• Active Defense: A military strategy where the defender takes the offensive to engage the enemy.
  • Advanced Encryption Standard (AES): A widely-used symmetric key encryption algorithm that provides strong protection against eavesdropping and tampering.
  • Advanced Persistent Threat (APT): A type of cyber attack that is designed to persistently target an organization’s network and steal sensitive data over a long period of time.
  • Aerial Warfare: The use of aircraft in military operations, such as reconnaissance, transportation, bombing, and air-to-air combat.
  • Air Defense Artillery (ADA): Military units and systems that are specifically designed and employed to defend against air attacks.
  • Air Defense Identification Zone (ADIZ): A designated area in which aircraft must identify themselves to a country’s military for security purposes.
  • Air Defense: Defense against enemy aircraft, including the use of anti-aircraft weapons, fighter aircraft, and air defense systems.
  • Air Defense: The protection of friendly forces from enemy aircraft and missiles.
  • Air Defense: The protection of military forces and critical infrastructure from aerial attack.
  • Air Defense: The use of weapons, sensors, and other systems to detect, track, and engage aircraft and other aerial threats, often to protect military assets and personnel.
  • Air Interdiction: The use of military force to disrupt, delay, or destroy an enemy’s military capabilities before they can be used against friendly forces.
  • Air Strike: An attack carried out by aircraft on ground or naval targets.
  • Airborne Operation: A military operation in which troops and equipment are transported by aircraft into a combat area.
  • Airborne Operations: Military operations conducted by air-dropped forces, such as paratroopers or special operations units.
  • Airborne Warfare: Warfare in which troops are dropped from aircraft behind enemy lines, usually with the goal of establishing a beachhead or disrupting enemy operations.
  • Airborne Warning and Control System (AWACS): An airborne surveillance and command and control system used to detect, identify, and track airborne targets, including enemy aircraft and missiles.
  • Amphibious Assault: An attack on an enemy position that involves both naval and ground forces.
  • Amphibious Defense: Defense against enemy forces during an amphibious assault.
  • Amphibious Operation: A military operation that involves the use of naval and ground forces to secure a beachhead and establish a foothold on enemy-held territory.
  • Amphibious Operations: Military operations conducted by forces that are trained to operate in both land and sea environments.
  • Amphibious Warfare: A type of military operation in which troops are landed on a hostile shore by ships, usually with the goal of securing a beachhead and then advancing inland.
  • Amphibious Warfare: Military operations that involve landing troops, equipment, and supplies from ships onto a hostile shore.
  • Amphibious Warfare: Military operations that involve the use of naval and ground forces to secure a coastal area.
  • Anti-Access/Area Denial (A2/AD): A military strategy aimed at denying an adversary access to a particular area or region, typically by using a combination of long-range missiles, naval mines, and other military assets.
  • Anti-Access/Area Denial (A2/AD): The use of military capabilities and tactics to prevent an opposing force from accessing or operating in a specific area, often by creating a “no-go” zone around a particular target or region.
  • Anti-Aircraft Defense: Defense against enemy aircraft, typically through the use of firearms or guided missiles.
  • Anti-Tank Guided Missile (ATGM): A guided missile that is specifically designed to defeat armored targets, including tanks, armored vehicles, and fortifications.
  • Antiterrorism/Force Protection (AT/FP): Measures taken to reduce the vulnerability of military forces and installations to terrorist attacks.
  • Application Firewall: A type of firewall that is designed to protect against specific types of cyber threats, such as those posed by web applications and servers.
  • Area Defense: A type of defensive strategy in which a military unit defends a specific geographic area.
  • Area Defense: The defense of a defined area, such as a city or military base.
  • Armament: The weapons and ammunition of a military force.
  • Artificial Intelligence (AI): A branch of computer science that deals with the development of intelligent systems that can perform tasks that normally require human intelligence, such as recognizing patterns and making decisions.
  • Artillery Defense: Defense against enemy artillery, including the use of anti-artillery weapons and fortifications.
  • Artillery: Large-caliber weapons, such as cannons and howitzers, used to support ground troops and attack enemy positions.
  • Asymmetric Warfare: Conflicts in which opposing sides possess unequal military capabilities and employ unconventional tactics, such as terrorism and guerrilla warfare.
  • Asymmetric Warfare: Warfare in which a weaker force uses unconventional tactics, such as terrorism or guerrilla warfare, to counter the strength of a stronger, more conventional military force.
  • Asymmetric Warfare: Warfare that is characterized by a significant disparity in military capability between opposing forces, resulting in a reliance on unconventional tactics and strategies.
  • Asymmetrical Warfare: A type of warfare in which opposing forces have significantly different levels of military capability and resources.
  • Asymmetrical Warfare: Warfare between two parties where one has a significant advantage over the other in terms of military capabilities.
  • Avionics: The electronic systems used in military aircraft, such as navigation, communication, and weapons systems.
  • Ballistic Missile Defense (BMD): The use of weapons and systems to detect, track, and engage ballistic missiles, often to defend against a potential nuclear or chemical attack.
  • Ballistic Missile Defense: Defense against incoming ballistic missiles through the use of interceptors or other means.
  • Ballistic Missile: A type of missile that follows a trajectory determined by its initial velocity and the effects of gravity.
  • Battle Damage Assessment (BDA): The process of evaluating the effectiveness of military operations, including the assessment of damage to enemy forces, equipment, and infrastructure.
  • Battle Group: A military unit made up of multiple components, such as ground forces, artillery, and aircraft, that operates together as a single entity.
  • Battle Management: The coordination and control of military forces during a battle.
  • Battlefield Air Interdiction (BAI): Air operations that support ground forces by attacking enemy air defenses, supply lines, and other critical targets.
  • Battlefield Illumination: The use of lights, flares, and other illumination sources to provide visibility on the battlefield, including the illumination of landing zones, drop zones, and target areas.
  • Battlefield Management System (BMS): A computerized system used to manage and control the flow of information and resources on the battlefield, including the coordination of weapons systems, logistics, and communication systems.
  • Battlefield Surveillance: The use of intelligence, surveillance, and reconnaissance (ISR) capabilities to monitor and track enemy forces and support military operations.
  • Battlefield Surveillance: The use of technology and human intelligence to monitor enemy activity on a battlefield.
  • Biological Warfare: The use of biological agents, such as bacteria, viruses, and toxins, as weapons to cause harm to enemy personnel, animals, and crops.
  • Biometric Authentication: The use of unique biological traits, such as fingerprints, iris scans, or facial recognition, to confirm a person’s identity.
  • Black Hat Hacker: A type of hacker who is not authorized to access computer systems and networks, and who uses their skills for illegal or malicious purposes, such as stealing sensitive information or disrupting operations.
  • Block Out: A defensive technique where a defender positions themselves between the offensive player and the basket in order to prevent them from getting a rebound after a shot is missed.
  • Brigade: A military unit typically made up of several battalions and other supporting units.
  • Bullet Point List All Defense Terminology and Related Definitions.
  • Camouflage: The use of visual deception to conceal military personnel, equipment, and facilities from the enemy.
  • Chemical Defense: Defense against chemical weapons, such as protective gear and decontamination procedures.
  • Chemical Warfare: The use of chemical agents, such as nerve gases and blister agents, as weapons to cause harm to enemy personnel and disrupt their operations.
  • Chemical Weapons: Poisonous or toxic chemicals used in warfare to cause death, injury or harm to the enemy.
  • Chemical, Biological, Radiological, and Nuclear Defense (CBRN Defense): Defense against weapons of mass destruction, such as chemical, biological, radiological, and nuclear weapons.
  • Civil Defense: Measures taken by a government to protect the civilian population during a war or natural disaster.
  • Close Air Support (CAS): Air support provided to ground troops during close combat operations, typically in the form of bombing, strafing, or reconnaissance missions.
  • Cloud Security: The set of policies, technologies, and procedures that are used to protect cloud-based systems, data, and services from unauthorized access, use, disclosure, or disruption.
  • Coastal Defense: The protection of a nation’s coastline from enemy invasion.
  • Combatant Command (COCOM): A unified command of military forces established by the President of the United States and responsible for the overall direction and coordination of military operations within a specific geographic area or functional area of responsibility.
  • Combined Arms Warfare: Warfare in which multiple branches of the military, each using their own unique capabilities and weapons, work together to achieve a common objective.
  • Combined Arms Warfare: Warfare that integrates multiple branches of the military, such as ground, air, and naval forces, in a coordinated effort.
  • Command and Control (C2): The management of military forces and resources, including the coordination of plans and operations.
  • Contingency Operations: Military operations that are conducted in response to unexpected or rapidly changing circumstances, such as natural disasters or civil unrest.
  • Conventional Warfare: Warfare fought using conventional weapons and tactics, typically between two large, organized military forces.
  • Counter Air Operations: Military operations that are conducted to defend against enemy air attacks and to establish air superiority.
  • Counterinsurgency (COIN): A military strategy aimed at defeating an insurgency or guerrilla movement by winning the support of the local population and addressing the root causes of the conflict.
  • Counter-Insurgency (COIN): A military strategy aimed at defeating insurgency movements by addressing the root causes of rebellion and promoting stability, security, and legitimacy. It typically involves a mix of military, economic, political, and diplomatic measures and often emphasizes local involvement and intelligence-gathering. The goal of COIN is to undermine the support for the insurgency, protect the population, and create conditions for long-term stability.
  • Counter-Insurgency (COIN): Military operations and activities designed to defeat an insurgency, often by winning the support of local populations, disrupting insurgent networks, and building effective security forces.
  • Counterinsurgency (COIN): Military operations that are conducted to defeat insurgent forces and to support the development of stable, secure, and self-sufficient governments.
  • Counterinsurgency: Military operations aimed at defeating an insurgency, or organized armed resistance, in a particular area.
  • Counterinsurgency: Military operations aimed at defeating insurgency movements that seek to overthrow a government or seize control of a territory.
  • Counterintelligence: Efforts to prevent enemy intelligence organizations from successfully gathering and collecting intelligence against one’s own country.
  • Counterintelligence: Measures taken to prevent foreign intelligence services from successfully gathering and collecting intelligence against a country.
  • Counterintelligence: The efforts to prevent foreign intelligence services from successfully gathering and collecting intelligence against a country.
  • Counterintelligence: The efforts to prevent foreign intelligence services from successfully gathering and collecting intelligence against the interests of a country’s national security.
  • Counterterrorism (CT): A set of military, intelligence, and law enforcement activities aimed at preventing, disrupting, and defeating terrorist threats to national security.
  • Counterterrorism: Measures taken to prevent, deter, and respond to acts of terrorism.
  • Counter-Terrorism: The efforts to prevent acts of terrorism and to bring those who commit such acts to justice.
  • Covert Operation: A secret mission or activity conducted by a military or intelligence organization in order to achieve a specific objective.
  • Cyber Defense: Defense against cyber-attacks, including the protection of critical computer systems, networks, and data from unauthorized access or exploitation.
  • Cyber Defense: The protection of computer systems and networks from cyber attacks.
  • Cyber Defense: The protection of military and critical national infrastructure systems and networks from cyber threats, including cyberattacks and cyber espionage.
  • Cyber Defense: The use of personnel, technology, and processes to protect military networks, systems, and information from cyber-attacks and other digital threats.
  • Cyber Espionage: The use of cyber means for the purpose of gathering intelligence or stealing sensitive information from governments, corporations, or individuals, often for political or economic gain.
  • Cyber Espionage: The use of cyber means to gather sensitive information from governments, corporations, or individuals for political or economic gain.
  • Cyber Operations: The use of digital technologies and capabilities to conduct military operations in and through cyberspace, often with the goal of disrupting, destroying, or otherwise exploiting enemy systems, networks, and data.
  • Cyber Warfare: The use of computer networks and technologies for the purpose of conducting conflict and warfare, including the use of cyberattacks, electronic surveillance, and information warfare.
  • Cyber Warfare: The use of computer networks and technologies to conduct military operations or attacks on enemy systems and infrastructure.
  • Cyber Warfare: The use of computer networks and technology to conduct military operations, such as disrupting enemy communications, stealing sensitive information, or attacking critical infrastructure.
  • Cyber Warfare: The use of computer networks and the Internet to disrupt, damage, or destroy an opponent’s information systems and infrastructure.
  • Cyber Warfare: The use of computer networks to attack or defend against enemy systems, networks, and assets.
  • Cyber Warfare: The use of cyber means to conduct military operations against an adversary’s critical infrastructure, military assets, and civilian population.
  • Cyber Warfare: The use of cyberspace as a domain for military operations, including the use of computer networks and systems to gather intelligence, disrupt enemy operations, and wage cyber attacks.
  • Cybersecurity Operations: Operations aimed at protecting computer systems and networks from unauthorized access, theft, and damage.
  • Cybersecurity: The protection of computer networks, systems, and data from unauthorized access, use, disclosure, disruption, modification, or destruction.
  • Cybersecurity: The protection of computer systems and networks from unauthorized access, theft, and damage.
  • Cybersecurity: The protection of internet-connected systems, including computers, networks, and data, from unauthorized access, use, disclosure, disruption, modification, or destruction.
  • Cyberwarfare: The use of computer networks and technology to conduct military operations or attacks against an adversary.
  • Data Loss Prevention (DLP): The use of technology and processes to prevent the unauthorized transfer of sensitive data from an organization’s network.
  • Deception: The use of false information or false appearances to mislead an enemy or to prevent them from discovering the true nature of one’s own intentions or capabilities.
  • Defense Support to Civil Authorities: Military support provided to civilian authorities during natural disasters, civil unrest, or other emergencies.
  • Defense Terminology Defined
  • Defensive Rebounds: A rebound that is claimed by a defender after a shot is missed by the offense. This can help to prevent second chance opportunities for the offense and maintain possession for the defense.
  • Defensive Slide: A defensive technique where a defender moves laterally in order to stay in front of the offensive player and maintain defensive position. This can help to prevent the offense from getting past the defender and attacking the basket.
  • Demilitarized Zone (DMZ): An area in which military activity is restricted or prohibited.
  • Denial of Service (DoS) Attack: A type of cyber attack in which an attacker overloads a server or network with traffic, rendering it unavailable to users.
  • Digital Signature: A type of electronic signature that is used to verify the authenticity and integrity of a digital message or document, often using public key cryptography.
  • Directed Energy Weapon (DEW): A weapon that uses a focused beam of energy, such as a laser or microwave, to cause physical damage to a target.
  • Directed Energy Weapon (DEW): A weapon that uses focused energy, such as laser or microwave, to damage or destroy targets.
  • Directed Energy Weapons (DEW): Weapons that use focused energy, such as lasers or microwaves, to attack enemy targets.
  • Directed Energy Weapons (DEW): Weapons that use focused energy, such as lasers or microwaves, to destroy or disable enemy targets.
  • Distributed Denial of Service (DDoS) Attack: A type of cyber attack in which multiple systems are used to flood a server or network with traffic, making it unavailable to users.
  • Double-Team: A defensive strategy where two defenders work together to mark a single offensive player, in order to limit their options and make it more difficult for them to score.
  • Drone: A unmanned aerial vehicle (UAV) used for military reconnaissance, surveillance, and target acquisition, as well as for delivering weapons.
  • Electronic Warfare (EW): Military actions aimed at exploiting, disrupting, or destroying an enemy’s electronic systems, such as communication and navigation systems.
  • Electronic Warfare (EW): Military operations that use electronic means to attack or defend against enemy electronic systems, including communications, radars, and weapons systems.
  • Electronic Warfare (EW): The use of electromagnetic energy to interfere with enemy communications, navigation, and weapons systems, including the use of jamming, spoofing, and cyber attacks.
  • Electronic Warfare (EW): The use of electronic and electromagnetic devices to attack or defend against enemy systems, networks, and assets.
  • Electronic Warfare (EW): The use of electronic devices to interfere with or disrupt enemy communications, radar, or weapons systems.
  • Electronic Warfare (EW): The use of electronic signals and systems to disrupt, deceive, or otherwise affect enemy communications, navigation, radar, and other critical systems, often in support of military operations and other objectives.
  • Electronic Warfare (EW): The use of electronic systems and devices to disrupt, deceive, or protect electronic systems, such as communications and radars.
  • Electronic Warfare: The use of electromagnetic energy, such as radio frequency signals, to interfere with enemy communications and electronic systems.
  • Electronic Warfare: The use of electronic means to attack or defend against enemy communications, navigation, and surveillance systems.
  • Electronic Warfare: The use of electronic signals to disrupt, deceive, or destroy an enemy’s command and control systems, communications, and sensors.
  • Encryption: The process of transforming plain text into coded text to protect its confidentiality and integrity, allowing only authorized parties to access the information.
  • Endpoint Security: The protection of computer systems and devices, such as laptops, smartphones, and tablets, from cyber threats and data theft.
  • Endpoint Security: The set of policies, technologies, and procedures that are used to protect the endpoints of a network, such as desktops, laptops, and mobile devices, from cyber threats.
  • Espionage: The act of gathering, transmitting, or losing information related to national security in a way that could benefit a foreign power.
  • Fire Support: The use of artillery and air power to support ground troops in battle.
  • Fire Support: The use of artillery, mortars, and other indirect fire systems to support ground forces by attacking enemy positions and suppressing enemy fire.
  • Fire Support: The use of artillery, naval gunfire, or close air support to provide offensive firepower in support of ground forces.
  • Fire Support: The use of indirect fire, such as artillery and mortars, to support ground troops by suppressing enemy positions and providing cover fire.
  • Firewall: A software or hardware system that enforces security policies by monitoring and controlling incoming and outgoing network traffic.
  • Firewall: A type of network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  • Force Play: A defensive strategy where the defenders try to direct the ball carrier or attacker towards a particular area of the field, in order to limit their options and force them into making a mistake.
  • Force Projection: The ability of a military force to project its power and influence beyond its own borders, often to achieve specific military objectives or to deter potential adversaries.
  • Force Protection: The measures taken to ensure the safety and security of military personnel, equipment, and facilities.
  • Forward Deployment: The placement of military personnel, equipment, and supplies in a foreign country, often to support theater operations or to respond to potential threats.
  • Friendly Fire: Accidental or unintended attacks by friendly forces on friendly forces or civilians.
  • Gray Hat Hacker: A type of hacker who operates between the white and black hat categories, sometimes engaging in unauthorized activities for personal or political reasons, but also sometimes providing information about security vulnerabilities to organizations in order to improve security.
  • Guerilla Warfare: Warfare in which a weaker force uses unconventional tactics, such as ambushes and sabotage, to harass and wear down a stronger force.
  • Guerrilla Warfare: A form of warfare characterized by small groups of combatants using tactics such as surprise attacks, ambushes, and sabotage to fight a larger, more organized military force.
  • Guerrilla Warfare: A type of irregular warfare in which small, mobile units use tactics such as ambushes and raids to harass and destabilize enemy forces.
  • Guerrilla Warfare: A type of irregular warfare that involves small, loosely organized groups of fighters using unconventional tactics, such as ambushes and sabotage, to conduct military operations against a larger and more conventional enemy force.
  • Guerrilla Warfare: A type of unconventional warfare that involves small, mobile groups using tactics such as ambushes and raids to harass larger, conventional military forces.
  • Hacktivism: The use of hacking techniques to achieve political or social goals, often in the form of activism or protest.
  • Hash Function: A type of mathematical function that takes an input (or “message”) and returns a fixed-size string of bytes, used for verifying the integrity of data or password storage.
  • Help Defense: A defensive strategy where teammates move to provide additional support to a defender who is being attacked by the offense, in order to prevent the offense from scoring.
  • Homeland Defense: Defense of a nation’s homeland and its citizens from external threats, such as terrorism, invasion, or missile attack.
  • Host Nation Support: The provision of resources and support by the government and people of a foreign country to host foreign military forces and operations.
  • Humanitarian Assistance Operations: Military operations aimed at providing aid and support to civilians in need, such as disaster relief or refugee support.
  • Humanitarian Assistance: Military or civilian assistance provided to address the needs of individuals or populations affected by natural disasters, conflict, or other crises.
  • Humanitarian Assistance: The provision of aid and support to civilians affected by conflict or natural disasters, often by military personnel working in coordination with civilian aid organizations.
  • Information Defense: Defense against attacks on information systems and the protection of sensitive information.
  • Information Operations (IO): Military operations that use information-related capabilities to influence, disrupt, corrupt, or destroy the decision-making of adversaries and potential adversaries while protecting our own.
  • Information Operations (IO): The use of information and communication technologies to influence, disrupt, corrupt, or destroy the decision-making abilities of adversaries and potential adversaries while protecting our own.
  • Information Operations (IO): The use of information and communication technologies to influence, disrupt, or destroy enemy systems, often to gain an advantage in military operations.
  • Information Operations: The integration of information and information technology into military operations, to enhance situational awareness and decision-making.
  • Information Operations: The use of information and communication systems to influence, disrupt, or protect information and information systems.
  • Information Warfare: The use of information and communication technologies to achieve military or strategic objectives.
  • Insurgency: An armed rebellion or uprising against a government or occupying power.
  • Intelligence Operations: The collection and analysis of information about an enemy’s capabilities, intentions, and activities, often for the purpose of informing military planning and operations.
  • Intelligence Support to Operations: The provision of intelligence information and analysis to support military operations.
  • Intelligence, Surveillance, and Reconnaissance (ISR): Collection and analysis of information from various sources to inform military planning and decision-making.
  • Intelligence, Surveillance, and Reconnaissance (ISR): The collection and analysis of information to support military operations and decision-making, including the use of sensors, unmanned systems, and human intelligence sources.
  • Intelligence, Surveillance, and Reconnaissance (ISR): The collection, processing, analysis, and dissemination of information about potential threats and targets, often to support military operations and decision-making.
  • Internet of Things (IoT) Security: The set of policies, technologies, and procedures that are used to secure devices and systems connected to the Internet of Things.
  • Intrusion Detection System (IDS): A software or hardware system that monitors network traffic for signs of unauthorized access or attacks and generates alerts to warn system administrators.
  • Intrusion Detection System (IDS): A type of security software that is designed to detect unauthorized access to a computer system, network, or application.
  • Intrusion Prevention System (IPS): A software or hardware system that monitors network traffic and takes proactive measures to prevent unauthorized access or attacks.
  • Intrusion Prevention System (IPS): A type of security software that is designed to prevent unauthorized access to a computer system, network, or application.
  • Irregular Warfare: Warfare that deviates from the conventional norms of warfare, such as unconventional forces, asymmetrical tactics, and irregular operations.
  • Joint Air Defense Operations: The integration and coordination of air defense forces and systems from multiple military services to defend against air attacks.
  • Joint Doctrine: Doctrine that is shared and used by multiple military branches or nations.
  • Joint Fires: The integrated use of fires from multiple military services, including artillery, mortars, missiles, and aircraft, to support ground forces and achieve military objectives.
  • Joint Force Command (JFC): A command that is responsible for the direction, coordination, and execution of joint military operations.
  • Joint Force Development: The development of military capabilities and capacities that can be used by multiple military branches or nations.
  • Joint Force: A military force composed of personnel and assets from multiple branches of the military and/or multiple nations, often with the goal of achieving a unified and coordinated effort.
  • Joint Intelligence Center (JIC): A center that provides intelligence support and analysis to multiple military branches or nations.
  • Joint Intelligence Operations: Intelligence operations that involve multiple military branches or nations.
  • Joint Intelligence Preparation of the Operational Environment (JIPOE): The process of analyzing and describing the operational environment in order to support military decision-making and planning.
  • Joint Intelligence Preparation of the Operational Environment (JIPOE): The process of analyzing the threat, environment, and conditions to support joint military operations.
  • Joint Intelligence Surveillance and Reconnaissance (JISR): The integration and coordination of intelligence collection, analysis, and dissemination capabilities in support of joint military operations.
  • Joint Intelligence: The sharing of intelligence information and analysis among different branches of the armed forces, often to support joint operations.
  • Joint Logistics: Logistical support provided by multiple military branches or nations.
  • Joint Logistics: The integration and coordination of logistics support from multiple military services to support military operations.
  • Joint Military Operations: Military operations that are conducted by forces from multiple military services and/or multinational partners to achieve common objectives.
  • Joint Operations Planning Process (JOPP): A systematic and iterative process used to plan and execute joint military operations.
  • Joint Operations: Military operations conducted by two or more branches of the armed forces, often in coordination with allied forces, to achieve a common military objective.
  • Joint Operations: Military operations conducted by two or more branches of the armed forces, such as the Army, Navy, Air Force, and Marines, working together to achieve a common objective.
  • Joint Operations: Military operations conducted by two or more branches of the armed forces, such as the Army, Navy, and Air Force, working together to achieve a common objective.
  • Joint Operations: Military operations involving personnel and assets from multiple branches of the military and/or multiple nations, often with the goal of achieving a unified and coordinated effort.
  • Joint Planning and Execution Community (JPEC): A community of military and civilian planners who are responsible for the development and execution of joint military operations.
  • Joint Planning: The process of developing and coordinating joint military plans to achieve military objectives.
  • Joint Publish-Subscribe (JPUB): A communication infrastructure that enables the sharing of information and data between multiple military organizations.
  • Joint Readiness: The ability of military forces to operate effectively together in a joint military operation.
  • Joint Special Operations: Military operations that are conducted by special operations forces from multiple military services to achieve specific, complex, and sensitive objectives.
  • Joint Special Operations: Special operations that involve multiple military branches or nations.
  • Joint Staff: The staff responsible for providing advice and support to the commander of a joint military force.
  • Joint Targeting: The integration and coordination of target selection, development, and engagement in support of joint military operations.
  • Joint Terminology Management Office (JTMO): An office that is responsible for the development, coordination, and dissemination of joint terminology and definitions.
  • Joint Threat Assessment: The process of identifying, assessing, and prioritizing threats to military forces and to develop mitigation strategies.
  • Joint Training and Exercise Program (JTEP): A program that provides joint training and exercise opportunities for military forces from multiple branches or nations.
  • Joint Training Operations: Training operations that involve multiple military branches or nations.
  • Joint Training: Joint military training that is conducted by multiple military services to prepare for joint military operations.
  • Joint Warfare: Military operations conducted by forces from multiple military branches or nations.
  • Joint Warfare: Warfare that involves the coordinated and integrated employment of military forces from multiple branches or nations.
  • Joint Warfighting Assessment (JWA): An evaluation of joint military capabilities and capacities to determine the ability of military forces to conduct joint military operations.
  • Joint Warfighting Capabilities: Joint military capabilities that are developed and employed by multiple military services to achieve specific military objectives.
  • Joint Warfighting Doctrine: Joint military doctrine that provides guidance for the employment of joint military capabilities in support of military operations.
  • Joint Warfighting Functions: Joint military functions that are used to plan, prepare, execute, and assess joint military operations, including intelligence, fires, movement and maneuver, protection, and sustainment.
  • Joint Warfighting Headquarters: Joint military headquarters that are responsible for planning, preparing, executing, and assessing joint military operations.
  • Joint Weapon System: Weapon systems that are developed and employed by multiple military services to achieve specific military objectives.
  • Kinetic Operations: Military operations that use force to achieve military objectives, including operations to engage and defeat enemy forces.
  • Logistics Defense: The support and sustainment of military forces in the field, including the procurement and delivery of supplies, equipment, and personnel.
  • Logistics Readiness: The state of military logistics systems and processes to support military operations.
  • Logistics: The planning and execution of the movement, supply, and maintenance of military personnel and equipment, often in support of military operations.
  • Logistics: The planning, execution, and support of military operations, often involving the procurement, transportation, and distribution of supplies, equipment, and personnel.
  • Logistics: The process of planning, acquiring, transporting, maintaining, and sustaining military forces and equipment to support military operations.
  • Logistics: The process of planning, executing, and controlling the flow of goods, services, and information from suppliers to customers to support military operations.
  • Logistics: The process of planning, organizing, and managing the movement and support of military personnel, equipment, and supplies, including the procurement, storage, and transportation of resources.
  • Malware: A type of software that is designed to cause harm to a computer system, network, or application, such as viruses, trojan horses, and spyware.
  • Malware: Malicious software, including viruses, Trojans, and spyware, that is designed to damage or disrupt computer systems.
  • Man-to-Man Defense: A defensive strategy where each defender is assigned to guard a specific offensive player, rather than playing a zone defense. This type of defense is often used when the defense is trying to stop an individual player who is particularly skilled or dangerous.
  • Maritime Defense: The defense of a nation’s maritime interests, including its ships, ports, and coastal waters.
  • Maritime Security Operations: Military operations that are conducted to defend against maritime threats, including piracy, terrorism, and smuggling, and to protect freedom of navigation and the global economy.
  • Maritime Security Operations: Operations aimed at maintaining the security and safety of ships, ports, and maritime infrastructure.
  • Medical Support: Medical support that is provided to military personnel, including medical treatment, evacuation, and evacuation care.
  • Military Exercise: A planned and organized event that allows military personnel to train and practice their skills and tactics in a simulated combat environment.
  • Military Intelligence: Information gathered by military forces to inform military planning and decision-making.
  • Military Intelligence: Intelligence that is collected, processed, and analyzed to support military operations and decision-making.
  • Military Intelligence: The process of collecting, analyzing, and distributing intelligence information to support military operations.
  • Military Logistics: The support and sustainment of military operations, including the procurement, transportation, and maintenance of supplies, equipment, and personnel.
  • Military Operations on Urbanized Terrain (MOUT): Military operations that are conducted in urban environments, including operations to clear buildings, rooms, and other structures, as well as urban terrain.
  • Military Operations Other Than War (MOOTW): Military operations that are conducted in support of national and coalition objectives, but do not involve direct combat. Examples include peacekeeping operations, humanitarian assistance operations, and disaster relief operations.
  • Military Operations Other Than War (MOOTW): Military operations that are conducted in support of national objectives, including humanitarian assistance, peacekeeping, and disaster relief.
  • Military Power: The ability of a nation or its military forces to achieve strategic objectives through the application of military capabilities and resources, often including elements such as manpower, technology, and doctrine.
  • Mine Warfare: Military operations that are conducted to deny the use of underwater mines to the enemy and to clear underwater mines from waterways.
  • Mine Warfare: The use of mines and other explosive devices to disrupt enemy movements, protect friendly forces and assets, and achieve other military objectives.
  • Mine Warfare: The use of mines to defend or attack enemy positions.
  • Mine Warfare: The use of mines, both underwater and on land, to deny enemy access to waterways and other strategic areas, as well as to clear minefields and prevent friendly casualties.
  • Mission Command: The process of commanding military operations to achieve military objectives, including the exercise of authority and direction by the commander.
  • Mobile Defense: A military defense strategy that emphasizes mobility and versatility, often relying on rapid and flexible deployment and response to shifting threats and contingencies.
  • Mobile Defense: A military strategy where a defending force moves to counter an attacking force.
  • Mobile Device Management (MDM): The use of software and hardware to monitor and manage the security of mobile devices, such as smartphones and tablets, in an organization.
  • Mobile Warfare: Warfare that emphasizes the use of mobility, such as fast-moving armored units and airborne forces, to achieve strategic objectives.
  • Mobility Operations: Military operations that support the movement and employment of military forces and equipment, including transportation, engineer, and maintenance support.
  • Mobility Operations: Military operations that support the movement of military forces, including operations to establish and maintain lines of communication, secure supply routes, and provide transportation support.
  • Mobilization: The process of preparing and organizing military personnel, equipment, and supplies for active deployment.
  • Modernization: The process of updating and upgrading military equipment, systems, and processes to maintain military capabilities and to meet changing military requirements.
  • Mountain Warfare: Warfare conducted in mountainous terrain, which often requires specialized equipment and tactics due to the rugged, often difficult-to-access terrain.
  • Mounted Warfare: Warfare using horses, vehicles, or other means of transportation.
  • Munitions: Military equipment and supplies that are used to conduct military operations, including weapons, ammunition, and other ordnance.
  • Naval Warfare: The use of naval forces and capabilities to achieve military objectives, often involving the use of ships, submarines, aircraft, and other assets to engage enemy forces and protect friendly assets at sea.
  • Naval Warfare: The use of naval power, including ships, submarines, and aircraft, to control and defend bodies of water, project military force, and protect sea-lanes of communication.
  • Naval Warfare: Warfare that takes place at sea, involving ships, submarines, and aircraft.
  • NBC (Nuclear, Biological, Chemical) Defense: Defense against weapons of mass destruction, including nuclear, biological, and chemical weapons.
  • Network Centric Warfare (NCW): A military concept that emphasizes the integration and coordination of command, control, communications, computers, intelligence, surveillance, and reconnaissance (C4ISR) capabilities to support joint military operations.
  • Network Defense: Defense against attacks on computer networks, including the use of firewalls, intrusion detection systems, and other security measures.
  • Network Defense: The protection of military networks and information systems from cyber threats, including cyberattacks and cyber espionage.
  • Network Security: The protection of a computer network from unauthorized access, misuse, malfunction, modification, or destruction.
  • Network Segmentation: The process of dividing a network into smaller, isolated sub-networks in order to limit the spread of cyber threats and improve security.
  • Network-Centric Warfare: A military concept that emphasizes the integration of information and communication technologies to enhance military operations and decision-making.
  • Nuclear Weapons: Weapons that use nuclear reactions to release energy in an explosive manner, causing widespread destruction.
  • Offensive Operations: Military operations that are conducted to defeat enemy forces and to seize, occupy, or destroy enemy territory or assets.
  • Operating Tempo (OPTEMPO): The pace and frequency of military operations and other activities, often measured in terms of the number of missions, deployments, and other events.
  • Operational Art: The application of military forces to achieve strategic and operational objectives through the design, planning, execution, and assessment of military operations.
  • Operational Art: The integration of military operations, logistics, and intelligence to achieve strategic objectives.
  • Operational Environment: The environment in which military operations are conducted, including physical, cultural, and political factors.
  • Operational Maneuver: The employment of military forces to achieve military objectives through the application of movement and firepower.
  • Operational Readiness: The state of military forces to execute their assigned missions, including personnel, equipment, and training readiness.
  • Operations Security (OPSEC): Measures taken to protect sensitive information and operations from being discovered by an adversary.
  • Operations Security (OPSEC): The process of protecting sensitive information from unauthorized disclosure, compromise, or exploitation by hostile forces.
  • Passive Defense: Measures taken to reduce the vulnerability of military forces to enemy attack without actively engaging the enemy.
  • Peace Operations: Military operations that are conducted to maintain or restore peace, including operations to support peacekeeping, peace enforcement, and humanitarian assistance.
  • Peacekeeping Operations: Military operations aimed at maintaining peace and security in conflict-affected regions.
  • Peacekeeping Operations: Military operations conducted by the United Nations or other international organizations, with the aim of maintaining peace and security in a region, often following a conflict.
  • Peacekeeping: The deployment of military or civilian personnel to a conflict zone to monitor a ceasefire or peace agreement and help maintain stability.
  • Peacekeeping: The use of military and civilian personnel to maintain peace and stability in conflict-affected areas, often as part of a mandate from the United Nations.
  • Penetration Testing: The process of attempting to gain unauthorized access to a computer system or network in order to identify security vulnerabilities.
  • Personnel Readiness: The state of military personnel to execute their assigned missions, including health, training, and morale readiness.
  • Phishing: A type of social engineering attack that involves the use of fraudulent emails, phone calls, or websites to trick individuals into revealing sensitive information.
  • Physical Security: Measures that are taken to protect military personnel, facilities, and equipment from physical harm, theft, or damage.
  • Planning and Execution of Operations: The process of planning and executing military operations in support of national and coalition objectives.
  • Planning: The process of developing and coordinating plans to achieve military objectives, including mission planning, campaign planning, and contingency planning.
  • Please go ahead with more terms.
  • Point Defense: The defense of a specific area or location, such as a perimeter or critical infrastructure, against enemy attacks.
  • Point Defense: The defense of a specific point, such as a bridge or key location, from enemy attack.
  • Power Projection: The ability of military forces to project power over distances, including the ability to deploy, sustain, and employ military forces.
  • Press Defense: A defensive strategy where the defenders apply intense pressure to the offensive players, often in the form of full-court or half-court traps, in order to cause turnovers or force the offense into making mistakes.
  • Protected Mobility: The ability of military forces and assets to move and operate in hostile or potentially hostile environments, often relying on a combination of physical protection, electronic countermeasures, and other means.
  • Protective Measures: Measures that are taken to protect military personnel, facilities, and equipment from threats, including passive measures such as camouflage and hardening, and active measures such as surveillance and reaction forces.
  • Protective Operations: Operations aimed at protecting friendly forces, civilians, and critical assets from enemy attack.
  • Psychological Defense: Defense against enemy efforts to influence the attitudes and behaviors of friendly forces and populations through psychological means.
  • Psychological Operations (PSYOP): Military operations that are conducted to influence the attitudes and behavior of target audiences, including operations to convey information, messages, and themes.
  • Psychological Operations (PSYOP): Military operations that use psychological means to influence, disrupt, corrupt, or destroy the decision-making of adversaries and potential adversaries while protecting our own.
  • Psychological Operations (PSYOP): The use of communication and other means to influence the emotions, attitudes, and behavior of enemy personnel and populations, often to support military operations and other objectives.
  • Psychological Operations (PSYOP): The use of psychological and information warfare tactics to influence the beliefs, attitudes, and behaviors of enemy personnel and civilian populations, including the use of propaganda, leaflets, and other media.
  • Psychological Operations (PSYOP): The use of psychological and informational means to influence, disrupt, or protect the emotions, attitudes, and behaviors of individuals, groups, and populations.
  • Psychological Operations (PSYOPs): The use of psychological means, such as propaganda and psychological warfare, to influence the opinions, emotions, and behaviors of individuals or groups.
  • Psychological Operations: The use of psychological means, such as propaganda, to influence the attitudes and behaviors of foreign populations.
  • Psychological Warfare: The use of psychological tactics, such as propaganda and disinformation, to influence the opinions and behavior of an enemy population or military personnel.
  • Public Key Cryptography: A type of cryptography that uses two keys, one for encryption and one for decryption, to provide secure communication over public networks.
  • Rapid Deployment Forces: Military units that are designed to deploy quickly to a crisis area and respond to emergency situations.
  • Rapid Deployment: The ability of a military force to rapidly deploy personnel, equipment, and supplies to a crisis area, in order to respond to a threat or to support operations.
  • Readiness: The state of military forces to execute their assigned missions, including personnel, equipment, and training readiness, as well as overall unit readiness.
  • Rear Area Defense: Defense of the rear area of a military force, including logistical and support elements.
  • Rear Area Operations: Military operations that are conducted in the rear area of a theater of operations, including operations to support logistics, personnel, and other support functions.
  • Reconnaissance: Gathering of information about enemy forces, resources, and intentions through observation and intelligence-gathering activities.
  • Reconnaissance: Military operations that are conducted to gather information about enemy forces, including the employment of surveillance and intelligence-gathering assets.
  • Reconnaissance: Military operations that gather information about enemy capabilities, intentions, and activities to support military decision-making.
  • Reconnaissance: The collection of information about enemy forces, installations, and activities, including the use of ground reconnaissance patrols, aerial reconnaissance, and signals intelligence.
  • Reconnaissance: The process of gathering information about an enemy’s activities and capabilities through observation, investigation, or exploration.
  • Recruitment: The process of attracting, selecting, and enlisting personnel for military service, including the enlistment of active-duty, reserve, and National Guard personnel.
  • Redeployment: The movement of military forces and equipment from one location to another in support of military operations.
  • Redeployment: The process of moving military forces from one location to another, including the repositioning of forces from one theater of operations to another.
  • Refueling: The process of providing fuel to military aircraft, vehicles, and other equipment to maintain their operational capabilities.
  • Remote Access Security: The set of policies, technologies, and procedures that are used to secure remote access to an organization’s network, such as through VPNs or RDP.
  • Reserve Component: The reserve components of the military, including the Army National Guard, Air National Guard, Army Reserve, and Air Force Reserve, as well as the Navy and Marine Corps Reserve.
  • Re-Supply: The process of providing supplies and equipment to military forces to maintain their operational capabilities, including the resupply of ammunition, food, water, and other critical supplies.
  • Risks and Threats Assessment: The process of identifying and assessing risks and threats to military forces, including physical, operational, and cyber risks and threats.
  • Ron Legarski Defense: Terminology and Definitions.
  • RSA Algorithm: A widely-used public key encryption algorithm that is based on the mathematical properties of large prime numbers.
  • Sagging Defense: A defensive strategy where the defenders drop back from the attacking players in order to reduce the space available for the attacker to move in. This can also make it more difficult for the attacker to pass the ball to their teammates.
  • Sandbox: An isolated environment in which a software application, such as a web browser, is run in order to prevent it from accessing or affecting other parts of the system.
  • Search and Rescue (SAR): Military operations that are conducted to locate and recover individuals who are in distress, including military personnel, civilians, and allies.
  • Security Cooperation: Military-to-military activities and programs that are conducted to improve relationships and enhance capabilities with other countries and international organizations.
  • Security Force Assistance: Military support to partner countries to develop, train, equip, and sustain their security forces to provide for their own security and to counter common threats.
  • Security Information and Event Management (SIEM): A type of security software that provides real-time analysis of security alerts generated by various sources, such as firewalls, intrusion detection systems, and antivirus programs.
  • Security Operations Center (SOC): A centralized unit within an organization that is responsible for the security of its computer systems, networks, and data.
  • Social Engineering: The use of psychological manipulation to trick individuals into revealing sensitive information or performing actions that compromise security.
  • Space Defense: Defense of assets and interests in space, such as satellites and other space-based assets, from attack or interference.
  • Space Defense: The protection of national assets and interests in space, including satellites, spacecraft, and other space-based assets.
  • Special Operations: Military operations conducted by specially trained and equipped personnel, often involving unconventional tactics and methods to achieve specific objectives, such as reconnaissance, direct action, or unconventional warfare.
  • Special Operations: Military operations that are highly sensitive, classified, and require specialized training and equipment, such as unconventional warfare, direct action, and special reconnaissance.
  • Special Operations: Military operations that are unconventional, highly sensitive, and often classified, including the use of special forces, unconventional warfare, and direct action missions.
  • Steal: A defensive play where a defender takes the ball away from the offensive player, often by anticipating a pass or making a quick move to get between the ball and the offensive player.
  • Strategic Communications: The coordination and dissemination of information to support military and national objectives.
  • Strategic Communications: The process of using communication and information to influence, inform, and persuade foreign audiences to support US policy objectives.
  • Strategic Defense: A defense strategy that focuses on protecting a country’s vital interests, such as its territorial integrity, economic stability, and political independence, rather than directly engaging in offensive operations.
  • Strategic Defense: Defense that seeks to protect a nation’s strategic interests, such as its political and economic stability, rather than its tactical military forces.
  • Strategic Defense: The defense of a nation’s vital interests and resources, including military, political, and economic assets.
  • Strategic Defense: The development and deployment of military capabilities and systems to defend against threats to national security, including the use of missile defense, space-based systems, and other defensive technologies.
  • Strategic Defense: The use of military capabilities and forces to protect a nation or its interests from long-range threats, such as enemy ballistic missiles or other weapons of mass destruction.
  • Strategic Deterrence: The use of military power and capabilities to deter potential adversaries from taking actions that could threaten the security or interests of a nation or its allies.
  • Strategic Intelligence: The collection and analysis of information about foreign countries and their military capabilities, often to inform strategic planning and decision-making.
  • Strategic Mobility: The ability of military forces and assets to rapidly deploy and respond to a wide range of threats and contingencies, often in support of global commitments and interests.
  • Strategic Mobility: The ability of military forces to rapidly deploy and maneuver to different theaters of operation.
  • Strategic Planning: The development of long-term plans and objectives for military operations, often taking into account factors such as geopolitical, economic, and military conditions.
  • Strategic Strike: A military operation aimed at destroying high-value targets that are critical to an adversary’s war-making capability.
  • Strategic Strike: The use of long-range precision weapons and other assets to disrupt, destroy, or neutralize critical enemy targets, often with the goal of shaping the battlefield and achieving a decisive advantage.
  • Strategic Support: The provision of intelligence, logistics, and other critical support to military operations, often to enhance the effectiveness and efficiency of military forces.
  • Supply Chain Defense: Defense of the critical infrastructures, networks, and systems that support the delivery of goods and services to military forces.
  • Supply Chain Management: The process of planning, executing, and controlling the flow of goods, services, and information from suppliers to customers to meet customer requirements and to support military operations.
  • Supply Chain Security: The set of policies, technologies, and procedures that are used to secure the supply chain of goods and services, from production to delivery, to prevent the introduction of counterfeit, substandard, or malicious products.
  • Support to Operations: The provision of administrative, logistics, and sustainment support to military operations.
  • Suppression of Enemy Air Defenses (SEAD): The use of electronic warfare and direct firepower to neutralize or destroy enemy air defense systems, allowing friendly aircraft to operate with greater freedom and safety.
  • Surveillance: Monitoring of enemy activities and movements through the use of various means, including satellites, aircraft, and ground-based sensors.
  • Sustainment Operations: Military operations that support the long-term health, welfare, and morale of military personnel, as well as the maintenance, repair, and replacement of equipment and supplies, to sustain military operations.
  • Sustainment Operations: The planning and execution of the movement, supply, and maintenance of military personnel and equipment, to support ongoing military operations.
  • Sustainment: The process of providing ongoing support to military operations, including logistics, personnel, and other support functions, to ensure the continued ability of military forces to execute their assigned missions.
  • Switching Defense: A defensive strategy where defenders switch their assignments mid-play in order to counteract the offensive team’s movement and maintain defensive coverage.
  • Symmetric Key Cryptography: A type of cryptography that uses the same key for both encryption and decryption, providing high-speed encryption and decryption.
  • System of Systems (SoS): An interconnected set of systems that work together to achieve a common goal. In the context of defense, a system of systems may refer to multiple military systems that are integrated to support joint military operations.
  • Tactical Defense: The defense of military forces in the field, often in the context of a larger military operation.
  • Tactical Defense: The use of defensive measures and strategies during military operations, including the employment of cover and concealment, fortifications, and obstacle systems to protect friendly forces from enemy attack.
  • Tactical Defense: The use of military capabilities and forces to protect friendly forces and assets from immediate threats, such as enemy ground troops or air assaults.
  • Tactical Operations: Military operations that are conducted at the tactical level, including operations to secure objectives, defend against enemy attacks, and support larger-scale operations.
  • Territory Defense: The defense of a nation’s territory, including its land, waters, and airspace.
  • Theater Logistics: The planning and execution of the movement, supply, and maintenance of military personnel and equipment within a specific geographic area, in support of theater operations.
  • Theater Missile Defense (TMD): The development and deployment of systems and capabilities to defend against short-range and intermediate-range ballistic missiles, including Patriot missiles, THAAD, and Aegis BMD.
  • Theater of Operations: The geographic area in which military operations are conducted, including the area of responsibility for a particular military commander.
  • Theater Operations: Military operations conducted in a specific geographic area, often to achieve a specific military objective, such as securing a region or defeating an enemy force.
  • Theater Operations: Military operations that are conducted in a specific geographic area, such as a region, country, or continent.
  • Theater Security Cooperation (TSC): Efforts to promote regional security and stability through military-to-military engagement, training and exercise activities, and other cooperative measures.
  • Theater Support: Logistical and administrative support provided to military forces operating within a specific geographic area.
  • Theater Support: The provision of support to military operations within a theater of operations, including logistics, intelligence, communications, and other support functions.
  • These are some of the commonly used terms in defense, but the field is constantly evolving, so there may be additional terms and definitions in use today.
  • Threat Assessment: The evaluation of potential security threats to a nation or its military forces.
  • Threat Assessment: The evaluation of potential threats to military forces and interests, including the identification of potential adversaries, their capabilities, and the likelihood of attack.
  • Threat Intelligence: Information about current and emerging cyber threats that is used to improve the security posture of an organization.
  • Time Sensitive Targeting (TST): The rapid acquisition, development, and engagement of targets that pose an imminent threat to friendly forces or civilians.
  • Time-Sensitive Targeting: The process of identifying and engaging time-sensitive targets, such as enemy leaders or weapons of mass destruction, in a timely manner to minimize the risk of harm to friendly forces or civilians.
  • Top Cover: Air support provided to ground forces to protect against enemy air attack, including air cover provided by fighter aircraft, electronic warfare aircraft, and air defense assets.
  • Total Defense: A military strategy where all elements of society, including the military, civilians, and industry, contribute to the defense of the nation.
  • Total Force Management (TFM): The integration and coordination of active and reserve component military forces to maximize the effectiveness of military operations.
  • Total War: A conflict in which all aspects of society, including civilians and economic resources, are mobilized to support the war effort.
  • Training and Doctrine Command (TRADOC): The command responsible for developing, coordinating, and implementing military training and doctrine.
  • Training: The process of preparing military personnel for their assigned missions, including individual and unit training, as well as training for specific weapons systems and tactics.
  • Transport Layer Security (TLS): A widely-used cryptographic protocol that provides secure communication over the Internet, often used to protect web browsing, email, and other Internet communications.
  • Trap Defense: A defensive strategy where two or more defenders work together to close off a specific area of the field and force the ball carrier or attacker into a mistake or turnover.
  • Troop Movements: The movement of military personnel from one location to another, including the deployment of forces from their home station to a theater of operations.
  • Unconventional Warfare: Military operations that are conducted by irregular forces to include guerrilla warfare, subversion, sabotage, and other means to achieve military objectives.
  • Unconventional Warfare: Warfare that deviates from conventional norms of warfare, such as guerrilla warfare, insurgency, or terrorism.
  • Unit Readiness: The state of a military unit to execute its assigned missions, including personnel, equipment, and training readiness.
  • Unmanned Aerial Systems (UAS): Remotely piloted or autonomous aircraft that can be used for a variety of missions, including reconnaissance, surveillance, and strike operations.
  • Unmanned Aerial Systems (UAS): Remotely piloted or autonomous aircraft that can be used for a wide range of military and civilian applications, including reconnaissance, surveillance, and strike missions.
  • Unmanned Aerial Systems (UAS): Remotely piloted or autonomous aircraft, often used for reconnaissance, surveillance, and strike missions, as well as for logistics and other support operations.
  • Unmanned Aerial Vehicle (UAV) Defense: Defense against enemy unmanned aerial vehicles, also known as drones.
  • Unmanned Aerial Vehicle (UAV): A drone used for reconnaissance, surveillance, or military operations, often equipped with cameras or weapons.
  • Unmanned Aerial Vehicle (UAV): An aircraft that is operated without a human pilot on board, including drones, unmanned reconnaissance aircraft, and unmanned combat air vehicles.
  • Unmanned Ground Systems (UGS): Autonomous or remotely controlled ground vehicles that can be used for a variety of missions, including reconnaissance, surveillance, and logistics support.
  • Urban Operations: Military operations that are conducted in urban environments, including operations to clear buildings, rooms, and other structures, as well as urban terrain.
  • Urban Operations: Military operations that are conducted in urban environments, including operations to secure buildings, clear city streets, and engage enemy forces in close-quarters combat.
  • Urban Warfare: The military operations conducted in urban environments, including the use of specialized tactics, techniques, and equipment to navigate and fight in densely populated areas.
  • Urban Warfare: Warfare fought in built-up areas, such as cities and towns, which pose unique challenges due to the close proximity of civilians and potential for collateral damage.
  • Urban Warfare: Warfare in urban environments, where the presence of civilian populations and infrastructure can pose unique challenges for military operations.
  • Urban Warfare: Warfare that is conducted in urban areas, including cities, towns, and other built-up areas.
  • Urban Warfare: Warfare that takes place in urban environments, such as cities, towns, and villages, and requires specialized tactics and equipment to operate effectively.
  • Vehicle Defense: Defense against enemy vehicles, such as tanks or armored personnel carriers.
  • Virtual Firewall: A type of firewall that is implemented in software, rather than in hardware, and that provides network security for virtualized environments, such as cloud computing and virtual private networks (VPNs).
  • Virtual Private Network (VPN): A private network that uses a public network, such as the internet, to securely transmit data.
  • Virtual Private Network (VPN): A type of private network that is constructed by using public wires to connect remote users or sites to a private network, allowing for secure communication over the Internet.
  • Vulnerability Management: The process of identifying, prioritizing, and mitigating security vulnerabilities in an organization’s systems, software, and network.
  • War Games: Simulation exercises that are used to test and evaluate military strategies and tactics, or to train military personnel in decision-making and problem-solving skills.
  • War Plan: A comprehensive plan for conducting military operations in a war or conflict.
  • War Reserve Stockpile: A collection of military equipment, supplies, and ammunition stored by a country in preparation for a possible conflict.
  • Warfare: The use of military force to achieve political or military objectives, often involving the use of weapons and tactics to engage and defeat an enemy force.
  • Warfighting: The application of military force to achieve strategic or operational objectives, including the planning and execution of military campaigns and operations.
  • Warfighting: The conduct of military operations to achieve military objectives and to defeat enemy forces.
  • Wargame: A simulated military exercise used to test military strategy and tactics.
  • Warning and Control: The process of providing warning and control to military forces in the event of an attack or other emergency, including the employment of early warning systems, command and control systems, and emergency response procedures.
  • Weapon System Effectiveness: The ability of a weapon system to achieve its intended military objectives, taking into account its operational limitations and the operational environment.
  • Weapon System Integration: The integration of multiple weapon systems to maximize their combined military effectiveness.
  • Weapon System Sustainment: The process of maintaining, repairing, and upgrading weapon systems to ensure their continued readiness and effectiveness for military operations.
  • Weapon System: A combination of weapons, equipment, and support elements, such as a tank or a fighter aircraft, that are integrated to achieve a military capability.
  • Weapon System: A combination of weapons, platforms, support equipment, and associated personnel that are integrated and employed to support military operations.
  • Weapon System: A combination of weapons, sensors, and control systems that are integrated to achieve a specific military objective, such as air defense, naval warfare, or ground combat.
  • Weapon System: A combination of weapons, sensors, and support equipment used in a military system.
  • Weapon System: A combination of weapons, sensors, and support equipment, often integrated into a single platform, used to deliver firepower and achieve military objectives.
  • Weapon Systems: A collection of weapons, vehicles, equipment, and personnel that are designed and organized to work together to achieve specific military objectives.
  • Weapon Systems: Military equipment and systems that are used to conduct military operations, including weapons, vehicles, communications, and electronic systems.
  • Weapon Systems: The military equipment and systems used to conduct operations, including weapons, vehicles, communications systems, and other equipment.
  • Weapons of Mass Destruction (WMD): A term used to describe nuclear, biological, chemical, or radiological weapons that can cause widespread death and destruction.
  • Weapons of Mass Destruction (WMD): A type of weapon that has the potential to cause widespread destruction and loss of life, such as nuclear, chemical, or biological weapons.
  • Weapons of Mass Destruction (WMD): Nuclear, biological, and chemical weapons, as well as related delivery systems, that are capable of causing mass casualties and widespread damage, and are often considered a threat to national and international security.
  • Weapons of Mass Destruction (WMD): Weapons that have the potential to cause significant destruction, including nuclear, chemical, and biological weapons.
  • White Hat Hacker: A type of hacker who is authorized to penetrate computer systems and networks in order to test their security and identify vulnerabilities, with the goal of improving security.
  • Zero Trust: A security model that assumes that all network traffic, both internal and external, is potentially malicious, and that all network access must be validated before being granted.
  • Zero-Day Exploit: A security vulnerability that is unknown to the software vendor and is exploited by attackers before a patch can be released.
  • Zero-Day Exploit: A type of cyber attack that exploits a previously unknown security vulnerability, often leading to widespread harm, before the vulnerability is discovered and patched.
  • Zonal Defense: A type of defense where each defender is assigned a specific area of the field to defend, as opposed to man-to-man marking.
  • Zonal Defense: A type of defensive strategy in which a military unit defends a specific area or zone.
  • Zone Coverage: A defensive alignment where defenders are responsible for covering a specific area of the field, as opposed to covering a specific offensive player.
  • Zone Defense: A defensive strategy where each defender is responsible for guarding a specific area of the field, rather than a specific player. This type of defense is often used to prevent the offense from moving the ball into certain areas of the field or to force the offense to take a specific type of shot.
  • Zone of Responsibility: A designated area within a theater of operations for which a commander is responsible for the defense, security, and control of military operations.
  • Zone of Responsibility: The area or sector assigned to a military unit for the purpose of carrying out operations.
  • Zone Pressure: A defensive tactic where multiple defenders converge on a specific area of the field to disrupt the offensive team’s attack.