Category:CNSSI 4009 Terms
National Information Assurance (IA) Glossary
Pages in category "CNSSI 4009 Terms"
The following 200 pages are in this category, out of 1,265 total.
(previous page) (next page)A
- Access
- Access Control
- Access Control List
- Access Control Mechanism
- Access Level
- Access List
- Access Profile
- Access Type
- Accountability
- Accounting Legend Code
- Accounting Number
- Accreditation
- Accreditation Boundary
- Accreditation Package
- Accrediting Authority
- Add-On Security
- Adequate Security
- Advanced Encryption Standard
- Advisory
- Alert
- Alternate COMSEC Custodian
- Alternative Work Site
- Anti-Jam
- Anti-Spoof
- Application
- Assurance
- Assured Software
- Attack
- Attack Sensing and Warning
- Audit
- Audit Trail
- Authenticate
- Authentication
- Authentication System
- Authenticator
- Authorization
- Authorized Vendor
- Authorized Vendor Program
- Automated Security Monitoring
- Automatic Remote Rekeying
- Availability
B
C
- Call Back
- Canister
- Cascading
- Category
- CCI Assembly
- CCI Component
- CCI Equipment
- Central Office Of Record
- Certificate
- Certificate Management
- Certificate Revocation List
- Certification
- Certification Authority
- Certification Authority Workstation
- Certification Package
- Certification Test And Evaluation
- Certifier
- Challenge And Reply Authentication
- Check Word
- Checksum
- Cipher
- Cipher Text
- Cipher Text Auto-Key
- Ciphony
- Classified Information
- Classified Information Spillage
- Clearance
- Clearing
- Client
- Closed Security Environment
- Code
- Code Book
- Code Group
- Code Vocabulary
- Cold Start
- Collaborative Computing
- Command Authority
- Commercial COMSEC Evaluation Program
- Common Criteria
- Common Fill Device
- Communications Cover
- Communications Deception
- Communications Profile
- Communications Security
- Community Risk
- Compartmentalization
- Compartmented Mode
- Compromise
- Compromising Emanations
- Computer Abuse
- Computer Cryptography
- Computer Security
- Computer Security Incident
- Computer Security Subsystem
- Computing Environment
- COMSEC Account
- COMSEC Account Audit
- COMSEC Aid
- COMSEC Assembly
- COMSEC Boundary
- COMSEC Chip Set
- COMSEC Control Program
- COMSEC Custodian
- COMSEC Demilitarization
- COMSEC Element
- COMSEC End-Item
- COMSEC Equipment
- COMSEC Facility
- COMSEC Incident
- COMSEC Insecurity
- COMSEC Manager
- COMSEC Material
- COMSEC Material Control System
- COMSEC Modification
- COMSEC Module
- COMSEC Monitoring
- COMSEC Profile
- COMSEC Survey
- COMSEC System Data
- COMSEC Training
- Concept Of Operations
- Confidentiality
- Configuration Control
- Configuration Management
- Confinement Channel
- Contamination
- Contingency Key
- Continuity of Operations Plan
- Controlled Access Area
- Controlled Access Protection
- Controlled Cryptographic Item
- Controlled Interface
- Controlled Space
- Controlling Authority
- Cooperative Key Generation
- Cooperative Remote Rekeying
- Correctness Proof
- Countermeasure
- Covert Channel
- Covert Channel Analysis
- Covert Storage Channel
- Covert Timing Channel
- Credentials
- Critical Infrastructures
- Cross Domain Solution
- Cryptanalysis
- CRYPTO
- Crypto-Alarm
- Crypto-Algorithm
- Crypto-Ancillary Equipment
- Crypto-Equipment
- Crypto-Ignition Key
- Cryptographic
- Cryptographic Component
- Cryptographic Initialization
- Cryptographic Logic
- Cryptography
- Cryptology
- Cryptonet
- Cryptoperiod
- Cryptosecurity
- Cryptosynchronization
- Cryptosystem
- Cryptosystem Analysis
- Cryptosystem Evaluation
- Cryptosystem Review
- Cryptosystem Survey
- Cyclic Redundancy Check
D
- Data Aggregation
- Data Encryption Standard
- Data Flow Control
- Data Integrity
- Data Origin Authentication
- Data Security
- Data Transfer Device
- Decertification
- Decipher
- Decode
- Decrypt
- Dedicated Mode
- Default Classification
- Defense-In-Depth
- Degaussing
- Delegated Development Program
- Demilitarized Zone
- Denial Of Service