-
-
- Bugbear
- Bugbear is a computer virus that spread in early October, 2002,...
- Business Continuity and Disaster Recovery
- Business Continuity and Disaster Recovery (BCDR)
- business continuity management (BCM)
- Busin...
- business continuity plan
- A disaster recovery plan (DRP...
- business event management
- Business event management i...
- business process contingency plan
- A disaster ...
- bypass
- Bypass, in general, means either to go around something by an ext...
- CA
- (CA also stands for conditional access, a term used in DTV.) A certificat...
- CA-ACF2
- ACF2 (more formally, CA-ACF2; the ACF stands for Access Control...
- CAC
- A common access card (CAC) is a Unites States Department of Defense (Do...
- cache cramming
- Cache cramming is a method of tricking a computer...
- cache poisoning
- Cache poisoning, also called domain name system...
- cache poisoning (domain name system poisoning o...
- caller ID spoofing
- Caller ID spoofing is a service that allo...
- CAN
- A corporate area network (CAN) is a separate, protected portion of a co...
- captive portal
- A captive portal is a Web page that the user of a...
- capture
- Capture is the process or means of obtaining and storing extern...
- Cardholder Information Security Program - Payme...
- Cardholder Information Security Program Payment...
- carding
- Phishing is an e-mail fraud method in which the perpetrator sen...
- Carnivore
- Carnivore was an Internet surveillance system developed for...
- CBC
- Cipher block chaining (CBC) is a mode of operation for a block cipher (...
- CC
- Common Criteria (CC) is an international set of guidelines and specificat...
- CCSP
- A Cisco Certified Security Professional (CCSP) is an IT (Information ...
- CCTV
- CCTV (closed-circuit television) is a TV system in which signals are ...
- CCTV
- CCTV (closed-circuit television) is a television system in which sign...
- CCTV (closed circuit television)
- CCTV (closed-...
- CDP
- A clean desk policy (CDP) is a corporate directive that specifies how e...
- cell phone spam
- SMS spam (sometimes called cell phone spam) is ...
- Centre for the Protection of National Infrastru...
- Centre for the Protection of National Infrastru...
- CERT In
- CERT-In (the Indian Computer Emergency Response Team) is a gove...
- CERT-In
- CERT-In (the Indian Computer Emergency Response Team) is a gove...
- CERT-In (the Indian Computer Emergency Response...
- certificate authority
- (CA also stands for conditional acc...
- certificate authority (CA)
- (CA also stands for condi...
- Certificate Revocation List
- Certificate Revocation ...
- Certificate Revocation List (CRL)
- Certificate...
- certification
- In information technology as in other fields such a...
- Certified Information Systems Auditor
- The...
- Certified Information Systems Auditor (CISA)
- Certified Information Systems Security Professi...
- Certified Information Systems Security Professi...
- CESG Good Practice Guides (GPG)
- Good Practice G...
- CFB
- Ciphertext feedback (CFB) is a mode of operation for a block cipher. In...
- chaffing
- Chaffing and winnowing are dual components of a privacy-enhan...
- chaffing and winnowing
- Chaffing and winnowing are dual c...
- challenge response authentication mechanism
- challenge-response authentication mechanism
- Chernobyl virus
- The Chernobyl virus is a computer virus with a ...
- Chief Risk Officer
- The chief risk officer (CRO) is the corpo...
- Chief Risk Officer (CRO)
- The chief risk officer (CRO) ...
- Chief Security Officer
- Assuming a consistent pattern of ...
- Chip and PIN
- Chip and PIN is a UK government-backed initiative to ...
- cipher
- A cipher (pronounced SAI-fuhr) is any method of encrypting text (...
- cipher block chaining
- Cipher block chaining (CBC) is a mo...
- cipher block chaining (CBC)
- Cipher block chaining (...
- ciphertext
- Ciphertext is encrypted text.
- ciphertext feedback
- Ciphertext feedback (CFB) is a mode of ...
- ciphertext feedback (CFB)
- Ciphertext feedback (CFB) i...
- CISA
- The Certified Information Systems Auditor (CISA) is a certification i...
- Cisco Certified Security Professional
- A C...
- Cisco Certified Security Professional (CCSP)
- Cisco Information Security Specialist
- Cis...
- Cisco Information Security Specialist (CISS)
- CISP PCI
- CISP (Cardholder Information Security Program) and PCI (Payme...
- CISP-PCI
- CISP (Cardholder Information Security Program) and PCI (Payme...
- CISP-PCI (Cardholder Information Security Progr...
- CISS
- Cisco Information Security Specialist (CISS) is an entry-level certif...
- CISSP
- The Certified Information Systems Security Professional (CISSP) exa...
- Class C2
- Class C2 is a security rating established by the U.S. Nationa...
- clean desk policy
- A clean desk policy (CDP) is a corporate di...
- clean desk policy (CDP)
- A clean desk policy (CDP) is a ...
- clickjacking
- Clickjacking (also known as user-interface or UI redr...
- clickjacking (user-interface or UI redressing a...
- Clipper
- The Escrowed Encryption Standard (EES) is a standard for encryp...
- cloak of invisibility
- A cloak of invisibility is a method...
- closed circuit television
- CCTV (closed-circuit televi...
- closed circuit television
- CCTV (closed-circuit televi...
- closed circuit television (CCTV)
- CCTV (closed-...
- Cloud Security Alliance
- The Cloud Security Alliance (CS...
- Cloud Security Alliance (CSA)
- The Cloud Security ...
- cloud storage encryption
- Cloud storage encryption is t...
- CloudAudit
- CloudAudit is a specification for the presentation of inf...
- CMA
- The Computer Misuse Act 1990 (CMA) is an act of the UK Parliament passe...
- COBIT
- COBIT (Control Objectives for Information and Related Technology) i...
- COBIT (Control Objectives for Information and R...
- CoCo
- In the U.K., the Code of Connection (CoCo) is a mandatory set of requ...
- cocooning
- Cocooning is the act of insulating or hiding oneself from t...
- Code of Connection
- In the U.K., the Code of Connection (CoCo...
- Code of Connection (CoCo)
- In the U.K., the Code of Co...
- cold site
- A hot site is a commercial disaster recovery service that a...