Skip to main content

This section of the ISM provides a glossary of abbreviations.

Abbreviation

Meaning

3DES

Triple Data Encryption Standard

AACA

ASD Approved Cryptographic Algorithm

AACP

ASD Approved Cryptographic Protocol

ACE

ASD Cryptographic Evaluation

ACSC

Australian Cyber Security Centre

ACSI

Australian Communications Security Instruction

AES

Advanced Encryption Standard

AGAO

Australian Government Access Only

AGD

Attorney-General's Department

AH

Authentication Header

AISEP

Australasian Information Security Evaluation Program

ANSI

American National Standards Institute

ASD

Australian Signals Directorate

ASIO

Australian Security Intelligence Organisation

ATA

Advanced Technology Attachment

AUSTEO

Australian Eyes Only

CCRA

Common Criteria Recognition Arrangement

CDN

content delivery network

CDS

Cross Domain Solution

CGCE

Commercial Grade Cryptographic Equipment

CISO

Chief Information Security Officer

CNSA

Commercial National Security Algorithm

DBMS

database management system

DH

Diffie-Hellman

DKIM

DomainKeys Identified Mail

DMA

Direct Memory Access

DMARC

Domain-based Message Authentication, Reporting and Conformance

DNS

Domain Name System

DSA

Digital Signature Algorithm

EAL

Evaluation Assurance Level

EAP

Extensible Authentication Protocol

EAP-TLS

Extensible Authentication Protocol-Transport Layer Security

ECDSA

Elliptic Curve Digital Signature Algorithm

ECDH

Elliptic Curve Diffie-Hellman

EEPROM

electrically erasable programmable read-only memory

EMET

Enhanced Mitigation Experience Toolkit

EPROM

erasable programmable read-only memory

ESP

Encapsulating Security Payload

FIPS

Federal Information Processing Standard

HACE

High Assurance Cryptographic Equipment

HIPS

Host-based Intrusion Prevention System

HMAC

Hashed Message Authentication Code

HSTS

HTTP Strict Transport Security

HTML

Hypertext Markup Language

HTTP

Hypertext Transfer Protocol

HTTPS

Hypertext Transfer Protocol Secure

ICT

Information and Communications Technology

IETF

Internet Engineering Task Force

IKE

Internet Key Exchange

IP

Internet Protocol

IPsec

Internet Protocol Security

IPv4

Internet Protocol version 4

IPv6

Internet Protocol version 6

IRAP

Information Security Registered Assessors Program

ISAKMP

Internet Security Association Key Management Protocol

ISM

Australian Government Information Security Manual

ISO

International Organization for Standardization

LAN

Local Area Network

MAC

Media Access Control

MFD

multifunction device

mSATA

Mini-Serial Advanced Technology Attachment

NIDS

Network-based Intrusion Detection System

NIPS

Network-based Intrusion Prevention System

NIST

National Institute of Standards and Technology

OSI

Open System Interconnect

OWASP

Open Web Application Security Project

PDF

Portable Document Format

PFS

Perfect Forward Secrecy

PIN

personal identification number

PKI

Public Key Infrastructure

PMK

Pairwise Master Key

PP

Protection Profile

PSC

Protective Security Circular

PSPF

Protective Security Policy Framework

PSTN

Public Switched Telephone Network

RADIUS

Remote Access Dial-In User Service

RAM

random-access memory

RDP

Remote Desktop Protocol

REL

Releasable To

RF

Radio Frequency

RFC

Request for Comments

RSA

Rivest-Sharmir-Adleman

RTP

Real-time Traffic Protocol

SCEC

Security Construction and Equipment Committee

SEG

Security Equipment Guide

SHA-1

Secure Hashing Algorithm 1

SHA-2

Secure Hashing Algorithm 2

SIP

Session Initiation Protocol

SLAAC

Stateless Address Autoconfiguration

S/MIME

Secure/Multipurpose Internet Mail Extension

SNMP

Simple Network Management Protocol

SOE

Standard Operating Environment

SP

Special Publication

SPF

Sender Policy Framework

SSH

Secure Shell

SSID

Service Set Identifier

SSL

Secure Sockets Layer

TLS

Transport Layer Security

USB

Universal Serial Bus

VLAN

Virtual Local Area Network

VPN

Virtual Private Network

WPA2

Wi-Fi Protocol Access 2

XML

Extensible Markup Language