-
-
- business continuity plan
- A disaster recovery plan (DRP...
- business process contingency plan
- A disaster ...
- bypass
- Bypass, in general, means either to go around something by an ext...
- CA
- (CA also stands for conditional access, a term used in DTV.) A certificat...
- CA-ACF2
- ACF2 (more formally, CA-ACF2; the ACF stands for Access Control...
- cache cramming
- Cache cramming is a method of tricking a computer...
- cache poisoning
- Cache poisoning, also called domain name system...
- cache poisoning (domain name system poisoning o...
- caller ID spoofing
- Caller ID spoofing is a service that allo...
- CAN
- A corporate area network (CAN) is a separate, protected portion of a co...
- capture
- Capture is the process or means of obtaining and storing extern...
- Carnivore
- Carnivore was an Internet surveillance system developed for...
- CBC
- Cipher block chaining (CBC) is a mode of operation for a block cipher (...
- CCMP
- Counter Mode with Cipher Block Chaining Message Authentication Code P...
- CCMP (Counter Mode with Cipher Block Chaining M...
- cell phone spam
- SMS spam (sometimes called cell phone spam) is ...
- CERT In
- CERT-In (the Indian Computer Emergency Response Team) is a gove...
- CERT-In
- CERT-In (the Indian Computer Emergency Response Team) is a gove...
- CERT-In (the Indian Computer Emergency Response...
- certificate authority
- (CA also stands for conditional acc...
- certificate authority (CA)
- (CA also stands for condi...
- Certificate Revocation List
- Certificate Revocation ...
- Certificate Revocation List (CRL)
- Certificate...
- certification
- In information technology as in other fields such a...
- Certified Information Systems Security Professi...
- Certified Information Systems Security Professi...
- Certified Wireless Networking Professional
- Certified Wireless Networking Professional (CWNP)
- CFAA
- The Computer Fraud and Abuse Act (CFAA) of 1986 is United States legi...
- CFB
- Ciphertext feedback (CFB) is a mode of operation for a block cipher. In...
- chaffing
- Chaffing and winnowing are dual components of a privacy-enhan...
- chaffing and winnowing
- Chaffing and winnowing are dual c...
- challenge response authentication mechanism
- challenge-response authentication mechanism
- Chernobyl virus
- The Chernobyl virus is a computer virus with a ...
- Chief Risk Officer
- The chief risk officer (CRO) is the corpo...
- Chief Risk Officer (CRO)
- The chief risk officer (CRO) ...
- cipher
- A cipher (pronounced SAI-fuhr) is any method of encrypting text (...
- cipher block chaining
- Cipher block chaining (CBC) is a mo...
- cipher block chaining (CBC)
- Cipher block chaining (...
- ciphertext
- Ciphertext is encrypted text.
- ciphertext feedback
- Ciphertext feedback (CFB) is a mode of ...
- ciphertext feedback (CFB)
- Ciphertext feedback (CFB) i...
- Cisco Information Security Specialist
- Cis...
- Cisco Information Security Specialist (CISS)
- CISS
- Cisco Information Security Specialist (CISS) is an entry-level certif...
- CISSP
- The Certified Information Systems Security Professional (CISSP) exa...
- Class C2
- Class C2 is a security rating established by the U.S. Nationa...
- clickjacking
- Clickjacking (also known as user-interface or UI redr...
- clickjacking (user-interface or UI redressing a...
- clipboard hijack attack
- A clipboard hijacking is an exp...
- Clipper
- The Escrowed Encryption Standard (EES) is a standard for encryp...
- cloud computing security
- Cloud computing security is t...
- cloud storage encryption
- Cloud storage encryption is t...
- CloudAudit
- CloudAudit is a specification for the presentation of inf...
- CloudAV
- CloudAV is a program that combines multiple antivirus applicati...
- cocooning
- Cocooning is the act of insulating or hiding oneself from t...
- cold site
- A hot site is a commercial disaster recovery service that a...
- Common Vulnerabilities and Exposures
- Commo...
- Common Vulnerabilities and Exposures (CVE)
- computer barnacle
- In a computer, a barnacle is unwanted progr...
- Computer Fraud and Abuse Act (CFAA)
- The Com...
- Computer Security Incident Response Team (CSIRT)
- Conficker
- Conficker is a fast-spreading worm that targets a vulnerabi...
- Content Protection for Removable Media
- Content Protection for Removable Media (CPRM)
- context-aware network access control
- Conte...
- cookie poisoning
- On the Web, cookie poisoning is the modificat...
- corporate area network
- A corporate area network (CAN) is...
- corporate area network (CAN)
- A corporate area netw...
- corporate cloud
- Private cloud (also called internal cloud) is a...
- Counter Mode with Cipher Block Chaining Message...
- countermeasure
- A countermeasure is an action, process, device, o...
- CPRM
- Content Protection for Removable Media (CPRM) is a hardware-based tec...
- cracker
- A cracker is someone who breaks into someone else's computer sy...
- cracking
- Brute force (also known as brute force cracking) is a trial a...
- CRAM
- CRAM (challenge-response authentication mechanism) is the two-level s...
- CRAM (challenge-response authentication mechanism)
- credential prediction
- Session prediction, also called cre...
- credential session prediction
- Session prediction,...
- credential/session prediction
- Session prediction,...
- CRL
- Certificate Revocation List (CRL) is one of two common methods when usi...
- CRO
- The chief risk officer (CRO) is the corporate executive tasked with ass...
- cryptographic checksum
- A cryptographic checksum is a mat...
- cryptography
- Cryptography is the science of information security.
- cryptology
- Cryptology is the mathematics, such as number theory, and...
- cryptoperiod
- A cryptoperiod (sometimes called a key lifetime or a ...
- cryptoperiod (key lifetime or a validity period)
- CVE
- Common Vulnerabilities and Exposures (CVE) is a list of standard terms ...
- CWNP
- Certified Wireless Networking Professional (CWNP)is the name for the ...
- cybercrime
- Cybercrime is a term for any illegal activity that uses a...
- cybersecurity
- Cybersecurity is the body of technologies, processe...
- Cybersecurity Act
- The Cybersecurity Enhancement Act of 2009 (...
- Cybersecurity Enhancement Act of 2009
- The...
- Cybersecurity Enhancement Act of 2009 (S.773)
- cyberwarfare
- Cyberwarfare is Internet-based conflict involving pol...
- daisy chain
- A daisy chain is an interconnection of computer devices...
- DAM
- Database activity monitoring (DAM) systems monitor and record activity ...
- darknet
- A darknet is a routed allocation of IP address space that is no...