Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise Services

Deciphering Security’s Alphabet Soup of Acronyms

October 23, 2012

 

Do you remember your first few weeks in the security industry, especially in its administration? What were the most confusing terms and acronyms for you to master? Well, we’ve been asking around for industry leaders to contribute their top acronyms for our alphabet soup so you can come back and reference what we mean by ASTM, HDIS and PIAM.

                                       

ASTM: ASTM, a standard test method, refers to the crash rating of a vehicle access perimeter barrier. 

1.       Small Passenger Car:  Car manufactured in the last 10 years weighing 2430 +/- 50 pounds.

2.       Pickup Truck:  A ¾-ton model manufactured within the last 10 years weighing 5070 +/- 100 pounds.

3.       Medium Duty Truck:  Truck with diesel engine having vehicle mass of 15,000 +/- 300 pounds.

4.       Heavy Goods Vehicle:  Tandem axle dump truck or tandem axle with drop axle truck, tested at 65,000 +/- 1300 pounds.

A car designation starts with “C,” the pick-up is a “P,” the medium duty truck gets “M,” and the heavy goods vehicle is “H.”  The number following the letter is the speed.  Thus, a “40” means the vehicle was tested at 38.0 to 46.9 mph.  An H30 designation defines a heavy-goods vehicle traveling at approximately 30 mph.  A C50 is a car travelling at 50 mph. Contributed by David Dickinson, Senior Vice President, Delta Scientific.

 

BOLO: “Be On the Lookout” is an abbreviation used in law enforcement, often referring to a broadcast bulletin or other communication about a possible suspect. These are also known as “all-points bulletins” (APB) or “attempts to locate” (ATL).  Contributed by Gadi Piran, President, OnSSI.

 

HDIS: High Definition Interactive Streaming involves supplying video to a Web-based device at high-definition (HD) resolution and including multiple streams, each of which may be displayed and controlled individually by the user with no compromise to resolution or video frame rate. Contributed by Gadi Piran, President, OnSSI.

 

IAM:  Identity and Access Management (IAM) systems let enterprises manage access physical and logical resources. Digital identities are assigned to individuals, and privileges and policies are assigned to those identities. So, for example, Ralph would get access to the building and his computer but not to the server room. Janet could access all computers in the building but needs different levels of authentication for the server room than for her computer.Contributed by Phil Scarfo, Lumidigm Vice President, Worldwide Sales & Marketing

 

IOC: Interactive Overlay Controls are video software system controls that are accessed by “mousing over” an icon of a device or other element being controlled. The control interface is only displayed if and when it is needed. Contributed by Gadi Piran, President, OnSSI.

 

NFC: Near Field Communication provides simplified transactions, data exchange and wireless connections between two devices that are in close proximity to each other.  NFC is expected to become widely used for making payments by smartphone. Many smartphones currently on the market already contain embedded NFC chips that can send encrypted data a short distance ("near field") to a reader located next to a retail cash register.  Shoppers who have their credit card information stored in their NFC smartphones can pay for purchases by tapping their smartphones on the reader. 

A smartphone or tabletwith an NFC chip also serves as keycardor ID card.  A smartphone can be used just like a smart card (or proximity card) – placed next to the reader and open a locked door. Contributed by Jeremy Earles, Portfolio Manager, Credentials and Readers, Ingersoll Rand Security Technologies.

 

PIAM:Physical Identity and Access Management is software used to centrally manage identities, creating a single identity for physical access control system cardholders across the entire enterprise. Integrated with logical ID systems, the software ensures timely, synchronized and policy-based enrollment and termination of physical access privileges across multiple security systems. Contributed by Quantum Secure.

 

Do you have an acronym you want defined? Or would you like to contribute a definition that you found especially confusing when you started out?

Add to the encyclopedia! Send us your definitions or requests in the comments section below, or email me directly at meyerc@bnpmedia.com.

KEYWORDS: NFC security definitions security terms

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • 3 Key Surveillance Storage Acronyms to Learn

    See More
  • My Brother's Table soup kitchen

    Massachusetts soup kitchen bolsters surveillance system

    See More
  • When Pop Culture Drives Mobile App Development, What Happens to the Security of User Data?

    See More

Related Products

See More Products
  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

  • Security of Information and Communication Networks

  • Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing