Document Sample
Termine Powered By Docstoc
					Term                     Meaning within                           Meaning within
                         MESA project                             SAFECOM
 12 lead                A non invasive medical process           EKG - Same meaning
  electrocardiogram      involving 12 readings from 10
  (ECG)                  leads attached to a patient to
                         determine various types of Cardiac
                         related conditions
 Access control         The prevention of unauthorized use       Both the public safety users as well
                         of a resource, including the             as the public safety user's device(s)
                         prevention of use of a resource in       must be authenticated before they
                         an unauthorized manner                   are given access to network

 Access network         The network that provides the link
                         between the terminal function and
                         the access function

 ACN                                                             Automatic Call Notification

 ACS                                                             American College of Surgeons

 Adaptive radio         The ability of a network system to
  frequency modulation   automatically adjust the rate
                         fallback within the network by
                         changing the error correction
                         and/or modulation scheme to
                         maintain reliable throughput
 Ad-hoc network         A network that is established on a
                         temporary basis in order to respond
                         to a specific series of transaction(s)
                         or emergency activities. Network
                         would normally be turn down at the
                         end of that emergency or operation

 AES                    Advanced Encryption System               Advanced Encryption System

 AFIS                   see IAFIS

 AGILE                  Advanced Generation of               A National Institute of Justice's
                         Interoperability Equipment for Law Program
                         Enforcement: A program within
                         the U.S. Department of Justice that
                         was formed to assist state and local
                         law enforcement agencies to
                         effectively and efficiently
                         communicate with one another
                         across agency and jurisdictional
 AM (Amplitude          Modulation in which the amplitude
  Modulation)            of a carrier wave is varied in
                         accordance with some
                         characteristic of the modulating
 Analog modulation or   A modulation technique whereby
  Analog modulation      message signal, which is the analog
  technique              of some physical quantity, is
                         impressed on a carrier signal for
                         transmission through a channel

 ANSI                   American National Standards
                         Institute: The U.S. standards
                         organization that establishes
                         procedures for the development
                         and coordination of voluntary
                         American National Standards
 APCO                   Association of Public-Safety
                         Communications Officials: is the
                         world’s oldest and largest not-for-
                         profit professional organization
                         dedicated to the enhancement of
                         public safety communications
 API (Application       A boundary across which a
  Programming            software application uses facilities
  Interface)             of programming languages to
                         invoke software services. These
                         facilities may include procedures or
                         operations, shared data objects and
                         resolution of identifiers

 Assets                 Information or resources to be         Every PPDR device, user or facility
                         protected by the countermeasures       available for intervention
                         of a TOE
 Assignment             The specification of an identified
                         parameter in a component
 Assurance              Grounds for confidence that an
                         entity meets its security objectives

 ATF                    U.S. Department of Treasury’s          Bureau of Alcohol, Tobacco and
                         Bureau of Alcohol, Tobacco, and        Firearms
 ATIS                   Alliance for Telecommunications
                         Industry Solutions: an organization
                         that provides the tools necessary
                         for the industry to identify
                         standards, guidelines, and
                         operating procedures that make the
                         interoperability of existing and
                         emerging telecommunications
                         products and services possible

 ATL                    Attempt To Locate

   ATM (Asynchronous    A high-speed multiplexing and
    Transfer Mode)       switching method utilizing fixed-
                         length cells of 53 octets to support
                         multiple types of traffic
 Attack detection and                                          The communications networks
  prevention                                                    must be resistant to jamming;
                                                                they must be capable of
                                                                passive/active attack monitoring
                                                                and defense deployment; they must
                                                                able to geo-locate the source of an
                                                                attack; and, they must be capable
                                                                of monitoring of all functional
                                                                aspects by authorized users/devices

 Attack potential       The perceived potential for success
                         of an attack, should an attack be
                         launched, expressed in terms of an
                         attacker’s expertise, resources and
 Authentication         The network should ensure that         Same meaning
                         data exchange is established with
                         the addressed peer entity and that
                         the data source is the one claimed
 Authentication data    Information used to verify the
                         claimed identity of a user

 Authorization          Once a user has been granted           Each individual has privileges,
                         access to the system, the services     permissions, and authorities to
                         and information that the user has      communicate with others and to
                         access to will be determined by that   access databases and systems to
                         users' authorization level             complete the individual's work
                                                                assignments. The systems will
                                                                allow communications and system
                                                                access based upon the user's profile
                                                                and authorizations

 Authorized user                                               A user who may, in accordance
                                                                with the TOE security policy,
                                                                perform an operation
 AVL                    A part of “transmission of             Automatic Vehicle Location
                         geographical location data” that
                         MESA system should ensure to
                         public safety officer

 BAN                    Body Area Network                      Equivalent to PAN

 Bit-Error-Rate (BER)     A measure of the accuracy of
                           information transmited in a system,
                           calculated as the number of
                           incorrect bits divided by the total
                           number of bits transmitted

 Bit-rate                 The rate of transfer of information
                           necessary to ensure satisfactory
                           reproduction of the information at
                           the receiver
 Bridge                   1. The action of transmitting         Non-technical meaning
                              identical traffic on both the
                              working and protection channels
                           2. In communications networks, a
                              device that (a) links or routes
                              signals from one ring or bus to
                              another or from one network to
                              another, (b) may extend the
                              distance span and capacity of a
                              single LAN system, (c) performs
                              no modification to packets or
                              messages, (d) operates at the
                              data-link layer of the OSI—
                              Reference Model (Layer 2), (e)
                              reads packets, and (f) passes
                              only those with addresses on the
                              same segment of the network as
                              the originating user.
                           3. A functional unit that
                              interconnects two local area
                              networks that use the same
                              logical link control procedure,
                              but may use different medium
                              access control procedures.
 Broadcast transmission   The transmission of signals that      Type of communication in which
                           can be simultaneously received by     information passes through every
                           stations tuned to a right signal      node within a network, regardless
                           channel that usually make no          of whether a particular nodes'
                           acknowledgement                       participation is required, to
                                                                 ensure that the information reaches
                                                                 the final destination(s)
 BS (Base Station)        the common name for all the radio     Same meaning
                           equipment located at one fixed
                           location, and that is used for
                           serving one or several cells
 CAD                      Computer Aided Dispatch               Computer Aided Dispatch

 CBR&E                                                          Chemical, Biological,
                                                                 Radiological, and Explosive

 CC (Central Control)     a centralized point or location
                           within the system or network
                           which has the capability and ability
                           to control, add, change or delete
                           functions, features, or
                           predetermined identifiers, such as
                           subscriber unit, groups or
   CDMA                   code division multiple access
 CDMW                     Canadian Department of Motor
 CDPD (Cellular Digital   An open TCP/IP standard for
   Packet Data)            cellular data communications. It
                           offers the capability to use file
                           transfer protocol (FTS) to send
                           files over the air.
 CELP                     code-excited linear prediction
                           (CELP): An analog-to-digital voice
                           coding scheme
 CERT                                                            Community Emergency Response
                                                                  Teams: Trained civilian volunteer
                                                                  auxiliary responders
                                                                  that assist victims and provide
                                                                  support for professional responders
                                                                  during a major disaster.

 CITEL                    Comision Internamericana de

   class                  A grouping of families that share a    Non-technical meaning
                           common focus

 CN (Corporate            A term used in the Project MESA
   Telecommunications      SoR to describe a network or
   Network)                system specifically designed and
                           implemented to provide service to
                           a defined group of organizationally
                           related users. Access to the
                           network or system by non-
                           corporate users may or may not be
                           authorized at the discretion of the
                           Corporate Network manager

   Communications                                                Ability for users to transparently
    Regardless of                                                 communicate, as authorized,
    Technologies,                                                 among multiple
    Infrastructures, and                                          agencies/jurisdictions some of
    Frequency Bands                                               which may use different
                                                                  technologies, infrastructures and/or
                                                                  frequency bands regardless of
                                                                  system. Includes the transitioning
                                                                  between commercial systems and
                                                                  private LMR systems

 Communications                                                  Provide direct communications
   Outside Wireless                                               (talk around) between user radios
   Infrastructure                                                 where wireless infrastructure is
   Coverage                                                       unable to support communications
                                                                  (such in some rural areas,
                                                                  underground parking garages,
                                                                  tunnels, and inside some buildings)

 Communication with                                              Ability to communicate (or
   Other Jurisdictions                                            exchange data) with other
                                                                  agencies/jurisdictions using the
                                                                  infrastructure of that

 Communication with                                              Ability to communicate (or
   Own Jurisdiction                                               exchange data) with members of
                                                                  own agency/jurisdiction while
                                                                  using the infrastructure of another
   component              The smallest selectable set of
                           elements that may be included in a
                           PP, and ST, or a package

 COMPUSEC                 computer security

 COMSEC                   communication security

 Confidentiality or       allows the originator of a message
   Content                 to protect the content of the
   confidentiality         message from disclosure to
                           recipients other than the intended
 Connectivity             The property of the TOE that           General meaning
                           allows interaction with IT entities
                           external to the TOE

 conventional radio       Nontrunked, similar to telephone
    system                 party-line in that the user
                           determines availability by listening
                           for an open channel

 Converged network       IP-based networks that generally
                          make use of various
                          telecommunications technologies
                          to support a range of multimedia
                          services such as voice, data, still
                          image, and video
 Core network            A portion of the delivery system
                          composed of networks, systems
                          equipment and infrastructures,
                          connecting the service providers to
                          the access network
 coverage                The geographic area included          Same meaning
                          within the range of, or covered by,
                          a wireless radio system. Two
                          systems cannot be made
                          compatible through patching unless
                          the coverage areas overlap
 CPE                     customer premises equipment:
                          Terminal and associated equipment
                          and inside wiring located at a
                          subscriber’s premises and
                          connected with a carrier’s
                          communication channel(s) at the
                          demarcation point (“demarc”)
 CQPSK                   Compatible Differential Offset
                          Quadrature Phase Shift Keying: A
                          form of digital modulation
 CS (Circuit-switched)   A method of routing traffic
                          through a switching center, from
                          local users or from other switching
                          centers, whereby a connection is
                          established between the calling
                          and called stations until the
                          connection is released by the
                          called or calling station.

 CSU                     customer service unit: A device       Columbia State University
                          that provides an accessing
                          arrangement at a user location to
                          either switched or point-to-point,
                          data-conditioned circuits at a
                          specifically established data
                          signaling rate

 CTIA                     Cellular Telecommunications and
                           Internet Association: The
                           international organization that
                           represents all elements of wireless
                           communication - cellular, personal
                           communication services enhanced
                           specialized mobile radio, and
                           mobile satellite services - serving
                           the interests of service providers,
                           manufacturers, and others

 Data Access to                                                 Ability to access information
   Background                                                    related to hazardous materials,
   Information Sources                                           water sources, floor and building
                                                                 plans, fire pre-plans, utility maps,
                                                                 weather forecasts, topographic
                                                                 terrain, transportation, and other
                                                                 background data to support public
                                                                 safety incident management

 Data Access to Legal                                           Ability to access legal information
   Information                                                   such as investigation/litigation
                                                                 records, court scheduling
                                                                 records, disposition data and
                                                                 charge data
 Data Access to                                                 Capability to obtain logistical
   Logistical Resource                                           resource information on all
   Information                                                   personnel and equipment
                                                                 responding to an incident
 Data Access to Medical                                         Ability to manage medical
   Information                                                   information

   Data Exchange with                                           Ability to exchange information
    Computer-Aided                                               with Computer-Aided Dispatch
    Dispatch                                                     (CAD) and Record Management
                                                                 Systems (RMS)
 Data security                                                  The communication networks must
                                                                 not allow unauthorized interception
                                                                 of communications or information;
                                                                 they must not allow
                                                                 communications replay attacks;
                                                                 and, they must have non-
                                                                 repudiation capabilities to ensure
                                                                 evidence in the event of a dispute

 Day-to-day              Routine scenarios present in           Routine or day-to-day operations
                          everyday life (like monitoring,        fit a general normal structure for
                          surveillance…) that have high          the public safety personnel and
                          predictability and require an          should not tax their ability to deal
                          ordinary operational resources         with communications processes
                          deployment (in terms of personnel      and procedures. Many of these
                          and means allocated).                  operations may be strictly within
                                                                 the discipline or agency with no
                                                                 communications interoperability
                                                                 requirements with other disciplines
                                                                 or agencies at all.

 DCE                     data circuit-terminating equipment

 Delay                   The amount of time between the
                          instant at which the transmission of
                          a signal occurs, and the instant at
                          which it is received by the receiver
 dependency              A relationship between
                          requirements such that the
                          requirement that is depended upon
                          must normally be satisfied for the
                          other requirements to be able to
                          meet their objectives
 DFFP                                                           Department of Forestry and Fire

   DGLS                  differential global location
                          system.A system that will allow the
                          user to accurately identify and
                          locate their capital resource and
                          other inventories.Accuracy for all
                          of these requirements depends on
                          the availability of DGLS in any
                          given area since DGLS is provided
                          by many means, including
                          transmission over dedicated public
                          safety freq.
 digital modulation      A technique for placing a digital
    technique             data sequence on a carrier signal
                          for subsequent transmission
                          through a channel
 Digital voice scrambling See scrambling

 Direct mode – Direct    the capability to talk directly
   link                   between two or more subscriber
                          units without using network or
                          system transmitter and receiver
                          support or services
   Disaster              Specific, unpredictable events
                          sometimes causing a big loss of
                          infrastructures that require extra-
                          ordinary (i.e. national,
                      international) operational resource
                      deployment (e.g. earthquake,
                      twister, flood, .....)

   DMAT              Disaster Medical Assistance             Disaster Medical Assistance Team
                      Teams: A mobile medical field unit
                      staffed and equipped to treat large
                      numbers of injured.
 DMV                 Department of Motor Vehicles
 DOD                 Department of Defense (US)
 DOT                 Department of Transportation (US)       Department of Transportation

 DS-0                digital signal 0: In T-carrier, a
                      basic digital signaling rate of 64
                      kb/s, corresponding to the capacity
                      of one voice-frequency-equivalent
 DS-1                digital signal 1: A digital signaling
                      rate of 1.544 Mb/s, corresponding
                      to the North American and
                      Japanese T1 designator
 DS-1C               digital signal 1C: A digital
                      signaling rate of 3.152 Mb/s,
                      corresponding to the North
                      American T1C designator
 DS-2                digital signal 2 (DS2): A digital
                      signaling rate of 6.312 Mb/s,
                      corresponding to the North
                      American and Japanese T2

 DS-3                digital signal 3
 DS-4                digital signal 4

   DSL               digital subscriber line: Equipment
                      that provides full-duplex service on
                      a single twisted metallic pair at a
                      rate sufficient to support ISDN
                      basic access and additional
                      framing, timing recovery, and
                      operational functions

 DTE                 data terminal equipment:                Equivalent to PSCD
                      An end instrument that converts
                      user information into signals for
                      transmission or reconverts the
                      received signals into user
 EAL (evaluation     A package consisting of assurance
   assurance level)   components from Part 3 that

                       represents a point on the central
                       controller (CC) predefined
                       assurance scale
 EAN (Extended Area                                         Jurisdiction Area Networks that are
   Network)                                                  linked with county,
                                                             regional, state, and national
                                                             systems or extended area networks

 ECG                  Electrocardiogram for myocardial

 ECMA                 Electroencephalogram
 EIA                  Electronic Industries Alliance: A
                       national trade organization that
                       includes the full spectrum of U.S.
                       manufacturers in the electronics

   element            An indivisible security requirement   Non-technical meaning

 Emergency            Specific events characterized by
                       medium predictability (that imply
                       the acknowledgement of factors of
                       possible danger) and require
                       moderate operational resource
                       deployment (e.g. car accident with
                       a modarate number of injured
                       people, robbery in a bank, ....)
 Emergency            MESA ALERT messaging                  Ability to broadcast critical
   Notifications                                             information by means such as text
                                                             messaging to multiple

 Emergency Signal                                           Ability to broadcast an emergency
                                                             signal that has priority over other

   Emergency Voice                                          Ability to communicate an
    Communication                                            emergency voice message that has
                                                             priority over other voice
 EMS                  Emergency Medical Services            Emergency medical situations
 EMS2                                                       Emergency Medical Services Event
                                                             Management System: A database
                                                             containing information on the real-
                                                             time status of emergency medical
                                                             personnel, resources, hospitals, and
                                                             patients that is accessible by
                                                             command personnel, authorized
                                                             responders, health care facilities,
                                                             so on.

 EMT-P                                                         Emergency Medical Technician-

 encryption              The process of scrambling signals     Same meaning
                          to avoid unauthorized access
 End-to-end network      A fundamental systems
   integrity              management concept that focuses
                          on keeping networked systems and
                          services in a known good state of
                          operation and availability

 End user                the providers of public
                          safety/public protection services,
                          such as law enforcement agent or
                          agency, firefighters or fire
                          department, brigade, emergency
                          medical practitioners, and disaster
                          recovery services personnel that
                          have been organizationally
                          established for the
                          protection/preservation of life and
 “Enter Once – Reuse                                           Ability to enter validated
   Forever” Approach to                                         information once, then share and
   Data Gathering                                               reuse that information among
                                                                authorized entities
 EOC                                                           Emergency Operations Center

 EOD                                                           Explosive Ordnance Disposal
 ETSI                    European Telecommunications
                          Standards Institute
 evaluation              Assessment of a PP, an ST, or a       Non-technical meaning
                          TOE, against defined criteria

 evaluation authority    A body that implements the central
                          controller (CC) for a specific
                          community by means of an
                          evaluation scheme and thereby sets
                          the standards and monitors the
                          quality of evaluations conducted by
                          bodies within that community

   Evaluation scheme     The administrative and regulatory
                          framework under which the central
                          controller (CC) is applied by an
                          evaluation authority within a
                          specific community

 Extension               The addition to a security target      Non-technical meaning
                          (ST) or protection profile (PP) of
                          functional requirements not
                          contained in Part 2 and/or
                          assurance requirements not
                          contained in Part 3 of the central
                          controller (CC)
 External IT entity      Any IT product or system,
                          untrusted or trusted, outside of the
                          TOE that interacts with the TOE
 Extreme areas           Areas with specific characteristics
                          in terms of propagation of signals
                          and radio coverage that requires a
                          specific analysis (e.g. underground,
                          caves, ….)
 Family                  A grouping of components that          Non-technical meaning
                          share security objectives but may
                          differ in emphasis or rigor
 FBI                     Federal Bureau of Investigation        Federal Bureau of Investigation

 FCC                     Federal Communications                 Federal Communications
                          Commission: An independent U.S.        Commission
                          government agency that regulates
                          wire and radio telecommunications
                          in the United States

 FD                      Fire Department                        Fire Department

 FDMA                    frequency division multiple access

 FEMA                                                           Federal Emergency Management

   Field Image Capture                                          Capability of field image capture
    and Distribution                                             and distribution
 FIFO                    first-in, first-out
 FIPS                                                           Federal Information Processing
 formal                  Expressed in a restricted syntax
                          language with defined semantics
                          based on well-established
                          mathematical concepts
 Formatting                                                     Ability to effectively and
                                                                 efficiently exchange data between

 frame relay             An interface protocol for
                          statistically multiplexed packet-
                          switched data communications in
                          which (a) variable-sized packets
                          (frames) are used that completely
                          enclose the user packets they
                  transport, and (b) transmission
                  rates are usually between 56 kb/s
                  and 1.544 Mb/s (the T-1 rate)
 FS               1. fixed station
                   2. fixed satellite

 FSK             frequency shift keying.
                  Frequency modulation in which the
                  modulating signal shifts the output
                  frequency between predetermined
   FTP           File Transfer Protocol.
                  A standard Internet protocol that
                  allows users to exchange files
                  between computers on the Internet.
                  FTP is commonly used to
                  download programs and other files
                  to the computer from other servers.
                  To access files it is usually
                  necessary to logon to an FTP
                  server; however, publicly available
                  files are easily accessed using
                  anonymous FTP
   Full-duplex   In Full-duplex data transmission       Same meaning
                  data can be transmitted between
                  two terminals in both directions, on
                  a signal carrier at the same time.
                  For example, on a local area
                  network with a technology that has
                  full-duplex transmission, one
                  workstation can send data on the
                  line while another workstation is
                  receiving data. Full-duplex
                  transmission necessarily implies a
                  bidirectional line (over which data
                  can transfer in both directions)

   Full-motion   In television, a video frame rate
                  that provides the appearance of full
                  motion without smearing or flicker
 gateway          1. a network node equipped for
                       interfacing with another
                       network that uses different
                  2. A type of network relay that
                       attaches two networks to build
                       a larger network
   GIS           Geographic Information System.         Geographical Information System
                  A computer system capable of
                  assembling, storing, manipulating,
                  and displaying geographically
                  referenced information

 GLS               Global Location System: A system
                    that will allow the user to
                    accurately identify and locate their
                    capital resource and other
 GPS               global positioning system              Global Positioning System

 GSM               Global System for Mobile
 Half-duplex       Half-duplex data transmission
                    means that data can be transmitted
                    in both directions on a signal
                    carrier, but not at the same time.
                    For example, on a local area
                    network using a technology that
                    has half-duplex transmission, one
                    workstation can send data on the
                    line and then immediately receive
                    data on the line from the same
                    direction in which data was just
                    transmitted. Like full-duplex
                    transmission, half-duplex
                    transmission implies a bidirectional
 HAZMAT            Hazardous Materials                    Hazardous Materials

 HF                high frequency: Frequencies from
                    3 MHz to 30 MHz
 High-Speed Data   data rates > 2 Mb/s                    Capability of high-speed data
   Transfer                                                transfer with ability to sustain
                                                           performance at network
 HIPAA                                                    Health Insurance Portability and
                                                           Accountability Act
 Human user        Any person who interacts with the
 IACP              International Association of Chiefs
                    of Police
 IAFIS             Integrated Automated Fingerprint       Integrated Automated Fingerprint
                    Identification System                  Identification System

 IAN                                                      Incident Area Network: a network
                                                           created for a specific incident. This
                                                           network is temporary in nature.

 IC                                                       Incident Command or Incident

 ICEA                 Insulated Cable Engineers
                       Association: A North American
                       professional organization dedicated
                       to developing cable standards for
                       the electric power, control, and
                       telecommunications industries
 IDENT                                                      Immigration and Customs
                                                             Enforcement Automated Biometric
                                                             Identification System

 Identification and   See Authorization                     Ability to initiate wireless voice (or
    Authorization                                            data) communications by requiring
                                                             the user to enter (on his/her radio) a
                                                             user identification that
                                                             authenticates and validates the user
                                                             and loads the user's profile
 identity             A representation uniquely             General meaning
                       identifying an authorized user,
                       which can either be the full or
                       abbreviated name of that user or a
 IDWCS                Integrated Digital Wireless
                       Communications System

 IEC                  International Electrotechnical

 IEEE                 Institute of Electrical and
                       Electronics Engineers
 IETF                 Internet Engineering Task force

 IFAST                International Forum on AMPS
                       Standards Technology
 IMT                  International Mobile

 IN                   intelligent network
   Incident command                                         The communications systems must
    structure                                                support the agency's incident
                                                             command policies.
 Indoor areas         Areas of potentially hundreds of
                       meters characterized by harsh
                       signal propagation environments
                       (e.g., high multipath and/or non-
                       line-of-sight [n-LOS]).
                       Characterized by confined or
                       enclosed spaces, interiors of
                       buildings, structures, .....

 informal             Expressed in natural language

 Information Protection                                        Ability to protect information
                                                                according to applicable laws and

 INFOSEC                  Information Systems Security: The
                           protection of information systems
                           against unauthorized access to or
                           modification of information
 Instant Messaging        The ability to easily exchange      A type of interactive data
                           messages with chosen friends or     transmission
                           co-workers after having ascertained
                           if he/she is connected to the
                           Internet and. Instant messaging
                           differs from ordinary e-mail in the
                           immediacy of the message
                           exchange and also makes a
                           continued exchange simpler than
                           sending e-mail back and forth.
                           Most exchanges are text-only.
                           However, some services allow
                           voice messaging, real-time video
                           streaming and file sharing
 Integrity                The term refers to data that have
                           not been corrupted during the
 Interactive data                                             These communications will
    communications                                             provide practitioners with maps,
                                                               floor plans, video scenes, etc.,
                                                               during an emergency. In the
                                                               context of the type of
                                                               interactive means that there is a
                                                               query made and a response
 Interactive voice                                            Communications between public
    communications                                             safety practitioners and
                                                               their supervisors, dispatchers,
                                                               members of the task force, etc., that
                                                               require immediate and high
                                                               quality response, with much higher
                                                               performance demands than those
                                                               required by commercial users
                                                               of wireless communications
 interface                A shared boundary, for example,     Non tehnical meaning
                           the boundary between two
                           subsystems or two devices
 internal communication   A communication channel between
    channel                separated parts of TOE
 internal TOE transfer    Communicating data between
                           separated parts of the TOE

 interoperability      The ability of systems, units, or      The ability of public safety
                        forces to provide services to and      agencies to talk across disciplines
                        accept services from other systems,    and jurisdictions via radio
                        units or forces and to use the         communications systems,
                        services so exchanged to enable        exchanging voice and/or data with
                        them to operate effectively together   one another on demand, in real
                                                               when needed

 interoperability      Established protocols that provide
    standards           common interface

 inter-TSF transfers   Communicating data between the
                        TOE and the security functions of
                        other trusted IT products
 IP                    Internet Protocol
 IR                    infrared                               infrared
 IS                    Interim Standard, International
 ISDN                  Integrated Services Digital
 ISO                   International Organization for
 ISP                   Internet Service Provider
 IST                   Incident Support Team.                 Incident Support Team: Provides
                        Supports US&R teams with               support to US&R teams with
                        tasking, materiel, and coordination    tasking, material, and coordination.
                                                               US&R teams are task forces
                                                               equipped with the necessary tools
                                                               and equipment and the required
                                                               skills and techniques for the search,
                                                               rescue, and medical care of victims
                                                               of structural collapse
 ISTEA                 Intermodal Surface Transportation
                        Efficiency Act (US)
 Iteration             The use of a component more than
                        once with varying operations
 ITS                   Intelligent Transportation Systems Intelligent Transportation System
 ITU                   International Telecommunications
                        Union: An international
                        organization established to promote
                        standardized telecommunications
                        on a worldwide basis
 JABS                                                      Joint Automated Booking System

 JAN                                                            Jurisdiction Area Network. The
                                                                 JAN is the main communications
                                                                 network for first responders. It is
                                                                 responsible for all non-IAN voice
                                                                 and data traffic. It handles any IAN
                                                                 traffic that needs access to the
                                                                 general network, as well as
                                                                 providing the connectivity to the
 JIC                                                            Joint Information Center

 Jitter                  Abrupt and unwanted variations of
                          delay during the transmission of a
                          signal from a transmitter station to
                          receiver station(s)
 Jurisdictional Signal                                          Provide jurisdictional-wide signal
   Coverage                                                      coverage to system users
 key management          The generation, storage,
                          distribution, archiving,
                          destruction/deletion, revocation,
                          registration, and de-registration of
                          cryptographic keys
 KTS                     key telephone system: In a local
                          environment, terminals and
                          equipment that provide immediate
                          access from all terminals to a
                          variety of telephone services
                          without attendant assistance
 LAN                     local area network                     local area network

 Laptop                  A small portable computer
                          The delay between an action and
 Latency                 the corresponding reaction

 Location systems        Any system, either terrestrial or
                          extraterrestrial that pinpoints the
                          specific location of either people,
                          personnel or equipment

                          A logical interface is the full
                          specification of the interactions
                          between two functions, including
                          the format of information passed
                          between the two functions and the
 Logical interface       computational aspects of each
                          function that determine the
                          response of a function when
                          information is passed to it from the
                          other function
 MC                      Multipoint Controller. An H.323
                          entity on the network, which
                          provides for the control of three or
                             more terminals participating in a
                             multipoint conference. It may also
                             connect two terminals in a point-to-
                             point conference, which may later
                             develop into a multipoint
 MCC                                                               Mobile Commander Center
 MCT                                                               Mobile Computing Terminal
 MDT                        mobile data terminal

 MESA                       Mobility Emergency Safety

 MESA technology            Technology built to comply with
                             MESA specifications and/or
 Messaging                  short, bursts of data that are
                             transmitted to and from subscriber
                             units to indicate predefined status
                             conditions or control functions
 Messaging services         Messaging services offer user-to-
                             user communication between
                             individual users via storage units
                             with store-and-forward, mailbox
                             and/or message handling functions

 Mobile satellite service   Service for land mobile radio
                             systems that use satellites in a
                             geosynchronous orbit to
                             communicate with mobile units
 Mobility                   Seamless and transparent           Same meaning
                             telecommunication service that
                             supports mobility for terminals or
                             users by providing access to and
                             from the public network via a home
                             network and/or visited network(s)
 Modulation scheme          Technical process used for
                             transmitting messages through a
                             wireless radio channel

 MRI                        Magnetic Resonance Imaging
 MSO                                                               Mobile Switching Office
 Multicast                                                         Occurs when one device sends data
                                                                    across the network to multiple
 Mutual aid                                                        This mode describes those major
                                                                    events with large numbers of
                                                                    agencies involved,including
                                                                    agencies from remote locations.
                                                                    Their communications are not
                                                                    usually well planned or rehearsed.
                                                                  The communications must allow
                                                                  the individual agencies carry out
                                                                  their missions at the event, but
                                                                  follow the command and control
                                                                  structure appropriate to coordinate
                                                                  the many agencies involved with
                                                                  the event.
 Mutual aid channel      A national or regional channel that
                          has been set aside for use only in
                          mutual aid interoperability
                          situations, usually with restrictions
                          and guidelines governing usage
 NAFTA                   North American Free Trade
 NAWAS                                                           National Warning System
 NCC                     National Coordination Committee:
                          A U.S. committee responsible for
                          looking at the technical solutions
                          and operational standards usable
                          for inter-operability
 NCIC                    National Crime Information Center       National Crime Information Center

 NEMA                    National Electrical Manufacturers
 NENA                    National Emergency Number
 NIJ                     National Institute of Justice: The      National Institute of Justice
                          research and development agency
                          of the U.S. Department of Justice
                          dedicated to researching crime
                          control and justice issues
 NIMS                                                            National Incident Management
 NIRSC                                                           National Incident Radio Support
 NLETS                   National Law Enforcement
                          Telecommunications System [U.S.]

 Non-interactive data                                            A one-way stream of data
 Non-interactive voice                                           These communications occur when
   communications                                                 a dispatcher or
                                                                  supervisor alerts members of a
                                                                  group about emergency situations
                                                                  and/or to share information.

 Nomadic computing       the use of portable computing
                          devices (such as laptop and
                          handheld computers) in
                          conjunction with mobile
                          communications technologies to
                          enable users to access the Internet
                          and data on their home or work
                           computers from anywhere

 NPSPAC guidelines        National Public Safety Planning
                           Advisory Committee’s nationwide
                           public safety plan in the United
                           States for the 821-824 MHz and
                           866-869 MHz bands

 NPSTC                    National Public Safety                National Public Safety
                           Telecommunications Council            Telecommunications Council

 NT                       Network Termination. The
                           functional group on the network
                           side of a user-network interface

 NTIA                     National Telecommunications and       National Telecommunications and
                           Information Administration            Information Administration
 Object                   An entity within the TOE security     General meaning
                           functions that contains or receives
                           information and upon which
                           subjects perform operations
 OC-1                     optical carrier level 1 (OC-1): The
                           optical signal that results from an
                           optical conversion of an
                           synchronous transport signal 1
 OEM                                                            Office of Emergency Management
 Office of the future     reference the capability an officer
                           in the field would have in
                           electronic management and control
                           of day-to-day and operational and
                           special operations-support
 On net                   describes the state of a wireless
                           terminal when it is in operation on
                           a predefined system or network
 On-scene Exchange of                                           Ability of on-scene personnel to
   Data                                                          transparently exchange data

 On-scene Wireless Data                                         Ability to quickly and transparently
   Networks                                                      establish and maintain on-scene
                                                                 wireless data networks

 One-to-Many                                                    Ability for users to transparently
   Communications                                                communicate, as authorized, with
                                                                 members of other agencies/
                                                                 jurisdictions on a unit-to-group

 One-to-One                                                        Ability for users to transparently
   Communications                                                   communicate, as authorized, with
                                                                    members of other agencies/
                                                                    jurisdictions on a unit-to-unit (one-
                                                                    to-one) basis

 Open interface            An interface between dissimilar
                            devices or networks whose
                            specifications are public and that
                            may rely on existing technical
 Open Source                                                       Ability to effectively and
   Formatting                                                       efficiently exchange data between
                                                                    agencies/jurisdictions, e.g., by
                                                                    encouraging open source format
 organizational security   One or more security rules,
    policies                procedures, practices, or guidelines
                            imposed by an organization upon
                            its operations

 OSA (Open system          An architecture that is open and not
   architecture)            proprietary, available for any
                            manufacturer to use through
                            publicly available resources and or
                            reasonable terms and conditions
 OTAR                      Over-the-air rekeying: Changing
                            traffic encryption key or
                            transmission security key in remote
                            crypto-equipment by sending new
                            key directly to the remote crypto-
                            equipment over the communication
                            path it secures

 Package                   Reusable set of either functional or
                            assurance components, combined
                            together to satisfy a set of
                            identified security objectives
 pager                     One-way communications device
                            in which the intended receiver is
                            altered to receive a message or
                            return a phone call
 paging                    A one-way communications                A non-interactive communication
                            service from a base station to          beetwen two devices
                            mobile or fixed receivers that
                            provide signaling or information
                            transfer by such means as tone,
                            tone-voice, tactile, optical readout,

 Packet-error-rate    A measure of the accuracy of
                       information transmited in a system,
                       calculated as the number of
                       incorrect pakets divided by the
                       total number of packets transmitted

 PAN                  Equvalent to BAN                      Personal Area Network. A first
                                                             responder is equipped with wireless
                                                             devices used to monitor the first
                                                             responder's physical location, pulse
                                                             rate, breathing rate, oxygen tank
                                                             status, as well as devices for
                                                             hazardous gases detection and
                                                             voice communications. The devices
                                                             are all linked wirelessly on a
                                                             personal area network (PAN)
                                                             controlled by the first responder's

 PASS                 Personal Alert Safety Systems
 PBX                  private branch exchange

 PCCA                 Portable Computer
                       Communications Association
 PCM                  pulse code modulation

 PCS                  Personal Communications Service
 PD                   Police Department                     Police Department
 Peer-to-peer (P2P)   A communication model between        Same meaning
                       two entities. Each involved party
                       has the same capabilities and both
                       parties can initiate a
                       communication session (opposed to
                       other models such as the
                       client/server model and the
                       master/slave model). In recent
                       usage, peer-to-peer is used to
                       indicate applications in which users
                       can use the Internet to exchange
                       files with each other directly or
                       through a mediating server
 Physical interface   An interface where the physical
                       characteristics of signals used to
                       represent information and the
                       physical characteristics of channels
                       used to carry the signals are
                       defined. A physical interface is an
                       external interface
 PIO                                                       Public Information Officer

 Planned events            Specific scenarios, characterized by Included into Mutual aid
                            extra-ordinary operational resource
                            and personnel deployment, planned
                            in advance for exceptional events
                            (e.g. the Pope visit of a city, G8
                            summit, ....)

 port                      An abstraction used by transport
                            protocols to distinguish among
                            multiple destinations associated
                            with particular applications running
                            on a host computer; an application
                            can specify the ports it wants to
 PP (Protection Profile)   An implementation-independent set
                            of security requirements for a
                            category of TOEs that meet
                            specific consumer needs
 PPDR                      Public Protection and Disaster
 pre-emption               The seizure of the communications
                            channel or facilities by standing
                            order of priority, which could
                            imply the immediate disconnection
                            of a low-priority user when a
                            completely busy system is needed
                            for high-priority use.

 Priority Levels for                                               Ability of the agency/jurisdiction to
   Access and System                                                administer the priority for voice
   Use                                                              communications of particular
                                                                    users and particular public safety

 privacy                   Privacy protects authorized             The communications systems must
                            participants from illegal utilization   allow only intended and authorized
                            or knowledge of information             recipients to hear/see/read/modify
                            related to their components in the      information as well as follow
                            system                                  national and state policies
 private NS/EP             Non-common-carrier
   telecommunications       telecommunications services,
   services                 including private line, virtual
                            private line, and private switched
                            network services
 product                   Package of IT software, firmware,
                            and/or hardware, providing
                            functionality designed for use or
                            incorporation within a multiplicity
                            of systems

 Project 25 standards   A joint Federal, State and local
                         government/industry standards-
                         setting effort to develop technical
                         standards for the next generation of
                         public safety radios, both voice and
 Protocol               Message formats (semantic,             Same meaning
                         syntactic, and symbolic rules) and
                         the rules for message exchange
                         between peer layer entities

 PSAP                   Public Safety Answering Point          Public Safety Answering Point:
                                                                The answering center for 9-1-1
     PSCD               Equivalent to DTE                      Public Safety Communications
                                                                Devices: A term developed for the
                                                                public safety operational
                                                                scenarios, the PSCD is a portable
                                                                (handheld or wearable) wireless
                                                                communications device
     PSPP               Public Safety Partnership Project
                         (PSPP): A partnership between the
                         ETSI and TIA to develop future
                         wireless networking standard to
                         fulfill the needs of the Public
                         Safety and Law Enforcement
                         Authorities for very high bit-rate
  PSTN                  public switched telephone network      public switched telephone network

  PSWAC                 Public Safety Wireless Advisory        Public Safety Wireless Advisory
                         Committee [U.S.]                       Committee [U.S.]

  PSWN                  Public Safety Wireless Network:
                         A program established in the
                         United States to assist its city,
                         county, state, and Federal agencies
                         in their efforts to implement new
                         wireless technology and improve

  Public                Act of protecting the public from      Same meaning
  protection/public      the likelihood of harm
  public service        Secondary services that support        Same meaning
                         public safety/public protection
     public service     A Federal, State, or local
    organization         organization that helps furnish,
                         maintain, and protect the
                         infrastructures that promote the
                         public’s safety and welfare
    PWD                                                        Personal Wireless Device
    Query/Access                                                   Ability to query/access multiple
    Multiple Data Sources                                           data sources using one request that
    with One Request                                                is routed to multiple entities
 QoS & Quality of          Best effort, interactive, streaming,    Non technical meaning
 Service Classes            broadcast; a set of qualities related
                            to the collective behaviour of one
                            or more objects

 QSIG                      The signaling protocol used at the
                            Q-interface between two switches
                            in a private network
 RACES                                                             Radio Amateur Civil Emergency

    Rapid Information                                              Ability to provide the exchange of
    Source Access                                                   information in a timely fashion to
                                                                    support critical decision
                                                                    points from both field and base
    RCC                    Rescue Coordination Centers: in
                            the United States are operated by
                            the Coast Guard and the Air Force
 refarming                 [U.S.] An FCC effort to develop a
                            strategy for using private land
                            mobile radio (PLMR) spectrum
                            allocations more effectively so as
                            to meet future communications
    reference monitor      The concept of an abstract machine
                            that enforces TOE access control
    reference validation   An implementation of the reference
    mechanism               monitor concept that possesses the
                            following properties: it is
                            tamperproof, always invoked, and
                            simple enough to be subjected to
                            thorough analysis and testing
    refinement             The addition of details to

    relay                  A base station receiver that            Same meaning
                            typically receives signals on one
                            frequency, processes, and
                            retransmits them out on another
                            frequency, in order to extend talk-
                            out range
    Reliable System                                                Ability to maintain reliable system
    Performance                                                     performance over disparate
                                                                    interconnected systems

    Remote areas           Areas far away from population          Remote locations
                            and available services and              where no infrastructure
                            infrastructure (e.g. open sea, high     communications is available
                            mountain far away from villages,
    Remotely Re-Program                                            Ability to remotely (over-the-air)
    User Radios                                                     re-program a radio’s parameters
                                                                    and/or modify functionality
    Resilient Operations                                           Ability to sustain resilient
                                                                    operations including tolerance to
                                                                    individual system failures,
                                                                    coverage from adjacent sites,
                                                                    resistance to impact of catastrophic
                                                                    events, etc
 Reverse 9-1-1                                                     a Microsoft Windows ® -based
                                                                    program that uses a patented
                                                                    combination of database and GIS
                                                                    technologies that can target a
                                                                    precise geographic area and
                                                                    saturate it with thousands of calls
                                                                    per hour.

    RF                     radio frequency                         radio frequency

    Roaming                the possibility of a mobile user to
                            move between different locations
                            and environments from where
                            connectivity to a fixed network
                            (e.g., corporate Intranet, ISP, etc.)
                            can be established and authorized
    Role                   Predefined set of rules establishing    General meaning
                            the allowed interactions between a
                            user and the TOE
    Rural areas            Areas more than 10 kilometres
                            wide with minimal signal
                            propagation degradation other than
                            by topographic
                            features.Characterized by smaller
                            resident and transient populations;
                            large expanses of open lands;
                            undeveloped land areas (e.g.
                            grasslands, forests, and plains);
                            bodies of water (e.g., lakes, rivers,
                            and coastal areas); fewer large
                            commercial or industrial
                            complexes; absence of large
                            transportation networks or systems;
                            fewer public safety personnel,
                            departments, or services; fewer
                            commercial wireless
                            infrastructures, departments, or

    Rx                   receiver: The sink or terminator of
                          any signal on a transmission
    SAE                  Society of Automotive Engineers
    SaR                  Search and Rescue
    SATCOM               satellite communications
    SC                   Steering Committee

    SCADA                Supervisory Control and Data
                          Acquisition. A set of procedures to
                          monitor various types of systems
                          and provide control functions to
                          these systems. SCADA is used in a
                          variety of public/government
                          systems such as water and
                          wastewater control systems, traffic
                          signalization management systems,
                          electrical power distribution, and
                          management systems

    Scrambling           Method of converting an input
                          waveform to a digital
                          representation, which is then
                          encrypted and transmitted. The
                          receiver decrypts the received data
                          and regenerates the original analog
    Secret               Information that must be known
                          only to authorized users and/or the
                          TSF in order to enforce a specific
    Secure                                                      Ability to have secure (encrypted)
    Communications                                               voice communications to fit users’
                                                                 environment and which
                                                                 satisfies applicable laws,
                                                                 regulations, policies of the agencies
                                                                 and jurisdictions of the users
    Security attribute   Information associated with
                          subjects, users, and/or objects that
                          is used for the enforcement of the
    Security objective   A statement of intent to counter
                          identified threats and/or satisfy
                          identified organization security
                          policies and assumptions
    Selection            The specification of one or more       Same meaning
                          items from a list in a component
    Semiformal           Expressed in a restricted syntax
                          language with defined semantics

    Sensor Networks                                               Ability to exchange data involving
    SENTRY                the Federal Bureau of Prisons'
                           "SENTRY" database (US)

    Server                Any service-providing system

    Session               An interval during which a logical,
                           mutually agreed correspondence
                           between two objects exists for the
                           transfer of related information

    Session control       Is responsible for establishing and
                           terminating the environment in
                           which an application will operate

    Session mobility      The possibility of geographically
                           moving a terminal, from which
                           different TCP sessions have been
                           established, and maintain those
                           sessions irrespective of the terminal
    SF                    security function. A part or parts
                           of the TOE that have to be relied
                           upon for enforcing a closely related
                           subset of the rules from the TSP
    SFP                   security function policy. The
                           security policy enforced by an SF
    Single spot           Finite and easily identifiable
                           specific coverage area up to few
                           hundreds squared meters,
                           characterized as the immediate area
                           in and around an emergency
                           incident or event
    Slow scan TV          still images sent through voice
                           transceivers over a period of a few
                           seconds to a couple minutes

    SMPTE                 Society of Motion Picture and
                           Television Engineers
    SMRS (specialized     A radio system in which licensees
    mobile radio system)   provide land mobile
                           communications services in the 800
                           MHz and 900 MHz bands on a
                           commercial basis

 SMS                      short message service
  SNS                                                             Strategic National Stockpiles

    Socket              A communications transport
                         application programming interface
                         (API) that provides applications
                         interprocess communication
                         services using the underlying
                         services provided by TCP/IP
     SOF (strength of   A qualification of a TOE security
    function)            function expressing the minimum
                         efforts assumed necessary to defeat
                         its expected security behavior by
                         directly attacking its underlying
                         security mechanisms
    SOF-basic           strength of function-basic: A level
                         of the TOE (target of evaluation)
                         strength of function where analysis
                         shows that the function provides
                         adequate protection against casual
                         breach of TOE security by
                         attackers possessing a low attack
    SOF-medium          strength of function-medium

    SOF-high            strength of function-high

    SONET               synchronous optical network

    SoR                 Statement of Requirements             Statement of Requirements

    Spectrum            The usable radio frequencies in the   Same meaning
                         electromagnetic distribution
    SSG                 Service Specification Group
    ST                  security target. A set of security
                         requirements and specifications to
                         be used as the basis for evaluation
                         of an identified TOE
    Streaming           Technique that allows sending
                         media (audio, video or both) in a
                         compressed form over the Internet.
                         The media is sent in a continuous
                         stream and is played as it arrives.
                         With streaming media, user does
                         not have to wait to download a
                         large file before using it
    Subject             An entity within the TSC that         Non-technical meaning
                         causes operations to be performed

    Sub-network          A functional abstraction of a set of
                          one or more intermediate systems
                          which provide relaying and through
                          which end systems may establish
                          network connection, only related to
                          the lower three layers of the OSI

    Survivability        A property of a system that         Same meaning
                          provides a defined degree of
                          assurance that communications will
                          continue even in case of link/base
                          station failure or in absence of
                          fixed infrastructure
    Symbol               A bit or a defined sequence of bits

    System               Collection of equipment and/or         Same meaning
                          software modules which would
                          normally work together as a single
                          entity. For example, a line system
                          is a system comprising line
                          terminal equipments, regenerator
                          equipments, optic fiber cable
                          'equipment,' and management
                          software modules
    System                                                      Ability to effectively initiate and
    Administration                                               sustain flexible and dynamic
                                                                 system administration for purposes
                                                                 of multi-agency interoperability,
                                                                 including administration of talk
                                                                 groups, encryption key
                                                                 management, emergency alerts,
                                                                 networks, and channels for mutual
 System administration                                          The communications systems must
 of users                                                        allow authorized system
                                                                 administrators as well as incident
                                                                 and branch commanders to
                                                                 establish user profiles for network
                                                                 access and usage, depending upon
                                                                 the role that the public safety user
                                                                 is asked to satisfy during an

    System integration   The progressive linking and testing
                          of system components to merge
                          their functional and technical
                          characteristics into a
                          comprehensive, interoperable

     System             The ability of network management       the ability of public safety agencies
    interoperability     products and services from              to talk across disciplines and
                         different suppliers to work together    jurisdictions via radio
                         to manage communications                communications systems,
                         between managed object classes          exchanging voice and/or data with
                                                                 one another on demand, in real
                                                                 when needed
     Tactical           The intent of tactical
    communications       communications systems
    architecture         architecture is to provide an
                         'always available' system for
                         mission critical communications

    Talk-around         the capability of two or more
                         mobiles or portables (subscriber
                         units) to intercommunicate without
                         the use of a system or network
    Task force                                                  This mode defines a cooperative
                                                                 effort between specific agencies
                                                                 with extensive preplanning and
                                                                 practice of the operation.
    TDMA                time division multiple access
    TE                  terminal equipment                      Equivalent to PSCD
    Telemetry            Wireless transmission and              The use of telecommunication for
                          reception of measured quantities       automatically indicating or
                          for the purpose of remote              recording measurements at a
                          monitoring (e.g. environmental or      distance from the measuring
                          equipment monitoring). The term        instrument
                          is also used to refer to the signals
                          carrying such a kind of
                          information. Telemetry is usually
                          used with satellites, probes,
                          sensors and mobile robots
    Tele-operation      It is the remote control of robot
                         manipulators in real-time
    Temporary network                                           JANs and EANs are networks that
                                                                 exist at all times whereas the IANs
                                                                 are created on temporary basis to
                                                                 serve a particular purpose, such as
                                                                 an incident and then are dissolved.
                                                                 The nature of the IAN is such that
                                                                 it may not reach all areas of an
                                                                 incident. In such cases, the user
                                                                 would either connect to the JAN, or
                                                                 create a temporary network to
                                                                 extend the IAN to the area not

    TETRA               TErrestrial Trunked RAdio

    TIA                      Telecommunication Industries
    TOE                      target of evaluation: An IT product
                              or system and its associated
                              administrator and user guidance
                              documentation that is the subject of
                              an evaluation
    TOE resource             Anything usable or consumable in
                              the TOE
    TRANSEC                  transmission security

     transfers outside TSF   Communicating data to entities not
    control                   under control of the TSF
    Transparency             The property of an entity that
                              allows another entity to pass
                              thorough it without altering either
                              of the entities
    Transparent access       access without user action or
                              operator intervention

    Transparent data         TS-user data that is transferred
                              intact between transport entities
                              and which is unavailable for use by
                              the transport entities
     Transparent             Information that is not significant
    information               sematically to an object used to
                              transport the information. [ETSI]
    Transparent interface    An interface that allows the
                              connection and operation of a
                              system, subsystem, or equipment
                              with another without modification
                              of system characteristics or
                              operational procedures on either
                              side of the interface. [ETSI]

    Transport system         A protocol stack comprising some
                              or all the OSI layer 1 (physical
                              layer) to 4 (transport layer).

    Triple DES               triple data encryption algorithm

    Trusted channel          A means by which a TSF and a
                              remote trusted IT product can
                              communicate with necessary
                              confidence to support the TSP
    Trusted path             A means by which a user and a
                              TSF can communicate with
                              necessary confidence to support the

    TSC                      TSF Scope of Control. The set of
                              interactions that can occur with or
                              within a TOE and are subject to the
                              rules of the TSP
    TSF                      TOE security functions. A set
                              consisting of all hardware,
                              software, and firmware of the TOE
                              that must be relied upon for the
                              correct enforcement of theTSP

    TSFI                     TOE security functions interface

    TSG                      Technical Specificaton Group
    TSP                      TOE security policy
    Tx                       Transmitter: The source or
                              generator of any signal on a
                              transmission medium

     Type I, Type II, Type   Triple Data Encryption Algorithm
    III, Triple DES           (TDEA): An encryption algorithm
                              whose key consists of three DES
                              (Data Encryption Standard) keys,
                              which is also referred to as a key
    Type 1 product           Classified or controlled
                              cryptographic item for securing
                              classified and sensitive U.S.
                              Government information, when
                              appropriately keyed

    Type 2 product           Unclassified cryptographic
                              equipment, assembly, or
                              component, endorsed by the
                              National Security Agency, for use
                              in national security systems

    Type 3 algorithm         A cryptographic algorithm that has
                              been registered by the NIST and
                              published as a FIPS for use in
                              protecting unclassified sensitive,
                              information or commercial
    Type 4 algorithm         Unclassified cryptographic
                              algorithm that has been registered
                              by the NIST, but not published as a
    UDP                      User Datagram Protocol

     UIM                   user identity module: A standard
                            device or functionality providing
                            secure procedures in support of
                            user or terminal registration,
                            authentication, and privacy for
                            wireless access to IMT-2000

     UPT                   Universal Personal
                            Telecommunications service: A
                            telecommunications service that
                            provides personal mobility and
                            service profile management

 Urban areas               Areas from hundreds of meters
                            (districts) to up 10 kilometres (city)
                            with signal propagation degraded by
                            existing obstructions (e.g.,
                            infrastructures, buildings, and
                            structures). Characterized by large
                            resident and transient populations;
                            large transportation/road/highway
                            networks; mass population venues
                            (e.g., malls, office complexes, and
                            stadiums); presence of large
                            industrial or commercial areas and
                            complexes; great numbers of public
                            safety services and personnel;
                            significant numbers of public,
                            private, and commercial wireless
                            systems and services; small areas of
                            open undeveloped lands; bodies of
                            water or coastal areas with
                            contiguous development
 USAR/TSAR                 Urban Search and Rescue/Technical
                            Search and Rescue

 User                      Any entity (human user or external       General meaning
                            IT entity) outside the TOE that
                            interacts with the TOE
 User access point( UAP)   The location to where a service is
                            requested and is necessary for
                            service invocation

 User data                 Data created by and for the user, that
                            does not affect the operation of the

   US&R                      Urban Search and Rescue.                 Urban Search and Rescue: A task
                              A US&R team is a self contained          force equipped with necessary tools
                              heavy structural rescue team with        and equipment and
                              search, rescue, medical and technical    the required skills and techniques for
                              support capabilities                     the search, rescue, and medical care
                                                                       of victims of structural

   User/User group                                                    Public safety personnel and
                                                                       resources that are recognized by the
                                                                       system to share
                                                                       communications and information.
                                                                       This implies that traffic related to
                                                                       this user group only traverses
                                                                       the portion of the network necessary
                                                                       to reach all members of particular
                                                                       user group. Each user group
                                                                       can be a permanent unit or a
                                                                       temporary unit created by an
                                                                       authorized user for a particular task.

   User identification and                                            The communications systems must
    location                                                           provide user identification to others
                                                                       during communications and when
                                                                       required, must provide user geo-
                                                                       location information to
                                                                       incident commanders and other
                                                                       authorized resources.
   UT (User Terminal)        A system component, that is
                              accessible and controllable by the
                              officer in the field, that accepts the
                              input of RF data (information) from
                              the system or network and presents
                              the output of information in a
                              definable form that can be
                              interpreted and translated into a
                              useable format.
 VESA                        Video Electronic Standard
                              Association: association to develop
                              open display and display interface
                              standards, ensuring interoperability
 WAN                         wide-area network
 Web browsing                A browser is an application program
                              that provides a way to look at and
                              interact with all the information on
                              the World Wide Web. Technically, a
                              Web browser is a client program that
                              uses the Hypertext Transfer Protocol
                              (HTTP) to make requests of Web
                              servers throughout the Internet on
                              behalf of the browser user

 Wetlands                 Inland wetlands most commonly
                           found on floodplains along rivers
                           and streams with isolated
                           depressions surrounded by dry land,
                           along the margins of lakes and
                           ponds, and in other low-lying areas

 Wide area                Extended coverage area from the hot
                           spot size up above characterized as
                           an area that may include:
                           -one or more cities, towns, villages,
                            or multiple combinations of any of
                           -one or more counties or multiple
                            combinations of counties;
                           -one or more states or multiple
                            combinations of states;
                           -one or more countries or multiple
                            combinations of countries.
 Wireless access          Terminal access to the network
                           using wireless technology.
                           Examples are: digital mobile
                           phones, digital cordless phones, and
                           FPLMTS personal stations
 Wireless device type     A general term used for any mobile
                           station, personal station or personal
                           terminal, with which non-fixed
                           access to the network is used
 Wireless node            an IP-based wireless ad-hoc
                           infrastructure used to transmit,
                           receive and distribute various forms
                           of data.
 WT (Wireless Terminal)   A general term used for any mobile
                           station, personal station or personal
                           terminal, with which non-fixed
                           access to the network is used


Shared By: