Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Glossary

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z  |  Symbols
c
C&A
C(ie)
C(ie,js)
C, C0, C1
C.F.D.
C.F.R.
CA
CA Facility
CAC
CAIDA
CAK
Call Back
Call Detail Record
Call Processor
Candidate Checklist
Canister (COMSEC; C.F.D.)
CAP
Capability Maturity Model Integration
Capacity
CAPCO
CAPEC
Capital Planning And Investment Control
Capital Planning Investment Control
Capital Programming
CAPP
CAPTCHA
Capture
Card
Card Application
Card Authentication Key
Card Capability Container
Card Holder Unique Identifier
Card Management
Card Management System
Card Management System To The Card
Card Verifiable Certificate
Cardholder
Cardholder To Card
Cardholder To External System
Cardholder Unique Identifier
Cardiopulmonary Resuscitation
Care Of Address
Care-Of Address
CARL
Carrier-Grade NAT
Cascading (Cross Domain)
Categorization
Category (C.F.D.)
CAVP
CAW
CBC
CBC-MAC
CBEFF
CBSR
CC
CCB
CCC
CCE
CCEP
CCEVS
CCI
CCIPS
CCM
CCMP
CCRB
CCSS
ccTLD
CD
CD File System
CDF
CDFS
CDH
CDMA
CDMA Subscriber Identity Module
CDR
CD-R
CD-Read Only Memory
CD-Rewritable
CD-ROM
CD-RW
CDS
CDS Filtering
CE
Cellular Network Isolation Card
Cellular Telecommunications And Internet Association
Center For Education And Research In Information Assurance And Security
Center For Internet Security
Center For Magnetic Recording Research
Centers For Medicare And Medicaid Services
Centimeter
Central Facility
Central Limit Theorem
Central Management
Central Office Of Record
Central Oversight Authority
Central Processing Unit
Central Service Node
Central Services Node
Centre For The Protection Of National Infrastructure
CEO
CERIAS
CERT
CERT® Coordination Center
CERT®/CC
Certificate
Certificate Authority
Certificate Authority Workstation
Certificate Holder
Certificate Management
Certificate Management Authority
Certificate Management System
Certificate Policy
Certificate- Related Information
Certificate Revocation List
Certificate Status Authority
Certificate Status Server
Certificate User
Certificatecertification Authority
Certificate-Related Information
Certificates
Certificate-Using System
Certification
Certification Agent
Certification Anaylist
Certification And Accreditation
Certification Authority
Certification Authority Revocation List
Certification Authority Software
Certification Authority Workstation (C.F.D.)
Certification Package (C.F.D.)
Certification Path
Certification Practice Statement
Certification Practices Statement
Certification Test And Evaluation
Certification, Accreditation, And Security Assessments (NIST SP 800-53 security control family)
Certified Tempest Technical Authority
Certifier (C.F.D.)
Certify
CF
CFB
CFD
CFI
CFO
CFR
CFRDC
CFTT
CGA
CGE
CGI
CGN
Chain Of Custody
Chain Of Evidence (C.F.D.)
Chain Of Trust
Chained Secure Zone
Chaining
Chain-Of-Trust
Challenge And Reply Authentication
Challenge Handshake Authentication Protocol
Challenge-Handshake Authentication Protocol
Challenge-Response Protocol
Change Control Board
Channel Binding
Channel Scanning
CHAP
Check Word
Checking Disabled
Checksum
Chemical Industry Data Exchange
Chief Executive Officer
Chief Financial Officer
Chief Information Officer
Chief Information Security Officer
Chief Operating Officer
Chief Privacy Officer
Chief Security Officer
Chief Technology Officer
Children‘S Online Privacy Protection Act
Chinese Remainder Theorem
Choreography
CHUID
CHVP
CI
CIAC
CIDR
CIDX
CIFS
CIGRE
CIK
CIMA
CIO
CIP
Cipher
Cipher Block Chaining
Cipher Block Chaining Message Authentication Code
Cipher Block Chaining-Message Authentication Code
Cipher Feedback
Cipher Key
Cipher Text Auto-Key
Cipher Text/Ciphertext
Cipher-based MAC
Cipher-Based Message Authentication Code
Ciphersuite
Ciphersuite Negotiation
Ciphertext
CIPSEA
CIRC
CIRT
CIS
Cisco Global Exploiter
CISO
CKG
CKL
CKMS
CKMS
CKMS (Component)
CKMS (Device)
CKMS design
CKMS designer
CKMS developer
CKMS implementer
CKMS Module
CKMS product
CKMS Profile
CKMS Security Policy
CKMS vendor
Claimant
Claimed Address
Claimed Signatory
Classified Information
Classified Information Spillage (C.F.D.)
Classified National Security Information
Classless Interdomain Routing
Classless Inter-Domain Routing
Clean Word List
Clear
Clear Text
Clearance
Cleartext
CLI
Client
Client (or PKI client)
Client (application)
Client Application
Client Device
Client Node
Client/Server
Clinger-Cohen Act Of 1996
Cloned Tag
Closed Security Environment
Closed Source Operating System
Closed Storage
Closed System
Closeout
Cloud Computing
Cloud Consumer
Cloud Infrastructure
Cloud Provider
CLR
Cluster
cm
CMA
CMAC
CMCS
CMDAUTH
CMDB
CMMI
CMOS
CMRR
CMS
CMTC
CMVP
CN
CNA
CND
CNE
CNIC
CNO
CNSS
CNSSI
CO
CoA
Coalition Partner
Code
Code Analysis
Code Division Multiple Access
Code Group (C.F.D.)
Code Of Federal Regulations
Code Vocabulary (C.F.D.)
Codebook
Codec
Cofactor
Cofactor Diffie-Hellman
COG
Cognizant Security Officer/Authority
COI
Cold Site
Collateral Information
Collection
Collision
Collision Resistance
Column
COM
Comma Separated Values
Command And Control
Command Authority (COMSEC)
Command Line Interface
Command-Line Interface
commercial COMSEC evaluation program
Commercial Off-The-Shelf
Commercial Solutions For Classified
Commercial-Off-The-Shelf
Committee For National Security Systems
Committee On National Security Systems
Committee On National Security Systems Instruction
Commodity Service
Common Access Card
Common Attack Pattern Enumeration & Classification
Common Attack Pattern Enumeration And Classification
Common Biometric Exchange Formats Framework
Common Carrier
Common Configuration Enumeration
Common Configuration Enumeration 5
Common Configuration Scoring System
Common Control
Common Control Provider
Common Criteria
Common Criteria Evaluation And Validation Scheme
Common Criteria Evaluation Assurance Level
Common Fill Device
Common Gateway Interface
Common Internet File System
Common Language Runtime
Common Object Request Broker Architecture
Common Platform Enumeration
Common Platform Enumeration 2.2
Common Secure Configuration
Common Security Control
Common Services Provider
Common User Application Software
Common Vulnerabilities And Exposures
Common Vulnerabilities Scoring System
Common Vulnerability Enumeration
Common Vulnerability Scoring System
Common Vulnerability Scoring System 2.0
Common Weakness Enumeration
Common Weakness Scoring System
communication channel
Communications Cover
Communications Deception (C.F.D.)
Communications Profile
Communications Router
Communications Security
Communications Security Establishment
Communications Security Establishment Of The Government Of Canada
Community Cloud
Community Of Interest
Community Risk
Compact Disc
Compact Disc Read Only Memory
Compact Disc Read/Write
Compact Disc Recordable
Compact Disk
Compact Flash
Comparison
Compartmentalization
Compatible Security Domains
Compensating Security Control
Compensating Security Controls
Competent Security Official
Complementary Error Function
Complementary Metal Oxide Semiconductor
Completely Automated Public Turing Test To Tell Computers And Humans Apart
Compliance
Compliant CKMS
Component
Component Object Model
Component Schema
Component Specification
Component Test
Componentkey Component
Composed Commercial Solution
Compound Key
Comprehensive Test
Comprehensive Testing
Compressed File
Compression Parameter Index
Compromise
Compromise (Automated Information Systems)
Compromise (General)
Compromise
Compromise (noun)
Compromise (verb)
Compromise Recovery
Compromised Key List
Compromised State
Compromising Emanations
COMPUSEC
Computer
Computer Abuse
Computer And Financial Investigations
Computer Crime And Intellectual Property Section
Computer Cryptography
Computer Emergency Readiness Team
Computer Forensics
Computer Forensics Research And Development Center
Computer Forensics Tool Testing
Computer Incident Advisory Capability
Computer Incident Response Capability
Computer Incident Response Center
Computer Incident Response Center or Computer Incident Response Capability
Computer Incident Response Team
Computer Information Security Officer
Computer Matching Agreement
Computer Network Attack
Computer Network Defense
Computer Network Exploitation
Computer Network Operations
Computer Processing Unit
Computer Security
Computer Security (C.F.D.)
Computer Security Division
Computer Security Incident (C.F.D.)
Computer Security Incident Response Capability
Computer Security Incident Response Team
Computer Security Log Management
Computer Security Object (C.F.D.)
Computer Security Objects Register (C.F.D.)
Computer Security Objects Register
Computer Security Objects Registry
Computer Security Policy
Computer Security Resource Center
Computer Security Subsystem (C.F.D.)
Computerized Telephone System
Computing Environment
Computing Security Methods
COMSEC
Comsec Account
Comsec Account Audit
Comsec Account Manager
Comsec Aids
Comsec Assembly (C.F.D.)
Comsec Boundary (C.F.D.)
Comsec Chip Set (C.F.D.)
Comsec Control Program (C.F.D.)
Comsec Custodian (C.F.D.)
Comsec Demilitarization (C.F.D.)
Comsec Element (C.F.D.)
Comsec Emergency
Comsec End-Item
Comsec Equipment
Comsec Facility
Comsec Incident
Comsec Incident Monitoring Activity
Comsec Insecurity
Comsec Manager
Comsec Material
Comsec Material Control System
Comsec Module (C.F.D.)
Comsec Monitoring
Comsec Profile (C.F.D.)
Comsec Service Authority
Comsec Software
Comsec Survey
Comsec System Data (C.F.D.)
Comsec Training
CONAUTH
Concept Of Operation
Concept Of Operations
Condition Coverage
Confidential Information Protection And Statistical Efficiency Act
Confidentiality
Confidentiality
Confidentiality Mode
Configurable
Configuration
Configuration (of a system or device)
Configuration Baseline
Configuration Control
Configuration Control Board
Configuration Control Review Board
Configuration Controlor Configuration Management
Configuration Item
Configuration Management
Configuration Management (NIST SP 800-53 security control family)
Configuration Management Database
Configuration Management Plan
Configuration Settings
Configured Tunnels
Conformance Testing
Connection Signature Resolving Key
CONOP
CONOPS
Consent Banner
Console
Consortia
Consumer
Consumer Device
Consuming Application
Contagion Research Center (fictional)
Container
Contamination
Content Consumer
Content Filtering
Content Generator
Content Producer
Content Signing Certificate
Context Handler
Context Of Use
Contingency Key
Contingency Plan
Contingency Planning
Contingency Planning (NIST SP 800-53 security control family)
Continuity Of Government
Continuity Of Operations
Continuity Of Operations Plan
Continuous Assessment (process)
Continuous Monitoring
Continuous Process
Contract
Contract Administration
Contract Administration Office
Contracting Office
Contracting Officer
Contracting Officer’S Technical Representative
Contracting Officer'S Technical Representative
Control
Control Algorithm
Control Cell
Control Center
Control Correlation Identifier
Control Frame
Control Gate
Control Information
Control Loop
Control Network
Control Server
Control System
Control System Security Center
Controlled Access Area
Controlled Access Program Coordination Office
Controlled Access Protection (C.F.D.)
Controlled Access Protection Profile
Controlled Area
Controlled Cryptographic Item
controlled cryptographic item (CCI) assembly
controlled cryptographic item (CCI) component
controlled cryptographic item (CCI) equipment
Controlled Interface
Controlled Space
Controlled Unclassified Information
controlled unclassified information (CUI) registry
Controlled Variable
Controller
Controlling Authority
Controlling Domain
Conventional BIOS
Conversation
COO
Cookie
COOP
Cooperative Association For Internet Data Analysis
Cooperative Key Generation
Cooperative Remote Rekeying Correctness Proof
Coordination
COPPA
Copy (data)
COR
CORBA
Core Root Of Trust For Measurement
Corrective Action Plan
Correlation
Correspondent Node
Cost
Cost, Benefit, Schedule, And Risk
COTR
COTS
COTS product
Counter
Counter Mode
Counter Mode For A Block Cipher Algorithm
Counter Mode with Cipher Block Chaining Message Authentication Code
Counter Mode with Cipher Block Chaining Message Authentication Protocol
Counter with Cipher Block Chaining-Message Authentication Code
Counterfeit (Goods)
Counterintelligence
Countermeasure
Countermeasures
Counter-Mode/CBC-MAC Protocol
Country-Code Top-Level Domain
Courier
Course Of Action
Course Of Action (risk response)
Court Services And Offender Supervision Agency
Cover
Coverage
Coverage Measurement Tool
Cover-Coding
Covered Entities
Covert Channel
Covert Channel Analysis
Covert Storage Channel
Covert Testing
Covert Timing Channel
CoverTRANSEC
CP
CPE
CPI
CPIC
CPNI
CPO
CPR
CPS
CPU
Cradle
CRC
Credential
Credential Service Provider
Critical Component
Critical Infrastructure
Critical Infrastructure Protection
Critical Infrastructure Sectors
Critical Security Parameter
Critical Security Parameters
Critical Value
Criticality
Criticality Analysis
Criticality Level
CRL
Crl Distribution Point
CRM
Cross Certificate
Cross- Certificate
Cross Certification
Cross Domain
Cross Domain Baseline List
Cross Domain Capabilities
Cross Domain Enabled
Cross Domain Portal
Cross Domain Service
Cross Domain Solution
Cross Domain Solutioncds Filtering
Cross Domain Sunset List
Cross Site Request Forgery
Cross Site Scripting
Cross-Certificate
CRT
CRTM
Cryptanalysis
Cryptanalyze
CRYPTO
Crypto Officer
crypto-algorithm
crypto-ancillary equipment
cryptoequipment
Cryptographic
Cryptographic (Binding)
Cryptographic (Key)
Cryptographic (Module)
Cryptographic Alarm
Cryptographic Algorithm
Cryptographic Algorithm
Cryptographic Algorithm Validation Program
Cryptographic Ancillary Equipment
Cryptographic Binding
Cryptographic Boundary
Cryptographic Boundary
Cryptographic Component
Cryptographic Equipment
Cryptographic Erase
Cryptographic Hash Function
Cryptographic High Value Product
Cryptographic Ignition Key
Cryptographic Incident
Cryptographic Initialization
Cryptographic Key
Cryptographic key component
Cryptographic Key Management System
Cryptographic Key Management System(s)
Cryptographic Keykey
Cryptographic Logic
Cryptographic Material
Cryptographic Message Syntax
Cryptographic Module
Cryptographic Module
Cryptographic Module (compromised)
Cryptographic Module Boundary
Cryptographic Module Security Policy
Cryptographic Module Validation Program
Cryptographic Net
Cryptographic Officer
Cryptographic Operation
Cryptographic Period
Cryptographic Product
Cryptographic Randomization
Cryptographic Security
Cryptographic Service Provider
Cryptographic Solution
Cryptographic Synchronization
Cryptographic System
Cryptographic System Analysis
Cryptographic System Evaluation
Cryptographic System Review
Cryptographic System Survey
Cryptographic Token
Cryptographically Generated Address
Cryptography
Cryptologic
Cryptology
Cryptomaterial
cryptonet
Cryptonet Evaluation Report
Cryptoperiod
cryptosecurity
cryptosystem
CS
CSA
CSD
CSE
CSfC
CSIM
CSIR
CSIRC
CSIRT
CSN
CSO
CSOR
CSOSA
CSP
CSRC
CSRF
CSRK
CSS
CSSC
CSV
CT&E
CTAK
CTC
CTE
CTI
CTIA
CTK
CTO
CTR
CTS
CTTA
CUAS
CUI
CUI categories or subcategories
CUI Executive Agent
CUI program
CUI registry
Cumulative Distribution Function F(X)
Current Year
Custom Environment
Customer
Customer Relationship Management
Customization
Cut
CVC
CVE
CVSS
CWE
CWSS
CY
Cyber Attack
Cyber Incident
Cyber Incident Response Team
Cyber Red Team
Cyber Security
Cybersecurity
Cyberspace
Cyberspace Attack
Cyberspace Capability
Cyberspace Defense
Cyberspace Operations
Cyberspace Superiority
Cycle Time
Cyclic Redundancy Check
Cyclical Redundancy Check