Category:DSS Terms
Defense Security Service
Terms from documents published by the Defense Security Service.
Pages in category "DSS Terms"
The following 200 pages are in this category, out of 806 total.
(previous page) (next page)T
- Term:Acceptable Level of Risk
- Term:Access Approval
- Term:Access Approval Authority
- Term:Access Control Mechanisms
- Term:Access Control System
- Term:Access Eligibility Determination
- Term:Access Evaluation
- Term:Access National Agency Check and Inquiries
- Term:Access Roster
- Term:Access Termination
- Term:Accesses
- Term:Accessioned Records
- Term:Accountability
- Term:Accreditation
- Term:Accreditation (of Information System)
- Term:Accredited Security Parameter
- Term:Accrediting Authority
- Term:Acknowledged Special Access Program
- Term:Acoustic Intelligence
- Term:Acoustic Security
- Term:Acquisition Program
- Term:Acquisition Special Access Program
- Term:Acquisition Systems Protection
- Term:Activity
- Term:Activity Security Manager
- Term:Adjudication
- Term:Adjudication Authority
- Term:Adjudicative Process
- Term:Adjudicator
- Term:Adversary
- Term:Adversary Collection Methodology
- Term:Adversary Threat Strategy
- Term:Adverse Action
- Term:Adverse Information
- Term:Affiliate
- Term:Agency
- Term:Agent
- Term:Agent of the Government
- Term:Alien
- Term:Alternative Compensatory Control Measures
- Term:Analysis
- Term:Anti-Tamper
- Term:Anti-Tamper Executive Agent
- Term:Appeal
- Term:Applicant
- Term:Application
- Term:Approved Access Control Device
- Term:Approved Built-in Combination Lock
- Term:Approved Combination Padlock
- Term:Approved Electronic, Mechanical, or Electro-Mechanical Device
- Term:Approved Key-Operated Padlock
- Term:Approved Security Container
- Term:Approved Vault
- Term:Approved Vault Door
- Term:Assessment
- Term:Asset
- Term:Associated Markings
- Term:Astragal Strip
- Term:Authentication
- Term:Authenticity
- Term:Authorized Adjudicative Agency
- Term:Authorized Classification and Control Markings Register
- Term:Authorized Investigative Agency
- Term:Authorized Person
- Term:Authorized User
- Term:Automated Information System
- Term:Automated Information System Media Control System
- Term:Automatic Declassification
- Term:Availability
- Term:Background Investigation
- Term:Balanced Magnetic Switch
- Term:Beta I
- Term:Beta II
- Term:Billets
- Term:BLACK
- Term:Boundary
- Term:Break-Wire Detector
- Term:Burn Bag
- Term:Burn-In
- Term:BUSTER
- Term:Camouflage
- Term:Carve-Out
- Term:Case Officer
- Term:Case-by-Case Basis
- Term:Caveat
- Term:Central Adjudication Facility
- Term:Central Office
- Term:Central United States Registry for North Atlantic Treaty Organization
- Term:Certification
- Term:Certified TEMPEST Technical Authority
- Term:Clandestine Operation
- Term:Classification
- Term:Classification Guidance
- Term:Classification Guide
- Term:Classification Levels
- Term:Classification Markings and Implementation Working Group
- Term:Classified Contract
- Term:Classified Information Procedures Act
- Term:Classified Military Information
- Term:Classified National Security Information
- Term:Classified Visit
- Term:Classifier
- Term:Clearance
- Term:Clearance Certification
- Term:Cleared Commercial Carrier
- Term:Cleared Employees
- Term:Cleared Escort
- Term:Clearing
- Term:Closed Area
- Term:Closed Storage
- Term:Co-Utilization
- Term:Coalition
- Term:Code Word
- Term:Coercive Force
- Term:Coercivity
- Term:Cognizant Security Agency
- Term:Cognizant Security Office
- Term:Cohabitant
- Term:Collateral Information
- Term:Command and Control Warfare
- Term:Command Authority
- Term:Commercial-Off-the-Shelf
- Term:Communications Intelligence
- Term:Communications Profile
- Term:Communications Security
- Term:Communications Security Monitoring
- Term:Community of Interest
- Term:Community Risk
- Term:Company
- Term:Compartmentation
- Term:Compartmented Intelligence
- Term:Compelling Need
- Term:Compromise
- Term:Compromising Emanations
- Term:Computer Network
- Term:Computer Security
- Term:Computer Security Toolbox
- Term:Computerized Telephone System
- Term:Computing Environment
- Term:Concealment
- Term:Concept of Operations
- Term:Condition
- Term:CONFIDENTIAL
- Term:Confidential Source
- Term:Confidentiality
- Term:Configuration Control
- Term:Configuration Management
- Term:Connection Approval
- Term:Connectivity
- Term:Consignee
- Term:Consignor
- Term:Constant Surveillance Service
- Term:Construction Surveillance Technician
- Term:Continental United States
- Term:Contingency Plan
- Term:Continuous Operation
- Term:Continuous Sensitive Compartmented Information Facility Operation
- Term:Contracting Officer
- Term:Contractor
- Term:Contractor Special Security Officer
- Term:Contractor/Command Program Manager
- Term:Contractor/Command Program Security Officer
- Term:Control
- Term:Controlled Access Area
- Term:Controlled Access Program Coordination Office
- Term:Controlled Access Program Oversight Committee
- Term:Controlled Access Programs
- Term:Controlled Area/Compound
- Term:Controlled Building
- Term:Controlled Cryptographic Item
- Term:Controlled Information
- Term:Controlled Interface
- Term:Controlled Unclassified Information
- Term:Cooperative Program Personnel
- Term:Core Secrets
- Term:Corporate Family
- Term:Corporation
- Term:Corroborate
- Term:Counterintelligence
- Term:Counterintelligence Assessment
- Term:Countermeasures
- Term:Courier
- Term:Cover
- Term:Covert Operation
- Term:Credit Check
- Term:Criminal Activity
- Term:Critical and Sensitive Information List
- Term:Critical Design Review
- Term:Critical Information
- Term:Critical Infrastructures
- Term:Critical Nuclear Weapon Design Information
- Term:Critical Program Information
- Term:Cryptanalysis
- Term:Crypto-Equipment
- Term:Crypto-Ignition Key
- Term:Crypto-Security
- Term:Cryptography
- Term:Cryptologic Information System
- Term:Cryptology
- Term:Custodian