AWS Amazon Web Services Network Partner: Pioneering Network-Centric AI-ML-Quant-Cyber-Crypto-Quantum Cloud Computing AIMLExchange: We Create the Digital Future™: Beyond Artificial Intelligent Systems: Self-Adaptive Complex Systems Pioneer  BRINT: From Future of Finance™ to Future of FinTech™  C4I-Cyber: Beyond AI C4I-Cyber and Quantum Supremacy: Adversarial and Counter-Adversarial C4I-Cyber-Crypto Command and Control Premium Domains For Sale: FundRaiser

We Create the Digital Future™...And You Can Too. It's As Easy as A, B, C. Come. Join Us. Build the Future.
AWS Amazon Web Services  MIT Computer Science & AI Lab  Princeton University  Goldman Sachs  JP Morgan Asset Management

Silicon Valley-Wall Street-Pentagon-Global Digital Pioneer: Below: Historical Archive: World's Top Digital Site.
IT Security and Information Assurance Glossary of 4,000 Terms: A, B, C, D, E, F, G, H, I, J, K, L, M, N, O, P, Q, R, S, T, U, V, W, X, Y, Z
*
@brint.com
Interactive Research Portals-Glossary of 4,000 IT Security, Information Assurance, Controls, Compliance Terms: C
"Best web site for keeping up with hi-tech industry developments..." - InfoWorld
*

Research Analyst Wizard: Click on a term to create most-updated research microsite on that topic.


C
C2: Class C2 · CA · CA certificate · CA hierarchy · CA ACF2 · CA ACF2: Computer Associates Access Control Facility · CA: Certification Authority · cable modem · Cache · cache cramming · cache poisoning · Cadbury · Cain & Abel · CALEA: Communications Assistance for Law Enforcement Act · California Security Breach Information Act · Call Back · Call Data Record · Callback · caller ID spoofing · CAN SPAM: Controlling the Assault of Non Solicited Pornography and Marketing Act · Canister · Canonicalization error · CAP: Certification and Accreditation Professional · Capability · Capability Maturity Model (CMM) · Capacity Planning · Capacity Stress Testing · CAPI: Crypto API · CAPICOM · Capital Expenditure · Capital Expense · captive portal · capture · Card Swipes · carding · Carnivore · CARO (Computer Anti Virus Research Organization) · CAS: Code access security · Cascading · CAST · Category · Cathode Ray Tube (CRT) · CBAC: Context based Access Control · CBC · CBC: Cipher Block Chaining · CCA: Common Cryptographic Architecture · CCI Assembly · CCI Component · CCI Equipment · CCITS: Canadian Centre for Information Technology Security · CCM: Counter mode with Cipher block chaining Message authentication code · CCMP: Counter mode with Cipher block chaining Message authentication code Protcol · CCSP · CCTV · CD · CD ROM · cDc: Cult of the Dead Cow · CDMA Division Multiple Access · CDROM · Cell Global Identity · cell phone spam · Cellular Message Encryption Algorithm · Central Equipment Identity Register · Central Office Of Record · Central Processing Unit (CPU) · Centralized Data Processing · Centre for the Protection of National Infrastructure · CER: Crossover Error Rate · CERIAS: Center for Education and Research in Information Assurance and Security · CERT · CERT: Computer Emergency Response Team · Certificate · certificate authority · Certificate Authority (CA) · Certificate BLOB · Certificate Management · Certificate policy · Certificate request · Certificate Revocation List (CRL) · Certificate server · Certificate Service · Certificate store · Certificate store functions · Certificate template · Certificate Based Authentication · certification · Certification and Accreditation Process · Certification Authority · Certification Authority Workstation · Certification Package · Certification Practice Statement (CPS) · Certification Request Syntax Standard · Certification Test And Evaluation · Certified Information Systems Security Professional · Certifier · CET: Cisco Encryption Technology · CFB · CFB: Ciphertext Feedback · cgi bin · CGI: Common Gateway Interface · chaffing · chaffing and winnowing · Chain of Custody · Chaining mode · Challenge · Challenge And Reply Authentication · Challenge response authentication · Challenge Token · Challenge Response · challenge response authentication mechanism · Change Control · Change Management · Channel Service Unit/Digital Service Unit (CSU/DSU) · CHAP: Challenge Handshake Authentication Protocol · Chargeback · Chat Room · Check Digit · Check Digit Verification (Self checking Digit) · Check Word · Checklist · Checkpoint Restart Procedures · Checksum · Chernobyl virus · Chief Executive Officer (CEO) · Chief Financial Officer (CFO) · Chief Information Officer (CIO) · Chief Technology Officer (CTO) · Chinese Wall Model · Chip and PIN · Chosen Ciphertext Attack · Chosen Plaintext Attack · Chroot jail · CIAC: Computer Incident Advisory Capability · cipher · cipher block chaining · Cipher Feedback · Cipher Key Sequence Number · Cipher mode · Cipher Text · Cipher Text Auto Key · Ciphering Algorithm · Ciphering Key · Ciphering Key Generating Algorithm · ciphertext · ciphertext feedback · Ciphertext Only Attack · Ciphony · Circuit Level Firewall · Circuit Level Gateway · Circuit Switched Network · Circular Routing · CIS: Center for Internet Security · CISA: Certificate Information Systems Auditor · CISC · Cisco Certified Security Professional (CCSP) · Cisco Information Security Specialist (CISS) · CISO: Chief Information Security Officer · CISP PCI · CISP: Cardholder Information Security Program · CISSP: Certified Information System Security Professional · CITU: Central Information Technology Unit · Clark Wilson Model · Class C2 · Classic virus · Classified Information · Classified Information Spillage · Clear Desk Policy · Clear Screen Policy · Clearance · Clearing · Cleartext · Clerical Systems · CLI (Command Line Interface) · clickjacking · Client · Client certificate · Client server · Clipper · Clipper Chip · cloak of invisibility · Clogging attack · Closed Security Environment · Closed User Group · Cloud Cover · Cluster Controller · CMA · CMAC: Cipher based Message Authentication Code · CMYK · CNSSI 4009 Terms · Coaxial Cable · COBIT · COCO · cocooning · Code · Code Book · Code Group · Code of Connection (CoCo) · Code Red · Code signing · Code Vocabulary · Codeaccesspermissions · CODEC · Coevolving · Coherence · Cohesion · cold site · Cold Start · Collaborative Computing · Collision · Combined Code on Corporate Governance · Command Authority · command injection · Command line · Command Line Prompt · Command Prompt · Commercial COMSEC Evaluation Program · Commission · Common Criteria · Common Criteria & Methodology for Information Technology Security Evaluation · Common Fill Device · Common Gateway Interface CGI · Common Weakness Enumeration · Communication Processor · Communications Controller · Communications Cover · Communications Deception · Communications Equipment · Communications Line · Communications Network · Communications Profile · Communications Security · Community Risk · Community Strings · Companion virus · Comparison Program · Compartmentalization · Compartmented Mode · Compensating Control · Competencies · Competitive Intelligence · Compiler · Completely Connected (Mesh) Configuration · Completeness Check · Complex dictionary checking · Compliance Testing · Component · Compound threat · Comprehensive Audit · Compressed file · Compression · Compressors · Compromise · Compromised system · Compromising Emanations · Computationally Greedy · Computer Abuse · computer barnacle · Computer Cryptography · Computer Emergency Response Team (CERT) · Computer forensics · Computer Fraud · Computer Misuse Act 1990 · Computer Security · Computer Security Incident · Computer Security Subsystem · Computer Sequence Checking · Computer Server · Computer System · Computer virus · Computer Viruses · Computer worm · Computer Aided Software Engineering (CASE) · Computer Assisted Audit Technique (CAAT) · Computer based Discovery · Computing Environment · COMSEC Account · COMSEC Account Audit · COMSEC Aid · COMSEC Assembly · COMSEC Boundary · COMSEC Chip Set · COMSEC Control Program · COMSEC Custodian · COMSEC Demilitarization · COMSEC Element · COMSEC End Item · COMSEC Equipment · COMSEC Facility · COMSEC Incident · COMSEC Insecurity · COMSEC Manager · COMSEC Material · COMSEC Material Control System · COMSEC Modification · COMSEC Module · COMSEC Monitoring · COMSEC Profile · COMSEC Survey · COMSEC System Data · COMSEC Training · Concept Of Operations · Concurrency Control · Concurrent Access · Conficker · confidentiality · Confidentiality agreement · Confidentiality Integrity and Availability · Configuration Control · Configuration Item (CI) · Configuration Management · Confinement Channel · Connection Hijacking · Consensus baseline security settings · Console · Console Log · Consulted · Consumables · Consumer Data Privacy · consumer privacy · Contamination · Content Discovery · Content Filtering · Content of Communication · Content Protection for Removable Media · Content Security · Contention · Context · Contingency Arrangements · Contingency Key · Contingency Plan · Contingency Planning · Continuity · Continuity of Operations Plan · Continuous Auditing Approach · Continuous Availability · Continuous Improvement · Control Center · Control Framework · Control Group · Control Objective · Control Objectives for Enterprise Governance · Control Objectives for Information and Related Technology · Control Perimeter · Control Practice · Control Risk · Control Risk Self Assessment · Control Section · Control Total · Control Weakness · Controlled Access Area · Controlled Access Protection · Controlled Cryptographic Item · Controlled Interface · Controlled Space · Controlling Authority · Controls · Cookie · cookie poisoning · Cooperative Key Generation · Cooperative Remote Rekeying · COPPA: Children's Online Privacy Protection Act · Copy Protection · Copyright · corporate area network (CAN) · Corporate Exchange Rate · Corporate Governance · Corporate Security Officer (CSO) · Corrective Controls · Correctness Proof · Corrupt Data · Corruption · COSO · COTS Software · Countermeasure · Countersignature · Coupling · Coverage · Covert Channel · Covert Channel Analysis · Covert Channels · Covert Storage Channel · Covert Timing Channel · CPRM · CPRM: Content Protection for Removable Media · CPS: Certification Practice Statement · Crack · cracker · cracking · CRAM · CRAM: Challenge Response Authentication Mechanism · CRAMM: CCTA Risk Analysis and Management Method · Crash · Crawler · CRC: Cyclic Redundancy Check · Credentialed Analysis · Credentials · crimeware · Crippled · Crippleware · Criteria · Critical Functions · Critical Infrastructure · Critical Infrastructures · Critical Success Factors (CSFs) · Criticality Analysis · CRL · CRL: Certificate Revocation List · Cron · Cross Domain Solution · Cross Certification · Cross realm authentication · CRT · Cryptanalysis · CRYPTO · Crypto Alarm · Crypto Algorithm · Crypto Ancillary Equipment · Crypto Equipment · Crypto Ignition Key · Cryptographic · Cryptographic Algorithm · cryptographic checksum · Cryptographic Component · Cryptographic Coprocessor · Cryptographic hash function · Cryptographic Initialization · Cryptographic key · Cryptographic Logic · Cryptographic Message Syntax Standard · Cryptographic Token Interface Standard · cryptography · cryptology · Cryptonet · cryptoperiod · Cryptosecurity · Cryptosynchronization · Cryptosystem · Cryptosystem Analysis · Cryptosystem Evaluation · Cryptosystem Review · Cryptosystem Survey · Cryptosystem: Cryptographic System · CSD: Computer Security Division · CSI: Computer Security Institute · CSIRT: computer security incident response team · CSO · CSO: Chief Security Officer · CSP family · CSP name · CSP type · CSP: Cryptographic service provider · CSR: Certificate Signing Request · CSS spam · CSS: Content Scrambling System · CSS: Cross Site Scripting (or XSS cross site malicious content) · CTCI (Computer to computer interface) · CTCPEC: Canadian Trusted Computer Product Evaluation Criteria · CTL: Certificate trust list · Customer Care and Billing System · Customer Data Privacy · customer privacy · Customer Relationship Management (CRM) · Customise · Customized Application for Mobile Enhanced Logic · Cutover · CVE: Common Vulnerabilities and Exposures · CWE · Cyber Attack · Cyber Storm · Cybercops · Cybercrime · cyberextortion · cyberextortionist · Cybersitter · Cyberslacker · Cyberterrorism or Cyberwarfare · Cyberwar · Cyberwoozle · cyborg insect · Cybrarian · Cyclic Redundancy Check · Cypherpunk anonymous remailer

Research Portals and Glossary of 4,000 IT Security and Information Assurance Terms
A, B, C, D, E, F, G, H, I, J, K, L, M, N, O, P, Q, R, S, T, U, V, W, X, Y, Z


Top of Page

AIMLExchange

'Your Survival Network for The Brave New World Of Business'tm

About AIMLExchange | News About AIMLExchange

Terms of Use | Privacy Notice | © Copyright 1994-2019, Global Risk Management Network, New York, USA