Note on Terms
These terms are extracted from various dictionaries. During processing, they were stripped of characters other than alphabetic and numeric characters, underscores, hyphens, and apostrophes. The same was done for the pages to be indexed. As a result, some terms are found to occur in the documents when they in fact do not. For example, "X Windows", which is found on a page with the text "x) Windows Live Messenger".
Because these documents are intended to derive the index in a manner that can be recreated by anyone, in order to ensure the trustworthiness of the index, we do not remove or curate these entries at all.
The dictionaries used for this were:
- Oxford Dictionary of Computer Science
ebook; 2016
ISBN 978-0-19-100288-5 - DOD Dictionary of Military and Associated Terms
pdf; May 2019https://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/dictionary.pdf?ver=2019-05-29-162249-290 - The Jargon File Glossary
webpage
http://catb.org/jargon/html/go01.html - NIST Glossary of Key Information Security Terms
pdf; May 2013https://csrc.nist.gov/publications/detail/nistir/7298/rev-2/final
A
- a Certificate / a certificate
- a life!
- acceptability
- Access / access
- Access Control
- Access Control List
- Access Control Lists
- Access Control Mechanism
- Access Level
- Access List
- Access Point
- account
- Accountability
- Accreditation
- Accreditation Authority
- Accreditation Package
- Accrediting Authority
- ACK
- ACL
- ACLs
- acronym
- activation
- active duty
- active duty for training
- Activities
- activity
- ad
- address
- adequacy
- Adequate Security
- admin
- administrative control
- Administrative Safeguards
- Advanced Encryption Standard
- ADVENT
- Adversary / adversary
- Advisory
- aerial port
- aeromedical evacuation
- AFAIK
- AFK
- Agency / agency
- Agent
- Agreement
- ahead
- AI
- air
- air assault
- air defense
- air defense artillery
- air mobility
- Air Mobility Command
- air movement
- air operations center
- air refueling
- airborne
- airfield
- ALC
- Alert
- All
- All parts
- alliance
- Allocation
- all-source intelligence
- alpha
- alt
- amphibious force
- Analysis
- analysis and production
- and die
- angle
- antiterrorism
- Antivirus Software
- AOL!
- app
- Applicant
- Application / application
- Approval to Operate
- Approved
- APT
- area command
- area of interest
- area of operations
- area of responsibility
- area search
- arena
- ARF
- Armed Forces of the United States
- arming
- Army corps
- Army Service component command
- AS
- as designed
- assault
- Assessment
- Assessment Procedures
- Asset
- Asset Identification
- assign
- assumption
- Assurance
- Asymmetric
- Asymmetric Keys
- ATO
- atomic
- attach
- Attack
- audience
- Audit
- Audit Data
- Audit Log
- Audit Trail
- AUP
- Authenticate
- Authentication / authentication
- Authentication Mechanism
- Authenticator
- Authenticity
- Authority
- Authorization
- Authorizing Official
- Availability
- avenue of approach
- Awareness
- awk
B
- B5
- Back Door
- backbone
- Backdoor
- backfill
- background
- Backup
- backward
- BAD
- bandwidth
- bang
- Banner
- bar
- bare metal
- barrier
- base
- base plan
- Baseline
- Baseline Configuration
- BASIC
- batch
- baton
- battle injury
- battle management
- battle rhythm
- bazaar
- BBS
- beach
- beam
- beep
- beer
- benchmark
- beta
- BI
- BIA
- bible
- Big Room
- bigot
- bill
- Binding
- Biometric
- Biometrics / biometrics
- Bit / bit
- bits / bits
- BLACK
- black hole
- Blacklist
- Blacklisting
- blast
- blit
- BLOB
- Block
C
- CA
- cabal
- CAC
- cache
- calculator
- Call Back
- campaign
- campaign plan
- cancer
- can't happen
- Capture
- card
- Cardholder
- carrier air wing
- Cascading
- case
- case officer
- casualty
- casualty rate
- cat
- catatonic
- Category
- cathedral
- CAW
- C&C
- CCE
- CCI
- CCM
- CDA
- cdr
- CDS
- cell
- center
- center of gravity
- Central Office of Record
- Certificate
- Certification
- Certification Authority
- Certification Test and Evaluation
- chad
- chaff
- chain
- chain of command
- Chain of Custody
- Chain of Evidence
- Chairman of the Joint Chiefs of Staff instruction
- Chairman of the Joint Chiefs of Staff manual
- change detection
- changer
- channel
- char
- check / check
- chemical agent
- chemical warfare
- chicken
- Chief Information Officer
- Chief Information Security Officer
- chief of mission
- chief of staff
- Chinese
- choke
- CHOP
- Christmas
- chrome
- Church
- CI$
- CIK
- CIO
- Cipher
- circus
- civil affairs
- civil authorities
- clandestine
- Classic
- classification
- Classified Information
- Classified Information Spillage
- Classified National Security Information
- clean
- Clear
- Clear Text
- Clearance
- Clearing
- Client
- climate change
- Clinger-Cohen Act of 1996
- CLM
- clock
- clocks
- clone
- close air support
- closure
- Cloud Computing
- club
- CMCS
- CMVP
- CNA
- CND
- C|N>K
- coaster
- Code
- Code Book
- code word
- codes
- COG
- COI
- collateral damage
- collect
- collection
- collection management
- collection manager
- collection planning
- collection requirement
- co-lo
- combat assessment
- combat information
- combat power
- combatant command
- combatant commander
- combating terrorism
- combined
- COME
- command
- command and control
- command and control system
- Command Authority / command authority
- command chaplain
- command information
- command relationships
- commander’s intent
- comment
- comments
- commit
- Common Access Card
- Common Carrier
- Common Criteria
- common operational picture
- common use
- commonality
- communications intelligence
- communications network
- Communications Security
- Community of Interest
- Community Risk
- compact
- Comparison
- Compartmentalization
- Compartmented Mode
- compiler / compiler
- completeness
- compliant
- compo
- component
- compress
- Compromise / compromise
- Compromising Emanations
- Computer Forensics
- Computer Network Attack
- Computer Network Defense
- Computer Network Exploitation
- Computer Network Operations
- Computer Security
- Computing Environment
- COMSEC
- COMSEC Account
- COMSEC Custodian
- COMSEC Equipment
- COMSEC Material
- COMSEC Material Control System
- COMSEC Monitoring
- COMSEC Training
- con
- Concept of Operations / concept of operations
- concept plan
- condition
- condom
- conduits
- Confidentiality
- Configuration Control
- Configuration Control Board
- configuration management
- conflict prevention
- CONOP
- cons
- considered
- console
- Conspiracy / conspiracy
- constellation
- constraint
- consumer
- Container / container
- Contamination
- continental United States
- contingency
- contingency operation
- Contingency Plan / contingency plan
- Continuity of Government
- continuity of operations
- Continuity of Operations Plan
- contracting officer
- contracting officer’s representative
- control
- control group
- Control Information
- control point
- Controlled Access Protection
- Controlled Area
- Controlled Cryptographic Item
- controlled information
- controlled substance
- Controlled Unclassified Information
- control-S
- convoy
- Cookie / cookie / cookie
- cookie jar
- copper
- copy
- COR
- Core / core
- counterespionage
- counterinsurgency
- counterintelligence
- counterintelligence activities
- counterintelligence investigations
- counterintelligence operations
- counterintelligence support
- Countermeasure
- Countermeasures / countermeasures
- counterproliferation
- countersurveillance
- counterterrorism
- country team
- courier
- course of action
- cover
- Coverage
- CP
- CP/M
- CPU
- crack
- cracker
- cracking
- crank
- crash
- Credential
- creep
- creeping
- crisis
- crisis management
- critical information
- Critical Infrastructure
- critical infrastructure protection
- critical intelligence
- critical vulnerability
- Criticality
- CRL
- Cross-Domain Solution
- crunch
- Cryptographic
- Cryptographic Component
- Cryptographic Equipment
- Cryptographic Logic
- Cryptographic Module
- Cryptographic Module Validation Program
- Cryptographic System
- Cryptography
- Cryptology
- CSIRT
- CSO
- CSP
- CTTA
- cube
- CUI
- current force
- custody
- CVE
- Cybersecurity
- Cyberspace / cyberspace
- cycle
- cycle of
D
- damage assessment
- dancing
- Data
- Data Aggregation
- Data Asset
- Data Element / data element
- Data Encryption Standard
- Data Integrity
- Data Security
- Dave
- dd
- DDT
- DEA
- dead
- deadlock
- Death
- Death Penalty
- debarkation
- DEC
- decay
- Decipher
- decision
- decision point
- Decode
- decontamination
- Decrypt
- Decryption
- DED
- Defense Information Systems Network
- Defense-in-Depth
- defined as
- Degauss
- degaussing
- delayed entry program
- delegation of authority
- delta
- Demilitarized Zone
- demo
- demobilization
- demon
- demonstration
- Denial of Service
- Department of Defense civilian
- Department of Defense components
- Department of Defense Intelligence Information System
- Department of the Air Force
- Department of the Army
- Department of the Navy
- dependents
- deployment
- deployment planning
- depot
- Depth
- DES
- Designated Representative
- detainee
- detainee operations
- detection
- deterrence
- Dial Back
- dictionary
- die
- Digital Evidence
- Digital Forensics
- Digital Signature
- dike
- ding
- direct action
- direct fire
- direct support
- directory
- disclaimer
- Disconnection
- Discretionary Access Control
- dispersal
- dispersion
- display
- Disruption
- dissemination
- Dissociated
- Distributed Denial of Service
- distribution
- distribution system
- distro
- diversion
- DMZ
- DN
E
- EA
- EAL
- early warning
- eat
- ECP
- ECU
- ed
- Education
- effect / effect
- egg
- e-gov
- E-Government
- EKMS
- elbow
- electromagnetic spectrum
- electronic attack
- Electronic Evidence
- electronic intelligence
- Electronic Key Management System
- Electronic Signature
- electronic warfare
- elegant
- element
- elicitation
- elite
- EMACS
- embarkation
- Embedded Computer
- Embedded Cryptography
- emergency action committee
- emergency preparedness
- emission security
- EMP
- Empire
- employment
- Enclave
- Enclave Boundary
- Encode
- Encrypt
- Encryption
- Encryption Algorithm
- Encryption Certificate
- end
- end state
- end-to-end
- End-to-End Encryption
- engage
F
- facility
- factor / factor
- fall through
- False Positive
- Family
- family readiness
- fan
- FAQ
- FAR
- farm
- fascist
- faulty
- FBCA
- feasibility
- feature
- features
- Federal Agency
- Federal Bridge Certification Authority
- Federal Enterprise Architecture
- Federal Information Processing Standard
- Federal Information Security Management Act
- federal service
- feint
- fence
- field
- field artillery
- file
- File Encryption
- File Security
- file signature
- filter / filter
- financial management
- fine
- finger
- finn
- FIPS
- FIPS-Validated Cryptography
- fire support
- firefighting
- fires
- Firewall
- Firmware
- first responder
- fish
- FISMA
- fix / fix
- fixed-price contract
- flag
- flame / flame
- flat
- flat-file
- flatten
- flavor
- Flaw
- fleet
- Fleet Marine Force
- flight
- flight deck
- flood
- Flooding
- flowchart
- fluid
- flush
- FM
- FOD
- follow-up
- foo
- fool
- footprint
- for free
- fora
- force
- force health protection
- force projection
- force protection
- foreign assistance
- foreign intelligence
- foreign internal defense
- foreign military sales
- foreign national
- Forensic Copy
- Forensic Specialist
- Forensics
- fork
- Formal Access Approval
- Formal Method
- forty
G
- garbage
- gas
- Gateway
- GC
- geek / geek
- gen
- general support
- generate
- geographic coordinates
- geospatial information
- geospatial intelligence
H
- hack
- hack on
- Hacker / hacker
- hacking
- HAG
- hair
- Halloween
- ham
- hammer
- HAND / hand
- handle
- hang
- happily
- Hardening
- Hardware
- harmful
- hash
- Hash Value
- Hashing
- hat / hat
- hazard
- head
- heads down
- health care provider
- health threat
- heavy metal
- hello
- hex
- High Availability
- high seas
I
- IA
- IA Architecture
- IA Product
- IATT
- IAVA
- IBM
- ICBM
- ice
- Identification / identification
- Identifier
- Identity
- Identity Verification
- IDS
- Image
- imagery
- imagery intelligence
- IMHO
- immediate response
- Impact
- Implant
- implementation
- implied task
- improvised explosive device
- in support of
- in the extreme
- Inadvertent Disclosure
- Incident / incident
- Incident Handling
- incident management
- include
- Inculpatory Evidence
- Index
- indications
- Indicator / indicator
- Individual
- Individual Ready Reserve
- Individuals
- infant
- infinite
- inflate
- Information / information
- Information Assurance
- Information Assurance Manager
- Information Assurance Officer
- Information Assurance Vulnerability Alert
- Information Environment
- Information Management
- Information Operations / information operations
- Information Owner
- information report
- information requirements
- Information Resources
- Information Security
- Information Security Architecture
- Information Security Policy
- Information Sharing
- Information Sharing Environment
- information superiority
- Information System
- Information Systems Security
- Information Systems Security Engineer
- Information Systems Security Officer
- Information Technology
- Information Type
- Information Value
- Infrastructure
- Inheritance
- Initialize
- Initiator
- injury
- Inside
- Inside Threat
- instruments of national power
- insurgency
- integration
- Integrity
- Intellectual Property
- intelligence
- intelligence community
- intelligence discipline
- intelligence estimate
- intelligence information report
- intelligence interrogation
- intelligence operations
- intelligence process
- intelligence production
- intelligence report
- intelligence reporting
- intelligence source
- intelligence system
- interagency
- interagency coordination
- interdiction
- interesting
- Interface / interface
- Interim Approval to Operate
- Internal Network
- internal security
- international military education and training
- Internet
- Internet Protocol
- Interoperability / interoperability
- interpretation
- interrupt
- interrupts
- inter-Service support
- Interview
- Intranet
- intro
- Intrusion
- Intrusion Detection Systems
- inventory control
- inventory control point
- IO
- IP
- (IPS)
- IPsec
- IRC
- IRM
- iron
- irregular warfare
- ISA
- ISCM
- ISP
- ISSO
- Issuer
- issues
- ITS
- IV
- IV&V
J
K
L
- Label
- lag
- land forces
- landing site
- language / language
- law enforcement agency
- law of armed conflict
- law of war
- lawyer
- lead
- lead agency
- lead agent
- leaf
- leak / leak
- Least Privilege
- legal
- LER
- letterbomb
- Level of Concern
- level of detail
- Level of Protection
- leverage
- life
- life cycle
- lightweight
- like
- limitation
- limiting factor
- line
- line of demarcation
M
- MAC
- machine
- macro-
- magic
- magic number
- mailing list
- main
- main supply route
- mainframe
- maintenance
- Major Application
- Malicious Code
- Malicious Logic
- Malware / malware
- Management / management
- Management Controls
- maneuver
- manpower management
- manpower requirements
- Manual Cryptosystem
- marginal
- marginally
- Marking
- Masquerading
- mass casualty
- massage
- master
- materiel
- materiel requirements
- mating
- Matrix
- mav
- /me
- Mechanisms
- Media
- media operations center
- media pool
- medical treatment facility
- meditation
- meg
- meme
- memory
- message / message
- meta
- Methodologies
- Methodology
- Metrics
- mickey
- micro-
- Microsoft
- migrant
- military construction
- Military Department
- military engagement
- military government
- military intervention
- military occupation
- military source operations
- MIME
- mine
- mines
- minimize
- minimum force
- missile defense
- mission
- Mission Assurance Category
- mission command
- Mission Critical
- mission statement
- MLS
- Mobile Code
- mobility
- mobilization
- mod / mod
N
- NAC
- nailed
- naive
- NAK
- name
- nano-
- (NAT)
- National Capital Region
- national emergency
- National Information Assurance Partnership
- national intelligence
- national operations center
- national policy
- national preparedness
- national security
- National Security Council
- National Security Information
- national security interests
- national security strategy
- National Security System
- national stock number
- natural disaster
- nature
- naval operation
- naval special warfare
- naval special warfare group
- need to know
- Need To Know Determination
- Needs Assessment
- Need-To-Know
- nerd
- net.-
- net explosive weight
- Network
O
- O' Death
- Ob-
- Object
- objective
- obscure
- observable
- obstacle
- octal
- of X
- offensive counterintelligence operation
- office
- Officer
- Official Information
- offline
- ogg
- -oid
- Old
- on
- on core
- on hand
- on-call
- one-line
- OP
- open
- open source
- Open Storage
- open-source information
- Operating System / operating system
- operation
- operation and maintenance
- operation order
- operation plan
- operational area
- operational art
P
- padded cell
- page in
- param
- paramilitary forces
- parent
- parse
- partner nation
- @-party
- Pascal
- Password
- Password Cracking
- Password Protected
- past
- Patch / patch
- Patch Management
- path
- pathological
- Payload
- PD
- PDS
- peacekeeping
- PED
- peek
- Penetration
- Penetration Testing
- peon
- perf
- Performance Reference Model
- Perimeter
- Perl
- personal effects
- Personal Identification Number
- personal property
- personal protective equipment
- Personally Identifiable Information
- personnel
- pffft
- phase
- phase line
- PHB
- Phishing
- physical characteristics
- physical security
- Physically Isolated Network
- PIA
- Ping / ping
- pink
- pipe
- pistol
- PKI
- placement
- plague
- Plan 9
- Plan of Action and Milestones
- planning factor
- planning phase
- planning team
- plumbing
- PM
- P.O.D.
- point defense
- poke / poke
- police
- poll
- POM
- pop
- population at risk
- Port
- port of embarkation
- port security
- Portable Electronic Device
- Portal
- positive control
- positive identification
- post
- posting
- postmaster
- Potential Impact
- Precursor
- pre-position
- Press
- preventive medicine
- priesthood
- prime contract
- Principal
- principal officer
- principle
- prisoner of war
- Privacy
- Private Key
- private sector
- Privilege
- Privilege Management
- Privileged Account
- Probe
- procedures
- processing
- production requirement
- Professional
- profile
- program
- programming / programming
- proof
- PROPIN
- proprietary
- Proprietary Information
- Protected Distribution System
- protection / protection
- Protection Profile
- Protective Technologies
- Protocol
- provincial reconstruction team
- prowler
- Proxy
- Proxy Server
- pseudo
- Pseudonym
- PSN
- pubic
- public
- public affairs
- public affairs guidance
- Public Domain Software
- public information
- Public Key
- Public Key Cryptography
- Public Key Infrastructure
- punt
- puppy
- Purge
- push
- Python
Q
R
- RA
- raid
- rainbow
- random
- randomness
- Rangers
- rape
- ratio
- rationalization
- rave
- RE
- reachback
- Read
- Read Access
- readiness
- Ready Reserve
- real
- real estate
- real property
- Real World
- reality
- reasons
- reception
- Reciprocity
- recognition
- reconnaissance
- reconstitution
- Records
- Records Management
- recovery
- recovery operations
- Recovery Procedures
- recursion
- recursive
- RED
- Red Team
- redeployment
- reduction
- regional security officer
- Register / register
- Registration
- reintegrate
- reinvent
- Rekey
- relief in place
- religious
- religious discrimination
- religious support
- Remanence
- Remediation
- Remote Access
- Removable Media
- Renew
- repatriation
- reply
- Repository
- request for assistance
- request for information
- requirements management
- requiring activity
- reserve
- Reserve Component
- reset
- Residue
- Resilience
- resource management
- resources
- Responder
- Responsibility to Provide
- Responsible Individual
- restraint
- restricted area
- restricted areas
- Restricted Data
- restriction
- resupply
- retained personnel
- return
- return to base
- RFC
- RFE
S
- sacred
- safe haven
- Safeguards
- saga
- sagan
- SAIL
- sailor!
- Salt
- salvage
- Sanitization
- sanity
- SAP
- say
- Scanning
- scheme of maneuver
- SCI
- SCIF
- scratch
- scream
- screen
- screening
- screw
- SEAL team
- search / search
- search and rescue
- SECRET Internet Protocol Router Network
- Secret Key
- section
- Secure Communications
- Secure DNS
- Secure Erase
- Secure Hash Algorithm
- Secure State
- Security / security
- security assistance
- Security Authorization
- Security Banner
- security clearance
- Security Concept of Operations
- Security Controls
- security cooperation
- Security Domain
- Security Engineering
- security forces
- Security Functions
- Security Incident
- Security Inspection
- Security Markings
- Security Mechanism
- Security Objective
- Security Perimeter
- Security Plan
- Security Policy
- Security Posture
- Security Requirements
- security review
- Security Safeguards
- Security Service / security service
- Security Specification
- Security Testing
- SED
- See figure 1
- segment
- segregation
- seize
- seizures
- Selected Reserve
- semi
- sensitive
- Sensitive Compartmented Information / sensitive compartmented information
- Sensitive Compartmented Information Facility
- Sensitive Information
- Sensitivity
- September
- serial
- series
- server
- Service
- Service component command
- Service-Level Agreement
- SEX / sex
- SHA
- shareware
- sharing
- shaving
- shell
- shelter
- shielding
- shim
- Short Title
- shortfall
- show of force
- shredder
- shriek
- SIG / sig
- signals intelligence
- Signature
- silicon
- since
- single manager
- site
- site exploitation
- sitename
- situation report
- Situational Awareness
- Skimming
- slab
- slack
- slash
- sleep
- slim
- slop
- small
- smart
- Smart Card
- smiley
- smoke
- smoke and mirrors
- smoking
- snail
- snap
- snarf
- sniff
- Sniffer
- SO
- Social Engineering / social engineering
- sodium
- Software / software
- solution
- SoM
- some
- source
- Spam
- spamblock
- Special Access Program
- special forces
- special forces group
- special operations
- special operations forces
- special operations task force
- specialization
- Specification
- specified combatant command
- spell
- spider
- Spillage
- spin
- Spinning
- spl
- splash screen
- spoke
- spot / spot
- spot report
- spotting
- Spread Spectrum
- Spyware
- squadron
- squares
- SSL
- stack
- staff judge advocate
- stage
- staging
- stakeholder
- Standard
- standard operating procedure
- standardization
- State
- stoppage
- store
- storm
- stowage
- STR
- strategic direction
- strategic intelligence
- strategy
- strike
- stroke
- Subject
- subordinate command
- Subscriber
- Subsystem
- subversion
- sufficiently
- suit
- suitably
- Suite B
- Sun
- Supersession
- Supplementation
- supplies
- supply
- Supply Chain
- support
- supported unit
- supporting operations
- suppression
- surf
- surface warfare
- surveillance
- survivability
- suspect
- sustainment
- swab
- swap
- swapped out
- switch
- sync
- synchronization
- syndrome
- synthesis
- sysadmin
- System / system
- System Administrator
- System High
- System High Mode
- System Of Records
- System Owner
- System Security
- System Software
- Systems Security Officer
T
- Tactical Data
- Tactical Edge
- tactical intelligence
- tactical questioning
- tactics
- Tailoring
- Tampering
- TAN
- target
- target acquisition
- target audience
- target folder
- targeting
- task
- task force
- task order
- tasking order
- taste
- TCP/IP
- tear line
- technical analysis
- technical assistance
- technical intelligence
- Technical Reference Model
- Technical Security Controls
- techniques
- tee
- Telecommunications
- Telework
- TEMPEST
- tense
- tera-
- terminal / terminal
- terrorism
- Test
- Testament
- TeX
- text
- TFS
- thanks in advance
- That's
- the / the
- the floor
- the literature
- the network
- the wheel
- the world
- theater
- theater of operations
- theology
- theory
- Thing
- thread
- Threat
- Threat Analysis
- Threat Assessment
- threat warning
- throughput
- throwaway
- thud
- thumb
- thundering
- tick
- tiger team
- time / time
- Time Bomb
- time T
- times
- TLA
- TLS
- (TM)
- to
- to operate
- to the wall
- toad
- TOE
- together
- toggle
- Token
- tool
- toor
- TOS
- tourist
- toy
- TPC
- TPI
- track
- tracking
- tradecraft
- Traffic Analysis
- traffic management
- Training
- training and readiness oversight
- Transmission
- Transmission Security / transmission security
- Transport Layer Security
- transportation system
- trap
- Trap Door / trap door
- trash
- Triple DES
- trivial
- TRM
- Trojan horse
- Trustworthiness
- TSF
- tty / tty
- tube
- tune
- Tunneling
- turnaround
- Tux
- tweak
- twink
- Two-Person Integrity
- Type 2 Product
- Type Accreditation
U
- UBD
- UBE
- UDP
- Unauthorized Access
- unauthorized commitment
- Unauthorized Disclosure
- Unclassified
- unconventional warfare
- undefined
V
W
- weapon system
- weapons of mass destruction
- weapons technical intelligence
- Web Risk Assessment
- webmaster
- wedged
- weeds
- well-behaved
- whack
- whales
- wheel