defense Intelligence Information System
 DoDISDepartment of Defense Information System
 DOSDenial of Service
 DOSDisk Operating System
 DRAMDynamic Random-Access Memory
 DRBDefense Resources Board
 DRMODefense Reutilization Management Office
 DSDirect Support
 DSADesignated Security Authority
 DSBDefensive Security Brief
 DSCADefense Security Cooperation Agency
 DSECDirector of Security
 DSMCDefense Systems Management College
 DSNDefense Switched Network
 DSSDefense Security Service
 DSSCSDefense Special Security Communication System
 DSS-PICDSS Personnel Investigations Center
 DSSSDefense Special Security System
 DT&Development Test and Evaluation
 DTICDefense Technical Information Center
 DTMData-Transmission Media
 DTSADefense Technology Security Administration
 DVDDigital Video Disk
EEAElectronic Attack
 EDREndpoint Detection & Response
 EPITSEssential Program Information, Technologies and Systems
 EPROMErasable Programmable Read-Only Memory
 EPSQElectronic Personnel Security Questionnaire
 ESElectronic Surveillance
 ESSElectronic Security System
 ETElectronic Transmission
 ETZEquipment Transient Electromagnetic Pulse Emanation Standard (TEMPEST) Zone
 EWElectronic Warfare
 EWSElectronic Warfare Support
FFAFSAFree Application for Federal Student Aid
 FBISForeign Broadcast Information Service
 FCIPForeign Counterintelligence Program
 FCLFacility Security Clearance
 FEMAFederal Emergency Management Agency Only Memory
 FIForeign Intelligence
 FIDSFacility Intrusion Detection System
 FIEForeign Intelligence Entity
 FISForeign Intelligence Services
 FISAForeign Intelligence Surveillance Act
 FISDFederal Investigative Services Division
 FISINTForeign Instrumentation Signals Intelligence
 FISMAFederal Information Security Management Act
 FISSEAFederal Information Systems Security Educators' Association
 FITForeign Inspection Team
 FIUField Investigative Unit
 FNForeign National
 FOIAFreedom of Information Act
 FOIA/PAFreedom of Information Act/Privacy Act
 FRAMFerroelectric Random-Access Memory
 FRDFormerly Restricted Data
 FTZFacilities Transient Electromagnetic Pulse Emanation Standard (TEMPEST) Zone
GG2Assistant Chief of Staff, G2 Intelligence
 G-2Staff Intelligence Officer
 GDIPGeneral Defense Intelligence Programs
 GEOINTGeospatial Intelligence
 GIGGlobal Information Grid
 GIIGlobal Information Infrastructure
 GRCGovernance, Risk Management, and Compliance
 GSCGovernment Security Committee
 GSOIAGeneral Security of Information Agreement
 GSOMIAGeneral Security of Military Information Agreement
HHDMIHigh-Definition Multimedia Interface
 HIPAAHealth Insurance Portability and Accountability Act of 1996
 HOISHostile Intelligence Services
 HPSCIHouse Permanent Select Committee on Intelligence
 HSAHomeland Security Act
 HTTPSSecure Hypertext Transfer Protocol
 HUMINTHuman Intelligence
IIAInformation Assurance
 IAIntelligence Activity
 IAAInterim Access Authorization
 IACSEInteragency Advisory Committee on Security Equipment
 IAMIdentity and access management
 IBEIdentity-Based Encryption
 ICDIntelligence Community Directive
 ICPInitial Control Point
 IDCInternational Data Center
 IDEIntrusion Detection Equipment
 IDS/IDPIntrusion Detection/Intrusion Detection and Prevention
 IEIDInternational Exchange of Infrasound Data
 IERDInternational Exchange of Radionuclide Data
 IESDInternational Exchange of Seismological Data
 IOSSInteragency Operations Security (OPSEC) Support Staff
 IPInternet Protocol
 IPBIntelligence Preparation of the Battlefield
 IPSACInteragency Security Classification Appeals Panel
 IRMInformation Resource Management
 ISInformation System
 ISAInternational Security Agreement
 ISACAInformation Systems Audit and Control Association
 ISAKMPInternet Security Association and Key Management Protocol
 ISAPInformation Security Automation Program
 (ISC)¬≤International Information Systems Security Certification Consortium
 ISCOMNaval Investigative Service Command
 ISDInformation Storage Device
 ISDInspectable Space Determination
 ISDNIntegrated Services Digital Network
 ISFDIndustrial Security Facilities Database
 ISOInternational Organization for Standardization
 ISOOInformation Security Oversight Office
 ISPGIntelligence Programs Support Group
 ISRPInformation Systems Requirements Package
 ISSInformation Systems Security
 ISSInspection Support Staff
 ISSIntegrated Safeguards Subgroup
 ISSAInformation Systems Security Association
 ISSEInformation System Security Engineer
 ISSMInformation Systems Security Manager
 ISSOInformation Systems Security Officer
 ISSPInformation Systems Security Professional
 ISSPMInformation Systems Security Program Manager
 ISSRInformation Systems Security Representative
 ISWGIndustrial Security Working Group
 ITInformation Technology
 ITABInformation Technology Acquisition Board
 ITACIntelligence and Threat Analysis Center
JJ2Intelligence Directorate, Joint Command
 JCITAJoint Counterintelligence Training Academy
 JCSJoint Chiefs of Staff
 JMICJoint Military Intelligence College
 JMIPJoint Military Intelligence Programs
 JMITCJoint Military Intelligence Training Center
 JPASJoint Personnel Adjudication System
 JROCJoint Requirements Oversight Council
 JSAIWGJoint Sensitive Compartmented Information (SCI) Accreditation/Inspection Working Group
 J-SIIDSJoint Services Interior Intrusion Detection System
 JSMJava Security Manager
 JWICSJoint Worldwide Intelligence Communication System
LLAALimited Access Authorization
 LACLocal Agency Check
 LANLocal Area Network
 LBILimited Background Investigation
 LBIPLimited Background Investigation plus Current National Agency Check
 LBIXLimited Background Investigation Expanded
 LELaw Enforcement
 LEALaw Enforcement Agency
 LFCLocal Files Check
 LIMDISLimited Dissemination
 LIMDISLimited Distribution
 LNLocal Network
MMASINTMeasurement and Signature Intelligence
 MIMilitary Intelligence
 MS-ISACMulti-State Information Sharing and Analysis Center
 MSSPManaged Security Services Provider
NNACICNational Counterintelligence Center
 NATONorth Atlantic Treaty Organization (NATO) SECRET ATOMAL
 NCCICNational Cybersecurity and Communications Integration Center
 NCICNational Crime Information Center
 NCRALNational Cyber Risk Alert Level
 NCSNational Communications System
 NCSNational Cryptologic School
 NCSANational Cyber Security Alliance
 NCSAMNational Cyber Security Awareness Month
 NCSCNational Computer Security Center
 NCSDNational Cyber Security Division
 NETMGRNetwork Manager
 NetOpsNetwork Operations
 NFIBNational Foreign Intelligence Board
 NFIPNational Foreign Intelligence Program
 NGANational Geospatial-Intelligence Agency
 NGICNational Ground Intelligence Center
 NICCSNational Initiative for Cybersecurity Careers and Studies
 NICENational Initiative for Cybersecurity Education
 NIINational Information Infrastructure
 NIPRNETNon-Secure/Unclassified Internet Protocol Router Network
 NISNetwork Information System
 NISPOMNational Industrial Security Program Operating Manual
 NISTNational Institute of Standards and Technology
 NATONorth Atlantic Treaty Organization (NATO) SECRET
 NSA/CSSNational Security Agency/Central Security Service
 NSCNational Security Council
 NSINational Security Information
OOCOOffensive Cyberspace Operations
 ODCIOffice of the Director of Central Intelligence
 ODNIOffice of the Director of National Intelligence
 OPSECOperational Security
 OISOffice Information System
PPCI-DSSPayment Card Industry Data Security Standard
 PDSPractice Dangerous to Security
 PDSProtected Distribution System
 PDSPublic Domain Software
 PEDPortable Electronic Device
 PEMProgram Element Monitor
 PHOTINTPhotographic Intelligence
 PIPolice Intelligence
 PIPreliminary Inquiry
 PIDPersonnel Identification Data
 PIIPersonally Identifiable Information
 PROMProgrammable Read-Only Memory
 PROPINProprietary Information
 PSPhysical Security
RRAMRandom-Access Memory
 RDRestricted Data
 RFRadio Frequency
 RFIRadio Frequency Interference
 RFIRepresentative of a Foreign Interest
 RFIDRadio-Frequency Identification
 RIIRelevant Information and Intelligence
 ROMRead-Only Memory
 S&TScience and Technology
 S2Intelligence Officer, U.S. Army
 SASystem Administrator
 SACSSecurity Access Control Systems
 SAESSecurity Awareness and Education
 SARSpecial Access Required
 SANSSystem Administration, Networking, and Security Institute
 SCEService Cryptologic Element
 SCGSecurity Classification Guide
 SCISensitive Compartmented Information
 SCIFSensitive Compartmented Information Facility
 SIEMSecurity Information and Event Management
 SIISuitability/Security Investigation Index
 SIOSenior Intelligence Officer
 SISRSignals Intelligence Security Regulation
 SOCSecurity Operations Center
 SOXSarbanes-Oxley Act of 2002
 SRTMSecurity Requirements Traceability Matrix
 SSBISingle Scope Background Investigation
 SSDCSpace and Strategic Defense Command
 SSESystem Security Engineering
 SSEMSystem Security Engineering
 SSIISuitability/Security Investigations Index
 SSLSecure Socket Layer
 SSMSite Security Manager
 SSMSystem Security Manager
 SSMPSystem Security Management Plan
 SSOSingle Scope Background Investigation
TTIARATactical Intelligence and Related Activities
 TIDTamper Indicating Device
 TIMSTreaty Information Management System
 TISSTelecommunications and Automated Information Systems Security
 TMOTechnology Management Office
 TS/SCITop Secret/Sensitive Compartmented Information
 TTPTactics, Techniques, and Procedures
 UAAUncontrolled Access Area
 UBA/UEBAUser Behavior Analytics
 UCNIUnclassified Controlled Nuclear Information
 UDUnauthorized Disclosure
 USACIDUUnited States Army Criminal Investigation Command
 USAFUnited States Air Force
 USSANUnited States Security Authority/North Atlantic Treaty Organization (NATO)
 USSIDUnited States Signals Intelligence Directive
VVPNVirtual Private Network

Don’t see an acronym you use listed? Give us a shout on LinkedIn or Twitter and we’ll add it to our guide!