-
-
- command injection
- Command injection is the insertion of HTML ...
- common access card
- A common access card (CAC) is a Unites St...
- common access card (CAC)
- A common access card (CAC) is...
- Common Criteria
- Common Criteria (CC) is an international set of...
- Common Criteria (CC) for Information Technology...
- Common Criteria for Information Technology Secu...
- Common Weakness Enumeration
- Common Weakness Enumera...
- Common Weakness Enumeration (CWE)
- Common Weak...
- computer barnacle
- In a computer, a barnacle is unwanted progr...
- Computer Misuse Act 1990
- The Computer Misuse Act 1990 ...
- Computer Misuse Act 1990 (CMA)
- The Computer Misu...
- Computer to computer interface
- Computer-to-compu...
- Computer-based Discovery
- Electronic discovery (also ca...
- Computer-to-computer interface
- Computer-to-compu...
- Conficker
- Conficker is a fast-spreading worm that targets a vulnerabi...
- confidentiality
- Confidentiality is a set of rules or a promise ...
- Consumer Data Privacy
- Consumer privacy, also known as cus...
- consumer privacy
- Consumer privacy, also known as customer priv...
- consumer privacy (customer privacy)
- Consume...
- consumerization policy
- A consumerization policy is a doc...
- Content Discovery
- Electronic discovery (also called e-discove...
- Content Protection for Removable Media
- Content Protection for Removable Media (CPRM)
- Content Scrambling System
- Content Scrambling System (...
- Content Scrambling System (CSS)
- Content Scrambl...
- context-aware network access control
- Conte...
- Control Objectives for Information and Related ...
- cookie poisoning
- On the Web, cookie poisoning is the modificat...
- corporate area network
- A corporate area network (CAN) is...
- corporate area network (CAN)
- A corporate area netw...
- corporate cloud
- Private cloud (also called internal cloud) is a...
- counterthreat operations team
- A counterthreat ope...
- counterthreat operations team (CTOps team)
- CPNI
- The Centre for the Protection of National Infrastructure (CPNI) is th...
- CPRM
- Content Protection for Removable Media (CPRM) is a hardware-based tec...
- cracker
- A cracker is someone who breaks into someone else's computer sy...
- cracking
- Brute force (also known as brute force cracking) is a trial a...
- CRAM
- CRAM (challenge-response authentication mechanism) is the two-level s...
- CRAM (challenge-response authentication mechanism)
- crimeware
- Crimeware is any computer program or set of programs design...
- CRL
- Certificate Revocation List (CRL) is one of two common methods when usi...
- CRO
- The chief risk officer (CRO) is the corporate executive tasked with ass...
- cryptanalysis
- Cryptanalysis refers to the study of ciphers, ciphe...
- cryptographic checksum
- A cryptographic checksum is a mat...
- cryptography
- Cryptography is the science of information security.
- cryptology
- Cryptology is the mathematics, such as number theory, and...
- cryptoperiod
- A cryptoperiod (sometimes called a key lifetime or a ...
- cryptoperiod (key lifetime or a validity period)
- CSA
- The Cloud Security Alliance (CSA) is a nonprofit organization that prom...
- CSO (Chief Security Officer)
- Assuming a consistent...
- CSS
- Content Scrambling System (CSS) is a data encryption and authentication...
- CTCI
- Computer-to-computer interface (CTCI) is a digital communications pro...
- CTCI (Computer-to-computer interface)
- Com...
- CTOps team
- A counterthreat operations team (CT Ops team) is a group ...
- Customer Data Privacy
- Consumer privacy, also known as cus...
- customer privacy
- Consumer privacy, also known as customer priv...
- CWE
- Common Weakness Enumeration (CWE) is a universal online dictionary of w...
- Cyber Storm
- Cyber Storm is the name of a simulated attack exercise ...
- cybercrime
- Cybercrime is a term for any illegal activity that uses a...
- cyberextortion
- Cyberextortion is a crime involving an attack or ...
- cyberextortionist
- Cyberextortion is a crime involving an atta...
- Cyberoam
- Cyberoam is a vendor for information security products and se...
- cybersecurity
- Cybersecurity is the body of technologies, processe...
- Cybersecurity Act
- The Cybersecurity Enhancement Act of 2009 (...
- Cybersecurity Enhancement Act of 2009
- The...
- Cybersecurity Enhancement Act of 2009 (S.773)
- cyborg insect
- The Hybrid Insect Micro-Electro-Mechanical Systems ...
- daisy chain
- A daisy chain is an interconnection of computer devices...
- DAM
- Database activity monitoring (DAM) systems monitor and record activity ...
- DAT USB drive
- A DAT USB drive is a tape drive with digital audio ...
- DAT USB tape drive
- A DAT USB drive is a tape drive with digi...
- data availability
- Data availability is a term used by some co...
- data decryption IC
- A data encryption/decryption IC is a spec...
- Data Decryption Integrated Circuits
- A data ...
- data encryption IC
- A data encryption/decryption IC is a spec...
- Data Encryption Standard
- Data Encryption Standard (DES...
- Data Encryption Standard (DES)
- Data Encryption S...
- data encryption/decryption IC
- A data encryption/d...
- data integrity
- Integrity, in terms of data and network security,...
- data key
- In cryptography, a data key is a key (a variable value that i...
- data loss prevention
- Data loss prevention (DLP) is a strat...
- data loss prevention (DLP)
- Data loss prevention (DLP...
- data masking
- Data masking is a method of creating a structurally s...
- Data Privacy
- Consumer privacy, also known as customer privacy, inv...
- data protection management
- Data protection managemen...
- data protection management (DPM)
- Data protecti...
- data recovery agent
- A data recovery agent (DRA) is a Micros...
- data recovery agent (DRA)
- A data recovery agent (DRA)...
- Data Security Council of India
- The Data Security...
- Data Security Council of India (DSCI)
- The...
- data source object exploit
- A data source object (DSO...
- data splitting
- Data splitting is an approach to protecting sensi...
- database activity monitoring
- Database activity mon...
- database activity monitoring (DAM)
- Database ...
- DCPromo (Domain Controller Promoter)
- DCPro...
- DDoS
- On the Internet, a distributed denial-of-service (DDoS) attack is one...
- DDoS attack
- On the Internet, a distributed denial-of-service (DDoS)...
- de-perimeterisation
- In network security, deperimeterization...
- de-perimeterization
- In network security, deperimeterization...
- decipher
- All three terms - decipher, decrypt, and decode - mean to con...
- decode
- All three terms - decipher, decrypt, and decode - mean to convert...
- decoding
- Encoding is the process of putting a sequence of characters (...
- decrypt
- All three terms - decipher, decrypt, and decode - mean to conve...
- decryption
- Encryption is the conversion of data into a form, called ...
- defense in depth
- Defense in depth is the coordinated use of mu...
- Defense Message System
- The Defense Message System (DMS) ...
- Defense Message System (DMS)
- The Defense Message S...