FAT
File allocation table
FDDI
Fiber distributed data interface
FDE
Full disk encryption
FDM
Frequency division multiplexing
FEK
File encryption key
FFC
Finite field cryptography
FMEA
Failure mode and effect analysis
FMR
False match rate
FRR
False rejection rate
FSM
Finite-state-machine
FTP
File transfer protocol
G
G2B
Government-to-business electronic commerce model
G2C
Government-to-citizens electronic commerce model
G2E
Government-to-employees electronic commerce model
G2G
Government-to-government electronic commerce model
GCM
Galois counter mode
GKEK
Group key encryption key
GMAC
Galois message authentication code
GPS
Global positioning system
GSM
Global system for mobile communications
GSSP
Generally accepted system security principles
GTC
Generic token card
GUI
Graphical user interface
H
HA
High availability
HAZMAT
Hazardous materials
HDL
Hardware description language
HDLC
High-level data-link control
HDSL
High data rate DSL
HERF
Hazards of electromagnetic radiation to fuel
HERO
Hazards of electromagnetic radiation to ordnance
HERP
Hazards of electromagnetic radiation to people
HERM
Hazards of electromagnetic radiation to materials
HIP
Host identity protocol
HMAC
Hash-based (keyed-hash) message authentication code
HSSI
High-speed serial interface
HTML
Hypertext markup language
HTTP
Hypertext transfer protocol
HTTPS
Hypertext transfer protocol over SSL
HVAC
Heating, ventilation, and air conditioning
I
IA
Identification and authentication/Information assurance
I/O
Input/output
IAB
Internet architecture board
IAM
Information Assurance Manager/Infosec Assessment Methodology
IAO
Information assurance officer
IATF
Information assurance technical framework
IBAC
Identity-based access control
IBC
Iterated block cipher
IBE
Identity-based encryption
IBGP
Internal border gateway protocol
IC
Integrated circuit
ICMP
Internet control message protocol
ICP
Internet cache protocol
ICSA
International computer security association
ICV
Integrity check value
ID
Identification
IDE
Integrated drive electronics
IDEA
International data encryption algorithm
IDMS
Identity management system
IDPS
Intrusion detection and prevention system
IDS
Intrusion detection system
IE
Internet Explorer
IEC
International electro-technical commission
IEEE
Institute of electrical and electronics engineers
IETF
Internet engineering task force
IGMP
Internet group management protocol
IGRP
Interior gateway routing protocol
IGP
Interior Gateway Protocol
IKE
Internet key exchange
IM
Instant messaging
IMAP
Internet Message Access Protocol
IMM
Information management model
IOCE
International organization on computer evidence
IP
Internet Protocol
IPA
Initial privacy assessment
IPComp
Internet Protocol payload compression protocol
IPS
Intrusion prevention system
IPsec
Internet Protocol security
IPX
Internetwork packet exchange
IRC
Internet relay chat
IRTF
Internet research task force
IS
Information system
ISA
Industry-standard architecture
ISAKMP
Internet security association and key management protocol
ISATAP
Intra-site automatic tunnel addressing protocol
ISC2
International information systems security certification and consortium institute
ISDL
ISDN-based DSL
ISDN
Integrated services digital network
ISF
Information security forum
ISID
Industrial security incident database
ISLAN
Integrated services LAN
ISMAN
Integrated services MAN
ISO
International organization for standardization
ISP
Internet service provider
ISSA
Information Systems Security Association
ISSO
Information systems security officer
IT
Information technology
ITL
Information technology laboratory
ITSEC
Information Technology Security Evaluation Criteria
ITU
International Telecommunication Union
IV
Initialization vector
J
JAD
Joint application design
JBOD
Just a bunch of disks
JCP
Java community process
JIT
Just-in-time
JPEG
Joint photographic experts group
JRE
Java runtime environment
JSM
Java security manager
JSP
Java server page
JVM
Java virtual machine
K
KDC
Key distribution center
KEK
Key encryption key
KG
Key generator
KGD
Key generation and distribution
KMF