<section title="24.1. Glossary of Abbreviations"><subsection title="Glossary of Abbreviations"><paragraph
    title="24.1.1."


><![CDATA[<table class="table-main" cellspacing="0" cellpadding="0">
<tbody>
<tr>
<td>
<p>Abbreviation</p>
</td>
<td>
<p>Meaning</p>
</td>
</tr>
<tr>
<td>
<p>3DES</p>
</td>
<td>
<p><span>Triple Data Encryption Standard</span></p>
</td>
</tr>
<tr>
<td>
<p>ABAC</p>
</td>
<td>
<p>Attribute Based Access Control</p>
</td>
</tr>
<tr>
<td>
<p>AES</p>
</td>
<td>
<p>Advanced Encryption Standard</p>
</td>
</tr>
<tr>
<td>
<p>AH</p>
</td>
<td>
<p>Authentication Header</p>
</td>
</tr>
<tr>
<td>
<p>AISEP</p>
</td>
<td>
<p>Australasian Information Security Evaluation Program</p>
</td>
</tr>
<tr>
<td>
<p>AoG</p>
</td>
<td>
<p>All-of-Government</p>
</td>
</tr>
<tr>
<td>
<p>AS</p>
</td>
<td>
<p>Australian Standard</p>
</td>
</tr>
<tr>
<td>
<p>ASD</p>
</td>
<td>
<p>Australian Signals Directorate</p>
</td>
</tr>
<tr>
<td>
<p>BYOD</p>
</td>
<td>
<p>Bring Your Own Device</p>
</td>
</tr>
<tr>
<td>
<p>BYOK</p>
</td>
<td>
<p>Bring Your Own Keys</p>
</td>
</tr>
<tr>
<td>
<p>CAVP</p>
</td>
<td>
<p><span>Cryptographic Algorithm Validation Program</span></p>
</td>
</tr>
<tr>
<td>
<p>CBC</p>
</td>
<td>
<p>Cipher Block Chaining</p>
</td>
</tr>
<tr>
<td>
<p>CC</p>
</td>
<td>
<p>Common Criteria</p>
</td>
</tr>
<tr>
<td>
<p>CCI</p>
</td>
<td>
<p>Controlled Cryptographic Item</p>
</td>
</tr>
<tr>
<td>
<p>CCRA</p>
</td>
<td>
<p>Common Criteria Recognition Arrangement</p>
</td>
</tr>
<tr>
<td>
<p>CDS</p>
</td>
<td>
<p>Cross-Domain Solution</p>
</td>
</tr>
<tr>
<td>
<p>CEO</p>
</td>
<td>
<p>Chief Executive Officer</p>
</td>
</tr>
<tr>
<td>
<p>CIO</p>
</td>
<td>
<p>Chief Information Officer</p>
</td>
</tr>
<tr>
<td>
<p>CISO</p>
</td>
<td>
<p>Chief Information Security Officer</p>
</td>
</tr>
<tr>
<td>
<p>COMSEC</p>
</td>
<td>
<p>Communications Security</p>
</td>
</tr>
<tr>
<td>
<p>CSfC</p>
</td>
<td>
<p>Commercial Solutions for Classified</p>
</td>
</tr>
<tr>
<td>
<p>CSO</p>
</td>
<td>
<p>Chief Security Officer</p>
</td>
</tr>
<tr>
<td>
<p>CSP</p>
</td>
<td>
<p>Cloud Service Provider</p>
</td>
</tr>
<tr>
<td>
<p>DdoS</p>
</td>
<td>
<p>Distributed Denial-Of-Service</p>
</td>
</tr>
<tr>
<td>
<p>DH</p>
</td>
<td>
<p>Diffie-Hellman</p>
</td>
</tr>
<tr>
<td>
<p>DIS</p>
</td>
<td>
<p>Draft International Standard</p>
</td>
</tr>
<tr>
<td>
<p>DKIM</p>
</td>
<td>
<p>DomainKeys Identified Mail</p>
</td>
</tr>
<tr>
<td>
<p>DMARC</p>
</td>
<td>Domain-based Message Authentication, Reporting and Conformance</td>
</tr>
<tr>
<td>
<p>DMZ</p>
</td>
<td>Demilitarized zone</td>
</tr>
<tr>
<td>
<p>DoS</p>
</td>
<td>
<p>Denial-Of-Service</p>
</td>
</tr>
<tr>
<td>
<p>DSA</p>
</td>
<td>
<p>Digital Signature Algorithm</p>
</td>
</tr>
<tr>
<td>
<p>EAL</p>
</td>
<td>
<p>Evaluation Assurance Level</p>
</td>
</tr>
<tr>
<td>
<p>EAP-TLS</p>
</td>
<td>
<p>Extensible Authentication Protocol-Transport Layer Security</p>
</td>
</tr>
<tr>
<td>
<p>ECB</p>
</td>
<td>
<p>Electronic Code Book mode</p>
</td>
</tr>
<tr>
<td>
<p>ECDH</p>
</td>
<td>
<p>Elliptic Curve Diffie-Hellman</p>
</td>
</tr>
<tr>
<td>
<p>ECDSA</p>
</td>
<td>
<p>Elliptic Curve Digital Signature Algorithm</p>
</td>
</tr>
<tr>
<td>
<p>EEPROM</p>
</td>
<td>
<p>Electrically Erasable Programmable Read-Only Memory</p>
</td>
</tr>
<tr>
<td>
<p>EPL</p>
</td>
<td>
<p>Evaluated Products List</p>
</td>
</tr>
<tr>
<td>
<p>EPLD</p>
</td>
<td>
<p>Evaluated Products List – Degausser</p>
</td>
</tr>
<tr>
<td>
<p>EPROM</p>
</td>
<td>
<p>Erasable Programmable Read-Only Memory</p>
</td>
</tr>
<tr>
<td>
<p>ESP</p>
</td>
<td>
<p>Encapsulating Security Payload</p>
</td>
</tr>
<tr>
<td>
<p>FIPS</p>
</td>
<td>
<p>Federal Information Processing Standard</p>
</td>
</tr>
<tr>
<td>
<p>FPGA</p>
</td>
<td>
<p>Field Programmable Gate Array</p>
</td>
</tr>
<tr>
<td>
<p>FTL</p>
</td>
<td>
<p>Flash Transition Layer</p>
</td>
</tr>
<tr>
<td>
<p>GCDO</p>
</td>
<td>
<p>NZ Government Chief Digital Officer</p>
</td>
</tr>
<tr>
<td>
<p>GCSB</p>
</td>
<td>
<p>Government Communications Security Bureau</p>
</td>
</tr>
<tr>
<td>
<p>GPU</p>
</td>
<td>
<p>Graphics Processing Unit</p>
</td>
</tr>
<tr>
<td>
<p>HA</p>
</td>
<td>
<p>High Availability</p>
</td>
</tr>
<tr>
<td>
<p>HACE</p>
</td>
<td>
<p>High Assurance Cryptographic Equipment</p>
</td>
</tr>
<tr>
<td>
<p>HB</p>
</td>
<td>
<p>Handbook</p>
</td>
</tr>
<tr>
<td>
<p>HGCE</p>
</td>
<td>
<p>High Grade Cryptographic Equipment. Terminology superseded by HACE.</p>
</td>
</tr>
<tr>
<td>
<p>HGCP</p>
</td>
<td>
<p>High Grade Cryptographic Products. Terminology superseded by HACE.</p>
</td>
</tr>
<tr>
<td>
<p>HMAC</p>
</td>
<td>
<p>Hashed Message Authentication Code</p>
</td>
</tr>
<tr>
<td>
<p>HSM</p>
</td>
<td>
<p>Hardware Security Module</p>
</td>
</tr>
<tr>
<td>
<p>HTTP</p>
</td>
<td>
<p>Hypertext Transfer Protocol</p>
</td>
</tr>
<tr>
<td>
<p>HTTPS</p>
</td>
<td>
<p>Hypertext Transfer Protocol Secure</p>
</td>
</tr>
<tr>
<td>
<p>HYOK</p>
</td>
<td>
<p>Hold Your Own Keys</p>
</td>
</tr>
<tr>
<td>
<p>IaaS</p>
</td>
<td>
<p>Infrastructure-as-a-Service</p>
</td>
</tr>
<tr>
<td>
<p>ICT</p>
</td>
<td>
<p>Information And Communications Technology</p>
</td>
</tr>
<tr>
<td>
<p>IDS</p>
</td>
<td>
<p>Intrusion Detection System</p>
</td>
</tr>
<tr>
<td>
<p>IEC</p>
</td>
<td>
<p>International Electrotechnical Commission</p>
</td>
</tr>
<tr>
<td>
<p>IEEE</p>
</td>
<td>
<p>Institute Of Electrical And Electronics Engineers</p>
</td>
</tr>
<tr>
<td>
<p>IETF</p>
</td>
<td>
<p>International Engineering Task Force</p>
</td>
</tr>
<tr>
<td>
<p>IKE</p>
</td>
<td>
<p>Internet Key Exchange</p>
</td>
</tr>
<tr>
<td>
<p>IM</p>
</td>
<td>
<p>Instant Messaging</p>
</td>
</tr>
<tr>
<td>
<p>IMS</p>
</td>
<td>
<p>IP Multimedia Subsystem</p>
</td>
</tr>
<tr>
<td>
<p>IODEF</p>
</td>
<td>
<p>Incident Object Description Exchange Format</p>
</td>
</tr>
<tr>
<td>
<p>IP</p>
</td>
<td>
<p>Internet Protocol</p>
</td>
</tr>
<tr>
<td>
<p>IPSec</p>
</td>
<td>
<p>Internet Protocol Security</p>
</td>
</tr>
<tr>
<td>
<p>IR</p>
</td>
<td>
<p>Infrared</p>
</td>
</tr>
<tr>
<td>
<p>IRC</p>
</td>
<td>
<p>Internet Relay Chat</p>
</td>
</tr>
<tr>
<td>
<p>IPT</p>
</td>
<td>
<p>Internet Protocol Telephony</p>
</td>
</tr>
<tr>
<td>
<p>IRP</p>
</td>
<td>
<p>Incident Response Plan</p>
</td>
</tr>
<tr>
<td>
<p>ISAKMP</p>
</td>
<td>
<p>Internet Security Association Key Management Protocol</p>
</td>
</tr>
<tr>
<td>
<p>ISO</p>
</td>
<td>
<p>International Organization for Standardization</p>
</td>
</tr>
<tr>
<td>
<p>ITSEC</p>
</td>
<td>
<p>Information Technology Security Evaluation Criteria</p>
</td>
</tr>
<tr>
<td>
<p>ITSM</p>
</td>
<td>
<p>Information Technology Security Manager</p>
</td>
</tr>
<tr>
<td>
<p>IWF</p>
</td>
<td>
<p>Inter-Working Function</p>
</td>
</tr>
<tr>
<td>
<p>KMP</p>
</td>
<td>
<p>Key Management Plan</p>
</td>
</tr>
<tr>
<td>
<p>KMS</p>
</td>
<td>
<p>Key management system</p>
</td>
</tr>
<tr>
<td>
<p>MDM</p>
</td>
<td>
<p>Mobile Device Manager</p>
</td>
</tr>
<tr>
<td>
<p>MFA</p>
</td>
<td>
<p>Multi-Factor Authentication</p>
</td>
</tr>
<tr>
<td>
<p>MFD</p>
</td>
<td>
<p>Multifunction Device</p>
</td>
</tr>
<tr>
<td>
<p>MMS</p>
</td>
<td>
<p>Multimedia Message Service</p>
</td>
</tr>
<tr>
<td>
<p>MSL</p>
</td>
<td>
<p>(New Zealand) Measurement Standards Laboratory</p>
</td>
</tr>
<tr>
<td>
<p>NAND</p>
</td>
<td>
<p>Flash Memory Named After The NAND Logic Gate</p>
</td>
</tr>
<tr>
<td>
<p>NAND</p>
</td>
<td>
<p>NOT AND – A Binary Logic Operation</p>
</td>
</tr>
<tr>
<td>
<p>NDPP</p>
</td>
<td>
<p>Network Device Protection Profile</p>
</td>
</tr>
<tr>
<td>
<p>NIST</p>
</td>
<td>
<p>National Institute Of Standards And Technology</p>
</td>
</tr>
<tr>
<td>
<p>NOR</p>
</td>
<td>
<p>Flash Memory Named After The NOR Logic Gate</p>
</td>
</tr>
<tr>
<td>
<p>NOR</p>
</td>
<td>
<p>NOT OR – A Binary Logic Operation</p>
</td>
</tr>
<tr>
<td>
<p>NTP</p>
</td>
<td>
<p>Network Time Protocol</p>
</td>
</tr>
<tr>
<td>
<p>NZCSI</p>
</td>
<td>
<p>New Zealand Communications Security Instruction</p>
</td>
</tr>
<tr>
<td>
<p>NZCSP</p>
</td>
<td>
<p>New Zealand Communications Security Policy</p>
</td>
</tr>
<tr>
<td>
<p>NZ e-GIF</p>
</td>
<td>
<p>New Zealand E-Government Interoperability Framework</p>
</td>
</tr>
<tr>
<td>
<p>NZEO</p>
</td>
<td>
<p>New Zealand Eyes Only</p>
</td>
</tr>
<tr>
<td>
<p>NZISM</p>
</td>
<td>
<p>New Zealand Information Security Manual</p>
</td>
</tr>
<tr>
<td>
<p>NZS</p>
</td>
<td>
<p>New Zealand Standard</p>
</td>
</tr>
<tr>
<td>
<p>OTP</p>
</td>
<td>
<p>One-Time Password</p>
</td>
</tr>
<tr>
<td>
<p>PaaS</p>
</td>
<td>
<p>Platform-as-a-Service</p>
</td>
</tr>
<tr>
<td>
<p>PAM</p>
</td>
<td>
<p>Privileged Access Management</p>
</td>
</tr>
<tr>
<td>
<p>PBX</p>
</td>
<td>
<p>Private Branch Exchange</p>
</td>
</tr>
<tr>
<td>
<p>PED</p>
</td>
<td>
<p>Portable Electronic Device</p>
</td>
</tr>
<tr>
<td>
<p>PIN</p>
</td>
<td>
<p>Personal Identification Number</p>
</td>
</tr>
<tr>
<td>
<p>PKI</p>
</td>
<td>
<p>Public Key Infrastructure</p>
</td>
</tr>
<tr>
<td>
<p>PP</p>
</td>
<td>
<p>Protection Profile</p>
</td>
</tr>
<tr>
<td>
<p>PSR</p>
</td>
<td>
<p>Protective Security Requirements</p>
</td>
</tr>
<tr>
<td>
<p>PSTN</p>
</td>
<td>
<p>Public Switched Telephone Network</p>
</td>
</tr>
<tr>
<td>
<p>QoS</p>
</td>
<td>
<p>Quality of Service</p>
</td>
</tr>
<tr>
<td>
<p>RAM</p>
</td>
<td>
<p>Random Access Memory</p>
</td>
</tr>
<tr>
<td>
<p>RBAC</p>
</td>
<td>
<p>Role-Based Access Control</p>
</td>
</tr>
<tr>
<td>
<p>RF</p>
</td>
<td>
<p>Radio Frequency</p>
</td>
</tr>
<tr>
<td>
<p>RFC</p>
</td>
<td>
<p>Request For Comments</p>
</td>
</tr>
<tr>
<td>
<p>RSA</p>
</td>
<td>
<p>Rivest-Shamir-Adleman</p>
</td>
</tr>
<tr>
<td>
<p>RTP</p>
</td>
<td>
<p>Real-Time Transport Protocol</p>
</td>
</tr>
<tr>
<td>
<p>SaaS</p>
</td>
<td>
<p>Software-as-a-Service</p>
</td>
</tr>
<tr>
<td>
<p>SBC</p>
</td>
<td>
<p>Session Border Controller</p>
</td>
</tr>
<tr>
<td>
<p>SCEC</p>
</td>
<td>
<p>Security Construction And Equipment Committee</p>
</td>
</tr>
<tr>
<td>
<p>SCI</p>
</td>
<td>
<p>Sensitive Compartmented Information</p>
</td>
</tr>
<tr>
<td>
<p>SCIF</p>
</td>
<td>
<p>Sensitive Compartmented Information Facility</p>
</td>
</tr>
<tr>
<td>
<p>SCIM</p>
</td>
<td>
<p>System for Cross-domain Identity Management</p>
</td>
</tr>
<tr>
<td>
<p>SDN</p>
</td>
<td>
<p>Software Defined Networking</p>
</td>
</tr>
<tr>
<td>
<p>SecPlan</p>
</td>
<td>
<p>System Security Plan</p>
</td>
</tr>
<tr>
<td>
<p>SecPol</p>
</td>
<td>
<p>System Security Policy</p>
</td>
</tr>
<tr>
<td>
<p>SitePlan</p>
</td>
<td>
<p>System Site Plan</p>
</td>
</tr>
<tr>
<td>
<p>SHA</p>
</td>
<td>
<p>Secure Hashing Algorithm</p>
</td>
</tr>
<tr>
<td>
<p>SIM</p>
</td>
<td>
<p>Subscriber Identity Module</p>
</td>
</tr>
<tr>
<td>
<p>SIP</p>
</td>
<td>
<p>Session Initiation Protocol</p>
</td>
</tr>
<tr>
<td>
<p>SLA</p>
</td>
<td>
<p>Service Level Agreement</p>
</td>
</tr>
<tr>
<td>
<p>S/MIME</p>
</td>
<td>
<p>Secure Multipurpose Internet Mail Extension</p>
</td>
</tr>
<tr>
<td>
<p>SMS</p>
</td>
<td>
<p>Short Message Service</p>
</td>
</tr>
<tr>
<td>
<p>SOE</p>
</td>
<td>
<p>Standard Operating Environment</p>
</td>
</tr>
<tr>
<td>
<p>SOP</p>
</td>
<td>
<p>Standard Operating Procedure</p>
</td>
</tr>
<tr>
<td>
<p>SP</p>
</td>
<td>
<p>Special Publication</p>
</td>
</tr>
<tr>
<td>
<p>SPF</p>
</td>
<td>
<p>Sender Policy Framework</p>
</td>
</tr>
<tr>
<td>
<p>SRMP</p>
</td>
<td>
<p>Security Risk Management Plan</p>
</td>
</tr>
<tr>
<td>
<p>SSD</p>
</td>
<td>
<p>Solid State Drive</p>
</td>
</tr>
<tr>
<td>
<p>SSH</p>
</td>
<td>
<p>Secure Shell</p>
</td>
</tr>
<tr>
<td>
<p>SSL</p>
</td>
<td>
<p>Secure Sockets Layer</p>
</td>
</tr>
<tr>
<td>
<p>SSP</p>
</td>
<td>
<p>System Security Plan</p>
</td>
</tr>
<tr>
<td>
<p>TLS</p>
</td>
<td>
<p>Transport Layer Security</p>
</td>
</tr>
<tr>
<td>
<p>TOE</p>
</td>
<td>
<p>Target of Evaluation (in Common Criteria)</p>
</td>
</tr>
<tr>
<td>
<p>TOE</p>
</td>
<td>
<p>Trusted Operating Environment</p>
</td>
</tr>
<tr>
<td>
<p>UC</p>
</td>
<td>
<p>Unified Communication</p>
</td>
</tr>
<tr>
<td>
<p>UTC</p>
</td>
<td>
<p>Co-ordinated Universal Time</p>
</td>
</tr>
<tr>
<td>
<p>VDP</p>
</td>
<td>
<p>Vulnerability Disclosure Policy</p>
</td>
</tr>
<tr>
<td>
<p>VLAN</p>
</td>
<td>
<p>Virtual Local Area Network</p>
</td>
</tr>
<tr>
<td>
<p>VM</p>
</td>
<td>
<p>Virtual Machine</p>
</td>
</tr>
<tr>
<td>
<p>VoIP</p>
</td>
<td>
<p>Voice Over Internet Protocol</p>
</td>
</tr>
<tr>
<td>
<p>VPN</p>
</td>
<td>
<p>Virtual Private Network</p>
</td>
</tr>
<tr>
<td>
<p>WAP</p>
</td>
<td>
<p>Wireless Access Point</p>
</td>
</tr>
<tr>
<td>
<p>WEP</p>
</td>
<td>
<p>Wired Equivalent Privacy</p>
</td>
</tr>
<tr>
<td>
<p>WEEE</p>
</td>
<td>
<p>Waste Electrical and Electronic Equipment</p>
</td>
</tr>
<tr>
<td>
<p>WLAN</p>
</td>
<td>
<p>Wireless Local Area Network</p>
</td>
</tr>
<tr>
<td>
<p>WPA2</p>
</td>
<td>
<p>Wi-Fi Protected Access 2</p>
</td>
</tr>
<tr>
<td>
<p>XAUTH</p>
</td>
<td>
<p>Ike Extended Authentication</p>
</td>
</tr>
</tbody>
</table>
<p>&nbsp;</p>
<p>&nbsp;</p>]]></paragraph>
 </subsection>
</section>
