IT ENGLISH: Cybersecurity Terminology #1 (A-D)
206 Questions
2 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What does ACL stand for in the context of access control?

  • Audit Control Log
  • Access Complexity Level
  • Automatic Control Layer
  • Access Control List (correct)
  • Which of the following terms is associated with the framework for establishing standards and codes?

  • Adverse Consequence
  • Active Directory
  • Adequate Security
  • Accreditation (correct)
  • In cybersecurity, what does the term 'active attack' refer to?

  • A tactic used in penetration testing
  • A passive monitoring of traffic
  • A method of data encryption
  • An unauthorized attempt to alter system operations (correct)
  • What is the primary goal of an Access Control Policy?

    <p>To establish rules for resource access</p> Signup and view all the answers

    Which of the following best describes 'anonymization'?

    <p>Removing personal identifiers from data</p> Signup and view all the answers

    What does AAMVA stand for?

    <p>American Association of Motor Vehicle Administrators</p> Signup and view all the answers

    Which of the following is known as a cloud computing service provider?

    <p>Amazon Web Services</p> Signup and view all the answers

    What does the term 'access control mechanism' refer to?

    <p>Tools that enforce access policies</p> Signup and view all the answers

    What does AUTN stand for?

    <p>Authorization User Tracking Number</p> Signup and view all the answers

    What is meant by 'acceptable risk' in risk management?

    <p>A risk that is deemed manageable and tolerable</p> Signup and view all the answers

    What is the primary purpose of Automated Certificate Management Environment?

    <p>To manage cryptographic key certification processes</p> Signup and view all the answers

    What does the term 'abstraction' imply in computer science?

    <p>Concealing complex realities while exposing only the necessary parts</p> Signup and view all the answers

    Which term relates to processes monitoring system security automatically?

    <p>Automated Security Monitoring</p> Signup and view all the answers

    What does AWS stand for in a technical context?

    <p>Amazon Web Services</p> Signup and view all the answers

    Which of the following is related to awareness in security practices?

    <p>Awareness and Training Controls</p> Signup and view all the answers

    What does AV stand for in the context of technology?

    <p>Availability</p> Signup and view all the answers

    What term describes software designed to detect and remove viruses from a computer system?

    <p>Antivirus Software</p> Signup and view all the answers

    What issue does the term 'Availability Impact' refer to?

    <p>The potential downtimes affecting systems</p> Signup and view all the answers

    Which acronym is associated with a collaborative cybersecurity effort?

    <p>AUTO-ISAC</p> Signup and view all the answers

    Which term refers to a system designed to validate the identity of a user or device?

    <p>Authentication</p> Signup and view all the answers

    What is the purpose of an Application Firewall?

    <p>To filter and monitor HTTP requests</p> Signup and view all the answers

    What is the function of an Auxiliary Power Unit in vehicles?

    <p>To provide power for auxiliary systems</p> Signup and view all the answers

    Which of the following terms refers to systems that can operate independently?

    <p>Autonomous System</p> Signup and view all the answers

    Which process involves analyzing and assessing potential threats within a system?

    <p>Assessment Method</p> Signup and view all the answers

    What term describes a specific aspect of cryptography where a key is invalidated after use?

    <p>Nonce</p> Signup and view all the answers

    Which protocol acts as the main authority for public key management in a secure environment?

    <p>Public Key Infrastructure (PKI)</p> Signup and view all the answers

    What is the purpose of application delivery controllers?

    <p>To distribute incoming application traffic</p> Signup and view all the answers

    Which of the following describes a systematic overview of the functionalities of software?

    <p>Architectural Framework</p> Signup and view all the answers

    What mechanism protects against unauthorized access by enabling user permissions?

    <p>Authorization</p> Signup and view all the answers

    Which term refers to the practice of ensuring that information systems adhere to specific standards and regulations?

    <p>Audit Trail</p> Signup and view all the answers

    What is meant by 'adequate security' in cybersecurity contexts?

    <p>Security measures that meet industry best practices</p> Signup and view all the answers

    Which of the following represents a feature of an 'Access Control Matrix'?

    <p>A table that outlines user permissions for different resources</p> Signup and view all the answers

    What is 'adaptive security' primarily concerned with?

    <p>Adjusting security posture in response to threats</p> Signup and view all the answers

    In the context of risk management, what does 'actual residual risk' refer to?

    <p>The risk remaining after controls are applied</p> Signup and view all the answers

    What is the primary function of an 'Access Point Name' (APN) in networking?

    <p>To facilitate connection between mobile networks and the internet</p> Signup and view all the answers

    What does the term 'algorithmic optimization' generally refer to?

    <p>Improving the efficiency of an algorithm</p> Signup and view all the answers

    Which role does 'accountability' play in cybersecurity management?

    <p>Fostering a sense of responsibility for actions and outcomes</p> Signup and view all the answers

    What does 'acceptable use agreement' typically entail?

    <p>Guidelines detailing appropriate technology usage within an organization</p> Signup and view all the answers

    What is the main purpose of 'anonymized information'?

    <p>To protect the identity of individuals in datasets</p> Signup and view all the answers

    What does the term 'expected loss' imply in risk assessment?

    <p>The projected financial impact of a risk occurring over time</p> Signup and view all the answers

    What is the primary function of Application Programming Interface (API)?

    <p>To facilitate communication between different software applications</p> Signup and view all the answers

    Which of the following best defines 'asset identification' in cybersecurity?

    <p>The identification of all physical and digital assets that need protection</p> Signup and view all the answers

    What does 'asymmetric cryptography' allow in terms of encryption methods?

    <p>It employs two different keys - one public and one private.</p> Signup and view all the answers

    Which term refers to the practice of ensuring that information systems adhere to defined standards and regulations?

    <p>Audit and Accountability</p> Signup and view all the answers

    What does an Application Firewall primarily do?

    <p>It monitors and filters incoming and outgoing traffic to applications.</p> Signup and view all the answers

    What role does 'authentication' play in cybersecurity?

    <p>It verifies the identity of users or systems attempting to access resources.</p> Signup and view all the answers

    Which of the following accurately describes the concept of 'attack surface'?

    <p>It is a measure of the total potential vulnerabilities in a system.</p> Signup and view all the answers

    In the context of application security, what does 'application allowlisting' refer to?

    <p>Permitting only approved applications to run within a system.</p> Signup and view all the answers

    What is a key characteristic of 'attestation' in cybersecurity?

    <p>It verifies the integrity and authenticity of a component or system.</p> Signup and view all the answers

    What does 'authorized user' refer to in the context of information security?

    <p>A user who has received the necessary permissions to access specific resources.</p> Signup and view all the answers

    What is the function of Automated Indicator Sharing in cybersecurity?

    <p>To facilitate the exchange of cyber threat information</p> Signup and view all the answers

    Which of the following best defines the term 'Autonomous System Number (ASN)'?

    <p>A unique identifier for a network in the border gateway protocol</p> Signup and view all the answers

    What does the term 'Automated Combinatorial Testing for Software' refer to?

    <p>A testing approach that evaluates multiple combinations of inputs</p> Signup and view all the answers

    What is the primary goal of the Automated Certificate Management Environment?

    <p>To manage the lifecycle of digital certificates</p> Signup and view all the answers

    Which process is involved in ensuring data integrity through validation methods in automated settings?

    <p>Automated Cryptographic Validation Protocol</p> Signup and view all the answers

    What role does the Automotive Information Sharing and Analysis Center (Auto-ISAC) play?

    <p>It promotes information sharing about cyber threats in the automotive sector.</p> Signup and view all the answers

    What is a key aspect of Automated Security Monitoring?

    <p>It automates the process of monitoring system security.</p> Signup and view all the answers

    Which technology is applied for tracking and identifying items in automatic processes?

    <p>Automatic Identification and Data Capture</p> Signup and view all the answers

    What does the term 'Awareness, Training, and Education Controls' involve?

    <p>It encompasses strategies to inform and educate individuals about security protocols.</p> Signup and view all the answers

    Which term relates to the management of auxiliary power in vehicular systems?

    <p>Auxiliary Power Unit (APU)</p> Signup and view all the answers

    What is the purpose of backup in data management?

    <p>To protect against data loss</p> Signup and view all the answers

    Which of the following best describes black box testing?

    <p>Testing performed without knowledge of internal implementations</p> Signup and view all the answers

    What does bidirectional authentication ensure?

    <p>Both the client and server verify each other's identity</p> Signup and view all the answers

    Which protocol is primarily used for secure routing in networks?

    <p>BGP</p> Signup and view all the answers

    What is the main function of a biometric capture device?

    <p>To collect biometric data for identification</p> Signup and view all the answers

    What does the term 'blockchain technology' refer to?

    <p>A distributed ledger technology</p> Signup and view all the answers

    Which of the following describes a botnet?

    <p>A collection of compromised computers controlled by an attacker</p> Signup and view all the answers

    What role does a bastion host play in network security?

    <p>It protects an internal network from external attacks</p> Signup and view all the answers

    Which of the following is a function of a buffer overflow attack?

    <p>To gain unauthorized access to system memory</p> Signup and view all the answers

    What is the primary purpose of a business continuity plan (BCP)?

    <p>To ensure operations continue during disruptions</p> Signup and view all the answers

    What is the purpose of a bastion host in network security?

    <p>To serve as a highly secured gateway for external access.</p> Signup and view all the answers

    Which of the following best describes backdoor communication?

    <p>Unauthorized access through a hidden intermediary.</p> Signup and view all the answers

    What does the concept of baseline security refer to?

    <p>The minimum security standards for compliance.</p> Signup and view all the answers

    Which specific function does a Block Cipher Algorithm perform in cryptography?

    <p>Transforms data into a fixed-length block for security.</p> Signup and view all the answers

    How can behavioral anomaly detection enhance network security?

    <p>By identifying unusual patterns that might indicate threats.</p> Signup and view all the answers

    What does BGP stand for, and what is its primary function?

    <p>Border Gateway Protocol, which manages routing between networks.</p> Signup and view all the answers

    What does the term 'buffer overflow' refer to in cybersecurity?

    <p>An attack where excess data overruns a buffer's boundary.</p> Signup and view all the answers

    What is the primary focus of the Building Security In Maturity Model?

    <p>To enhance the capability of security throughout the software development lifecycle.</p> Signup and view all the answers

    Which type of attack is specifically classified as a blended attack?

    <p>An attack that combines physical and cyber elements.</p> Signup and view all the answers

    What does the term 'blacklisting' imply in cybersecurity?

    <p>Preventing access to specific users or groups deemed malicious.</p> Signup and view all the answers

    What is a primary purpose of the Cybersecurity Risk Management approach?

    <p>To identify and mitigate potential cybersecurity threats</p> Signup and view all the answers

    Which term best describes the organized sharing of information regarding cybersecurity threats?

    <p>Cybersecurity Risk Information Sharing Program</p> Signup and view all the answers

    What does the Cybersecurity Framework Core primarily provide?

    <p>A structured approach to improve cybersecurity posture</p> Signup and view all the answers

    In the context of supply chain security, what does Cybersecurity Supply Chain Risk Management focus on?

    <p>Evaluating cybersecurity risks throughout the supply chain</p> Signup and view all the answers

    Which component of the cybersecurity framework provides a tailored approach to managing risk?

    <p>Cybersecurity Framework Profile</p> Signup and view all the answers

    Which capability focuses on the management of hardware assets?

    <p>Capability, Hardware Asset Management</p> Signup and view all the answers

    What is the purpose of a Certificate Revocation List (CRL)?

    <p>To list certificates that are no longer valid</p> Signup and view all the answers

    Which protocol is designed for challenge-response authentication?

    <p>Challenge-Handshake Authentication Protocol</p> Signup and view all the answers

    Which term is associated with the preservation of digital evidence during investigations?

    <p>Chain of Custody</p> Signup and view all the answers

    What does CaaS stand for in the context of cloud computing?

    <p>Container as a Service</p> Signup and view all the answers

    Which capability assists in identifying vulnerabilities within a system?

    <p>Capability, Vulnerability Management</p> Signup and view all the answers

    What is the main goal of CAPTCHA?

    <p>Prevent automated abuse</p> Signup and view all the answers

    Which acronym represents a framework for systematically improving processes in an organization?

    <p>CMMI</p> Signup and view all the answers

    What is the primary focus of a Computer Security Incident Response Team (CSIRT)?

    <p>To respond to computer security incidents</p> Signup and view all the answers

    Which of the following best describes the role of the Computer Information Security Officer?

    <p>To implement and oversee information security strategies</p> Signup and view all the answers

    What does computer network exploitation (CNE) primarily involve?

    <p>Gaining unauthorized access to a computer network</p> Signup and view all the answers

    What does the acronym COMSEC stand for in the context of security?

    <p>Communications Security</p> Signup and view all the answers

    Which of the following best defines a Contingency Operations Plan (COOP)?

    <p>A plan to sustain operations during a crisis or disaster</p> Signup and view all the answers

    What is the primary purpose of Configuration Management?

    <p>To manage and control changes in systems and infrastructure</p> Signup and view all the answers

    What is the role of the Computer Security Program within an organization?

    <p>To establish and enforce security policies and practices</p> Signup and view all the answers

    What aspect of cybersecurity does 'confidentiality, integrity, availability' refer to?

    <p>The foundational principles of information security</p> Signup and view all the answers

    Which of the following best describes Continuous Monitoring as a Service?

    <p>A proactive approach to identify and manage security risks</p> Signup and view all the answers

    What is the main purpose of computer network defense (CND)?

    <p>To protect a computer network from attacks</p> Signup and view all the answers

    Which term describes a system designed to manage cryptographic keys within a storage system?

    <p>CKMS module</p> Signup and view all the answers

    What is the purpose of a 'Command Line Interface' in computing?

    <p>To enable text-based command input</p> Signup and view all the answers

    In cybersecurity, what does 'Collision resistance' refer to?

    <p>The likelihood of two distinct inputs producing the same output</p> Signup and view all the answers

    Which of the following is a common standard used to evaluate security controls?

    <p>Common Criteria Evaluation and Validation Scheme</p> Signup and view all the answers

    What does 'commercial-off-the-shelf (COTS)' refer to in technology?

    <p>Standard hardware products available for public purchase</p> Signup and view all the answers

    Which term refers to the process of converting plaintext into an unreadable format to protect its content?

    <p>Encryption</p> Signup and view all the answers

    What best describes the role of a 'Cloud Security Alliance'?

    <p>Providing guidelines for secure cloud computing</p> Signup and view all the answers

    Which of the following protocols specifically deals with communications security?

    <p>CoAP</p> Signup and view all the answers

    What is the primary focus of 'community risk' in cybersecurity?

    <p>Evaluating threats affecting specific user communities</p> Signup and view all the answers

    What does 'CISO' stand for in an organizational context?

    <p>Chief Information Security Officer</p> Signup and view all the answers

    What is the role of a Cryptographic Key Management System?

    <p>To enable the secure generation, distribution, and storage of cryptographic keys.</p> Signup and view all the answers

    Which of the following best describes cryptographic hash functions?

    <p>They create fixed-size output from variable-size input.</p> Signup and view all the answers

    What does 'Cumulative Distribution Function (CDF) F(x)' represent in a statistical context?

    <p>The integral of the probability density function up to a certain point.</p> Signup and view all the answers

    In cybersecurity, what is critical infrastructure primarily concerned with?

    <p>The protection of systems that are essential to national security, economy, and public health.</p> Signup and view all the answers

    What is the main purpose of 'cryptographic randomization'?

    <p>To enhance the security and unpredictability of cryptographic keys.</p> Signup and view all the answers

    What does the term 'cross domain solution (CDS)' refer to?

    <p>A system designed for secure communication between different security domains.</p> Signup and view all the answers

    Which of the following describes a 'covert channel' in cybersecurity?

    <p>An unmonitored communication pathway that is often used for malicious purposes.</p> Signup and view all the answers

    What does the acronym CVE stand for in the context of cybersecurity?

    <p>Common Vulnerabilities and Exposures.</p> Signup and view all the answers

    Which of the following attributes is NOT typically analyzed in criticality reviews?

    <p>Cost-effectiveness of current systems.</p> Signup and view all the answers

    What is the primary function of Credential Management Systems?

    <p>To store and manage user identities and access rights securely.</p> Signup and view all the answers

    What is primarily assessed in a cybersecurity supply chain risk assessment?

    <p>Potential cybersecurity risks throughout the supply chain</p> Signup and view all the answers

    Which act aims to enhance cybersecurity measures across various sectors?

    <p>Cybersecurity Enhancement Act of 2014</p> Signup and view all the answers

    What is the primary focus of Cybersecurity for Smart Manufacturing Systems?

    <p>Securing data and operational technologies in manufacturing</p> Signup and view all the answers

    Which term refers to the structured set of standards devised for managing cybersecurity risks?

    <p>Cybersecurity Framework Core</p> Signup and view all the answers

    What does the term 'cyberspace operations (CO)' encompass?

    <p>Both offensive and defensive activities in cyberspace</p> Signup and view all the answers

    What does CA stand for in the context of cybersecurity?

    <p>Certificate Authority</p> Signup and view all the answers

    Which term is associated with the ability to detect anomalous events?

    <p>Capability, Anomalous Event Detection Management</p> Signup and view all the answers

    Which of the following best defines a 'Certificate Revocation List'?

    <p>A list of revoked certificates that are no longer trusted</p> Signup and view all the answers

    What is the primary objective of a 'Change Control Board'?

    <p>To review and approve changes to a system</p> Signup and view all the answers

    What does CAPTCHA stand for in cybersecurity?

    <p>Completely Automated Public Turing test to tell Computers and Humans Apart</p> Signup and view all the answers

    Which capability pertains to resource planning and management?

    <p>Capacity Planning</p> Signup and view all the answers

    What is the role of a 'Chief Information Security Officer'?

    <p>To oversee and manage the organization's information security strategy</p> Signup and view all the answers

    What does 'CCTV' refer to in security contexts?

    <p>Closed-Circuit Television</p> Signup and view all the answers

    What does the acronym CKMS represent in cybersecurity?

    <p>Cryptographic Key Management System</p> Signup and view all the answers

    Which term refers to the practice of integrating security controls across various domains?

    <p>Compatible Security Domains</p> Signup and view all the answers

    What is the primary purpose of the Cloud Security Alliance?

    <p>To promote cloud computing security best practices</p> Signup and view all the answers

    What does the term 'command and control' refer to in cybersecurity?

    <p>The structure used by attackers to manage compromised systems</p> Signup and view all the answers

    Which protocol is primarily used for secure communications over a network?

    <p>Client-to-Authenticator Protocol</p> Signup and view all the answers

    What is the function of a Cloud Access Security Broker?

    <p>To enhance the security of cloud services by managing access and visibility</p> Signup and view all the answers

    The term 'classified national security information' refers to what?

    <p>Information that must be protected from unauthorized disclosure due to national security concerns</p> Signup and view all the answers

    Which of the following is true regarding Cloud Service Providers?

    <p>They are responsible for maintaining the security of user data.</p> Signup and view all the answers

    What does the term 'collaborative robotic system' refer to?

    <p>Robots that can interact and work alongside humans</p> Signup and view all the answers

    In cybersecurity, what does the acronym CJIS stand for?

    <p>Criminal Justice Information Services</p> Signup and view all the answers

    What is the primary function of a Computer Incident Response Team (CIRT)?

    <p>Respond to and manage computer security incidents</p> Signup and view all the answers

    Which of the following best describes the purpose of a Configuration Management Database?

    <p>Tracking configuration items and their relationships</p> Signup and view all the answers

    What does the term Computer Security Incident Response Capability refer to?

    <p>The ability to respond effectively to security breaches</p> Signup and view all the answers

    Which of the following indicates a threat to confidentiality in information security?

    <p>Data being readily available for public access</p> Signup and view all the answers

    Which factor is essential in Continuous Monitoring as a Service?

    <p>Automated detection and alerting of anomalies</p> Signup and view all the answers

    What is the focus of the concept of operations (CONOP)?

    <p>Definition of roles and responsibilities for system operations</p> Signup and view all the answers

    Which of the following best defines the term 'configuration baseline'?

    <p>A documented state of a system's configuration for reference</p> Signup and view all the answers

    What is the primary goal of continuity of operations plans (COOP)?

    <p>To maintain essential functions during disruptions</p> Signup and view all the answers

    In the context of cybersecurity, what does the term 'counterintelligence' involve?

    <p>Operations aimed at protecting sensitive information from espionage</p> Signup and view all the answers

    Which of the following statements accurately describes a Container Network Interface?

    <p>It allows containers to connect and communicate with one another</p> Signup and view all the answers

    What is the purpose of credential management systems?

    <p>To store and manage user credentials securely</p> Signup and view all the answers

    What does Cryptoperiod refer to in cryptographic terms?

    <p>The length of time a cryptographic key is authorized for use</p> Signup and view all the answers

    Which term refers to an unauthorized retrieval of sensitive information through timing variations?

    <p>Covert channel analysis</p> Signup and view all the answers

    What is the primary objective of Critical Infrastructure Protection?

    <p>To ensure essential services remain operational</p> Signup and view all the answers

    What does the term 'cross-domain solution' refer to?

    <p>A method of integrating different security domains to share information</p> Signup and view all the answers

    What aspect does Cryptographic validation ensure?

    <p>Correctness and compliance of cryptographic modules</p> Signup and view all the answers

    What does 'creating, reading, updating, and deleting' signify in software applications?

    <p>Basic database operations</p> Signup and view all the answers

    Which of the following best describes a 'cryptographic checksum'?

    <p>A value used to verify data integrity</p> Signup and view all the answers

    What does 'cyber resilience' focus on?

    <p>Responding efficiently to incidents while maintaining operations</p> Signup and view all the answers

    What is a fundamental feature of a Cryptographic key management system?

    <p>Managing the lifecycle of cryptographic keys</p> Signup and view all the answers

    What does the term 'data governance' primarily focus on?

    <p>Managing data integrity and usage</p> Signup and view all the answers

    What is the main function of data loss prevention?

    <p>To minimize unauthorized data sharing</p> Signup and view all the answers

    Which of the following best describes 'digital forensics'?

    <p>The methodical collection and examination of evidence from digital devices</p> Signup and view all the answers

    What does the acronym 'DDoS' stand for in cybersecurity?

    <p>Distributed Denial of Service</p> Signup and view all the answers

    What is the primary goal of a data dictionary?

    <p>To provide metadata about data elements</p> Signup and view all the answers

    What does the term 'data spillage' refer to?

    <p>The unauthorized transfer of data from a secure location</p> Signup and view all the answers

    What is 'data integrity' primarily concerned with?

    <p>The accuracy and consistency of data over its lifecycle</p> Signup and view all the answers

    What is the purpose of Digital Rights Management in the digital context?

    <p>To protect intellectual property and prevent unauthorized use</p> Signup and view all the answers

    Which of the following best defines 'data provenance'?

    <p>The origin and history of data and its changes</p> Signup and view all the answers

    Which of the following accurately describes Disaster Recovery?

    <p>A plan for restoring systems after a disruption or disaster</p> Signup and view all the answers

    What is a key component of 'data encryption'?

    <p>Concealing data to prevent unauthorized access</p> Signup and view all the answers

    What does 'deep packet inspection' involve?

    <p>Analyzing the data part of packets traveling over the network</p> Signup and view all the answers

    What does Direct Memory Access allow?

    <p>To enable peripherals to access memory without CPU intervention</p> Signup and view all the answers

    What function does Distributed Ledger Technology primarily serve?

    <p>To facilitate decentralized recording of transactions across multiple systems</p> Signup and view all the answers

    Which statement about Digital Signature Algorithm is correct?

    <p>It ensures non-repudiation and authenticity of digital messages.</p> Signup and view all the answers

    What does a disaster recovery plan (DRP) typically include?

    <p>Procedures for recovering and maintaining operation after a disaster</p> Signup and view all the answers

    What is Dynamic Host Configuration Protocol primarily used for?

    <p>To automatically assign IP addresses to devices on a network</p> Signup and view all the answers

    Which of the following best defines 'Domain Name System'?

    <p>A system for translating domain names into IP addresses</p> Signup and view all the answers

    What does Discretionary Access Control (DAC) allow users to do?

    <p>Set permissions for resources based on individual users/</p> Signup and view all the answers

    Which term describes the process of converting analog signals into a digital format?

    <p>Digitization</p> Signup and view all the answers

    Which of the following describes a method to ensure data validity and reliability?

    <p>Data provenance</p> Signup and view all the answers

    What is a primary focus of data governance?

    <p>Enhancing data accuracy</p> Signup and view all the answers

    Which term is associated with a secure method to share sensitive information?

    <p>Data Diode</p> Signup and view all the answers

    Which of the following best describes the term 'data breach'?

    <p>Unauthorized access to data</p> Signup and view all the answers

    What does the acronym DAC stand for in a data context?

    <p>Data Access Control</p> Signup and view all the answers

    Which technique is used to improve data privacy by removing personally identifiable information?

    <p>Data anonymization</p> Signup and view all the answers

    What does the term 'data lifecycle' encompass?

    <p>Creation, usage, and disposal of data</p> Signup and view all the answers

    Which of the following best describes 'data integrity'?

    <p>Accurate and consistent data over its lifecycle</p> Signup and view all the answers

    What is the purpose of a Deactivation state in data management?

    <p>To secure data from unauthorized access</p> Signup and view all the answers

    Which of the following protocols is related to managing network congestion?

    <p>Datagram Congestion Control Protocol</p> Signup and view all the answers

    What technology is used to manage digital rights for multimedia content?

    <p>Digital Rights Management</p> Signup and view all the answers

    Which term describes a method of analyzing systems to identify security weaknesses through controlled attacks?

    <p>Penetration Testing</p> Signup and view all the answers

    What does the acronym DDoS stand for, and how does it affect online services?

    <p>Distributed Denial of Service</p> Signup and view all the answers

    Which of the following best defines 'Digitization' in the context of data management?

    <p>Converting analog information into digital format</p> Signup and view all the answers

    What purpose does a Disaster Recovery Plan (DRP) serve in an organization?

    <p>To outline procedures for recovering from disruptions</p> Signup and view all the answers

    Which of the following refers to the process of ensuring only authenticated users can access certain information?

    <p>Access Control Mechanisms</p> Signup and view all the answers

    What is the primary function of a Domain Name System (DNS)?

    <p>To resolve domain names to IP addresses</p> Signup and view all the answers

    Which of the following options refers to a digital method for ensuring data integrity and authenticity through cryptography?

    <p>Digital Signature</p> Signup and view all the answers

    What does the term 'Dynamic Host Configuration Protocol' (DHCP) refer to in networking?

    <p>A protocol for automatically assigning IP addresses</p> Signup and view all the answers

    Which term describes a procedure that limits access to sensitive information based on user credentials?

    <p>Discretionary Access Control</p> Signup and view all the answers

    Study Notes

    Glossary Overview

    • This glossary contains cybersecurity and privacy terms and definitions from NIST standards, guidelines, technical publications, and CNSSI 4009.
    • Definitions are not considered official or preferred for specific industries, except for those directly cited from U.S. laws, regulations, or Presidential directives.
    • Each term-definition pair should be understood within the context of its source document.
    • Multiple definitions may exist for a term due to variations in context and publication dates.

    Access

    • Access control refers to regulating who can access specific information or resources.
    • Access Control List (ACL) is a list of access permissions granted to entities.
    • Access Control Matrix defines access permissions for every object in a system for each subject.
    • Access control mechanism uses various techniques to prevent unauthorized access.

    Data

    • Activation data is used to initialize or enable a device.
    • Authenticated Data refers to data that is protected from unauthorized access.
    • Anonymous data refers to data that cannot be linked back to a specific individual.

    Security

    • Acceptable Risk is the level of risk that an organization is willing to accept.
    • Attack Surface refers to the vulnerable points in a system that can be exploited by attackers.
    • Adaptive Security Appliance dynamically adapts to changing threats.

    Technology

    • Adaptive Network Control dynamically adjusts network traffic based on security policies.
    • Address Resolution Protocol (ARP) is a network protocol that maps IP addresses to MAC addresses.
    • Advanced Encryption Standard (AES) is a symmetric-key encryption algorithm widely used for data protection.

    Systems

    • Active Directory (AD) is a directory service used to manage users, computers, and other network resources in Windows networks.
    • Application Programming Interface (API) is a set of rules and specifications that allow different applications to communicate with each other.
    • Autonomous System (AS) is a group of networks under a single administrative control.

    Organizations

    • American National Standards Institute (ANSI) develops and publishes standards for a wide range of industries, including information technology.
    • National Institute of Standards and Technology (NIST) is a US federal agency that promotes measurement science, standards, and technology.
    • International Organization for Standardization (ISO) is an international standard-setting body.

    Processes

    • Audit is a systematic examination of records and activities to ensure compliance with policies and procedures.
    • Attestation is the process of verifying the authenticity and integrity of a system or component.
    • Authorization is the process of granting permission to access specific resources.

    Access Control

    • Access Control is a security mechanism that regulates who can access and use specific resources.
    • Access Control List (ACL) is a mechanism that defines rules to grant or deny access to resources based on specific criteria (e.g., IP address, user, etc.).
    • Access Control Matrix is a data structure that represents access permissions for every user and object, allowing fine-grained control.
    • Access Control Policy defines the rules and principles for managing access to data and applications.
    • Access Rights Management is used to manage and control access to digital content based on user permissions and policies.

    Authentication and Authorization

    • Authentication verifies the identity of a user or device before granting access.
    • Authorization determines what actions a user or device is allowed to perform after authentication.
    • Multi-factor Authentication (MFA) employs multiple authentication factors to enhance security.
    • Single Sign-On (SSO) allows users to log in once to access multiple applications.

    Cryptography

    • Encryption transforms data into an unreadable format, protecting it from unauthorized access.
    • Decryption reverses encryption, making the data accessible again.
    • Symmetric Key Cryptography uses the same key for encryption and decryption.
    • Asymmetric Key Cryptography uses separate keys for encryption and decryption, providing more secure key management.
    • Hashing generates a fixed-size fingerprint of data, used for integrity verification and password storage.

    Cybersecurity Concepts

    • Risk Assessment identifies, analyzes, and prioritizes potential threats and vulnerabilities.
    • Vulnerability Management is a process for finding, assessing, and mitigating vulnerabilities in systems and applications.
    • Incident Response involves the steps taken to handle security incidents and minimize damage.
    • Security Awareness Training educates users about cybersecurity threats and encourages best practices.
    • Threat Intelligence gathers and analyzes information about threats and attacks to improve security measures.

    Network Security

    • Firewall is a security system that controls network traffic, blocking unauthorized access.
    • Intrusion Detection System (IDS) monitors network traffic for suspicious activity and alerts administrators.
    • Intrusion Prevention System (IPS) actively blocks malicious traffic and attacks.
    • Virtual Private Network (VPN) creates a secure connection over a public network.

    Data Security

    • Data Loss Prevention (DLP) safeguards sensitive data from unauthorized access, use, or disclosure.
    • Data Encryption protects data in transit and at rest.
    • Data Masking replaces sensitive data with random or non-sensitive values to protect privacy.

    Other Important Terms

    • Active Directory (AD) is a Microsoft directory service for managing user accounts, computers, and other network resources.
    • Advanced Encryption Standard (AES) is a widely used encryption algorithm for data protection.
    • Cloud Computing provides on-demand access to IT resources (e.g., servers, storage, software) over the internet.
    • Internet of Things (IoT) refers to the interconnection of devices, vehicles, and other objects with the internet.
    • Machine Learning (ML) is a type of artificial intelligence (AI) focused on automating tasks and making predictions based on data.

    Security Terms

    • Back-Channel Communication: Secret or unauthorized communication paths used to bypass security measures.
    • Backdoor: Secret entry point into a system, allowing unauthorized access.
    • Backscatter Channel: Channel used to send unintended signals, potentially exploited for eavesdropping.
    • Backup: A copy of data or system configuration, used for recovery in case of failure.
    • Bastion Host: Highly secure system acting as a gateway, protecting internal networks from external threats.
    • Biometric Authentication: Using unique biological traits (fingerprints, iris scans) for identification and verification.
    • Bit Error Rate (BER): The rate at which bits in a data stream are incorrectly transmitted.
    • Blockchain: Distributed ledger technology, used for recording transactions securely and transparently.
    • Botnet: Network of compromised computers, often used for malicious activities.
    • Buffer Overflow Attack: Exploiting a software bug to overwrite memory buffers, potentially gaining control of the system.
    • Business Continuity Plan (BCP): Plan outlining strategies for maintaining critical business functions during a disruption.
    • Business Impact Analysis (BIA): Process evaluating the potential impact of disruptions on business operations.
    • Byzantine Fault Tolerant: Systems designed to operate correctly even if some components fail in a malicious way.

    Network and Communication

    • Base Station Controller (BSC): Component in cellular networks controlling the operation of multiple base transceiver stations (BTS).
    • Base Transceiver Station (BTS): Infrastructure in cellular networks that communicates with mobile devices.
    • Border Gateway Protocol (BGP): Routing protocol used to exchange routing information between autonomous systems on the internet.
    • Bluetooth: Wireless communication technology used for short-range data transfer between devices.
    • Broadcast Integrity Protocol (BIP): Protocol used to ensure the integrity of broadcast services, used extensively in digital TV.

    Standards and Organizations

    • Base Standards: Fundamental set of rules and specifications for a technology or industry.
    • Basel Committee on Banking Supervision: International body setting standards for banking supervision to strengthen the financial system.
    • British Standards Institution (BSI): National standards body for the UK, developing and publishing standards for various sectors.
    • Building Security In Maturity Model (BSIMM): A model that helps organizations assess and improve their application security practices.

    Other

    • Binary Large Object (BLOB): Large block of binary data, typically stored within database systems.
    • Byte String: Sequence of bytes represented as a string, used in various data formats and programming languages.
    • Breakdowns Structure: Hierarchical representation of a project or task, used for planning and management.
    • Bring Your Own Device (BYOD): Policy allowing employees to use their own devices for work.
    • Banner Grabbing: Gathering information about a system by analyzing the banner displayed during a network connection.

    Security Concepts & Technologies

    • Back-channel communication: A hidden or alternative channel used for communication, often employed in malicious activities like data exfiltration.
    • Backdoor: A secret entry point into a system, often used by attackers to bypass security measures.
    • Backscatter channel: A communication channel used for unauthorized data transmission, often exploited by attackers to steal sensitive information.
    • Backup: A copy of data or system configuration for recovery purposes in case of data loss.
    • Bastion host: A hardened computer system located at the perimeter of a network, acting as a gateway and defense against unauthorized access.
    • Behavioral Anomaly Detection: A technique used to identify suspicious activities by analyzing deviations from typical user behavior patterns.
    • Blockchain: A distributed and immutable ledger technology that records transactions on a network of computers, ensuring transparency and security.
    • Botnet: A network of compromised computers controlled by a malicious actor, often used to launch large-scale attacks.
    • Buffer Overflow Attack: An attack that exploits a vulnerability where input data exceeds the allocated memory space, potentially allowing attackers to execute malicious code.
    • Business Continuity Plan (BCP): A documented plan outlining procedures for maintaining essential business operations in the event of a disruption.
    • Business Impact Analysis (BIA): An assessment of the potential impact of disruptions to business operations, identifying critical functions and dependencies.
    • Biometric Authentication: A form of authentication that utilizes unique biological characteristics, such as fingerprints or iris scans, for user verification.
    • Bit Error Rate (BER): The rate at which bits are incorrectly transmitted over a communication channel, indicating the quality of the channel.
    • Blacklisting: A security measure that identifies and blocks known malicious entities, such as websites or IP addresses, from accessing a system or network.
    • Bring Your Own Device (BYOD): A policy that allows employees to use their personal devices for work purposes, posing potential security challenges.
    • Bluetooth Low Energy (BLE): A low-power version of Bluetooth technology, often used in wireless devices and smart home applications.
    • Boundary Protection: Measures implemented at the perimeter of a network to prevent unauthorized access and mitigate security threats.
    • Brute Force Password Attack: A method that attempts to guess passwords by iterating through all possible combinations, often using automated tools.
    • Cryptography: The art of secure communication in the presence of adversaries, using encryption and decryption techniques to protect sensitive data.

    Organizations & Standards

    • Basel Committee on Banking Supervision: An international committee that develops and promotes global standards for the banking industry, including risk management and cybersecurity.
    • British Standards Institution (BSI): A national standards body in the UK, responsible for developing and promoting standards in various fields, including cybersecurity.
    • Building Security In Maturity Model (BSIMM): A framework that provides guidance and benchmarks for organizations to measure and improve their cybersecurity maturity.

    Other Notable Terms

    • BER-TLV: A data format used in various protocols, such as Bluetooth, where information is organized into tags, lengths, and values.
    • Binary Large Object (BLOB): A large piece of data stored in a database, often in binary format.
    • Byte String: A sequence of bytes representing data.
    • Endianness: The order in which bytes are arranged in computer memory, either big-endian or little-endian.
    • Firewall: A network security system that controls inbound and outbound traffic, preventing unauthorized access.
    • Intrusion Detection System (IDS): A system that monitors network activity for suspicious patterns and alerts administrators to potential security breaches.
    • Key Management: The process of managing cryptographic keys, including generation, storage, distribution, and destruction.
    • Malware: Malicious software designed to harm computer systems or steal sensitive information.
    • Patch Management: The process of applying software updates and security patches to address vulnerabilities and improve system security.
    • Penetration Testing: A simulated attack conducted by ethical hackers to identify vulnerabilities and weaknesses in a system or network.
    • Risk Management: The process of identifying, assessing, and mitigating potential risks to an organization's assets, operations, and reputation.
    • Security Audit: A comprehensive review of an organization's security controls and practices to identify vulnerabilities and areas for improvement.
    • Security Information and Event Management (SIEM): A system that collects, analyzes, and correlates security data from various sources to detect and respond to security incidents.
    • Vulnerability: A weakness in a system or network that can be exploited by attackers.

    Common Acronyms and Abbreviations in Information Security

    • C#j: C Sharp (a programming language)
    • C&A: Certification and Accreditation - a process that ensures systems or processes are secure and meet security requirements.
    • C&S: Configuration and Security - related to the setup and protection of systems.
    • C*n: C followed by an asterisk and a number - possible reference to a specific version or variant of a software or technology.
    • C, CU, CV: Likely abbreviations for "C Control, CU Current, CV Control Variable", possibly referring to different states or variables in a system.
    • C.F.D.C.F.R.C1,…,C64: Potentially relates to "Central Facility Data, Central Facility Reporting & Control", and could be a series of control points numbered from 1 to 64.
    • C2: Command and Control - a communication system used by attackers to manage their malicious activities.
    • C3: Command, Control, and Communications - a system for managing military or other strategic operations.
    • C3I: Command, Control, Communications, and Intelligence - a system for collecting and analyzing intelligence along with coordinating military actions.
    • C4: Command, Control, Communications, Computers & Combat - a framework that includes the above three and adds computerization for enhanced responsiveness.
    • CA: Certificate Authority - an organization that issues and manages digital certificates used for verifying identities online.
    • CA Technologies: A software company specializing in enterprise IT management and security solutions.
    • CAA: Certificate Authority Authorization - the authorization given to a Certificate Authority to issue digital certificates.
    • CaaS: Communication as a Service - a cloud-based service that provides communication infrastructure and capabilities on demand.
    • CableLabs: A research and development company focused on advancing cable technology, including security.
    • CAC: Common Access Card - a standardized smart card used for identification and access control in the U.S. government.
    • CAD: Computer-Aided Design - software for creating and modifying designs using computers.
    • CAE: Computer-Aided Engineering - software used for simulating and analyzing engineering designs.
    • CAESAR: a competition to find the best authenticated encryption scheme.
    • CAESARS: A gaming and entertainment company.
    • CAG: Corporate Advisory Group - a group that provides guidance to a corporation on various matters, potentially including security.
    • CAIS: Canadian Association of Information Science - a professional organization for information professionals in Canada.
    • CAK: Card Authentication Key - a key used to authenticate a smart card or device.
    • calibration: The process of adjusting a device or instrument to ensure accuracy and proper function.
    • call back: A security measure where a system initiates a call to a known number to verify the identity of the caller.
    • Call Detail Record: Detailed information about a phone call, including the numbers involved, duration, and time.
    • Call Oriented Programming: A programming paradigm that focuses on executing functions as needed, like calling a service.
    • Call Processor: A component responsible for handling phone calls and routing them.
    • callibration: A variant spelling of calibration.
    • CAN: Controller Area Network - a type of network used for communication between electronic control units in vehicles.
    • Canadian Centre for Cyber Security: A government agency responsible for providing cybersecurity advice and guidance in Canada.
    • Canadian Standards Association (CSA): A non-profit organization developing standards in various fields, including security.
    • Candidate Checklist: A list of potential candidates or factors to be considered in a security assessment or decision.
    • Candidate for Deletion: An item or element that is being considered for removal.
    • canister (COMSEC): A container used for storing and protecting cryptographic materials.
    • CAP: Capabilities Catalog - a list of the capabilities of a system or organization.
    • Capabilities Catalog: A list of capabilities of a system, tool, or organization.
    • capability: The ability to perform a specific task or action.
    • Capability Bases Access Control: A security mechanism where access is granted based on capabilities assigned to a user or process.
    • Capability Hardware Enhanced RISC Instructions: A set of instructions added to processors to enhance security features.
    • Capability List: A list of capabilities granted to a user or process.
    • Capability Maturity Model Integration (CMMI): A model for assessing and improving organizations' process maturity, including software development.
    • capability requirement: A requirement for a system or organization to have a specific capability.
    • Capability, Anomalous Event Detection Management: The ability to detect unusual events or activity in a system.
    • Capability, Anomalous Event Response and Recovery Management: The ability to respond to and recover from unusual events or activity.
    • Capability, Behavior Management: The ability to manage and monitor the behavior of users and systems.
    • Capability, Boundary Management: The ability to manage and control the boundaries between trusted and untrusted systems.
    • Capability, Configuration Settings Management: The ability to manage the configuration settings of a system.
    • Capability, Credentials and Authentication Management: The ability to create, manage, and verify user credentials.
    • Capability, Event Preparation Management: ability to plan for and prepare for security events.
    • Capability, Hardware Asset Management: The ability to manage the hardware assets of a system or organization.
    • Capability, ISCM: The ability to manage security information and events.
    • Capability, Manage and Assess Risk: The ability to identify, analyze, and control risks.
    • Capability, Perform Resilient Systems Engineering: The ability to design and implement systems that are resilient to attacks.
    • Capability, Privilege and Account Management: The ability to manage user privileges and accounts.
    • Capability, Security: The ability to secure a system or organization against attacks.
    • Capability, Software Asset Management: The ability to manage the software assets of a system or organization.
    • Capability, Trust Management: The ability to manage trust relationships between systems and users.
    • Capability, Vulnerability Management: The ability to identify, assess, and remediate vulnerabilities.
    • Capacity Planning: The process of determining the capacity needs of a system or organization.
    • CAPCO: A consulting firm specializing in financial services and technology.
    • CAPEC: Common Attack Pattern Enumeration and Classification - a database that classifies and categorizes common attack patterns.
    • CapEx: Capital Expenditures - spending on assets that are expected to be used for more than a year.
    • CAPI: Card Application Programming Interface - a set of programming instructions that allow software to communicate with smart cards.
    • Capital Expenditures: Spending on assets with a lifespan of over a year.
    • Capstone Policies: Essential polices that guide a program or project.
    • CAPTCHA: Completely Automated Public Turing test to tell Computers and Humans Apart - a type of test used to distinguish humans from bots.
    • Capture: The act of obtaining information or data from a system or network.
    • CAPWAP: Control And Provisioning of Wireless Access Points - a protocol for managing wireless access points.
    • card: A physical or digital card used for identification or access control, often with a magnetic stripe or chip.
    • Card Application: Software application designed to run on a smart card and perform specific tasks.
    • Card Authentication Key: A key used to authenticate a smart card.
    • Card Capability Container: A container that stores the capabilities of a smart card.
    • Card Design Standard: The standard used for designing and manufacturing smart cards.
    • Card Holder Unique Identifier: A unique identifier assigned to a cardholder.
    • Card Management: The process of managing and controlling smart cards.
    • card management system: Software used to manage and administer smart cards.
    • Card Not Present: A transaction where the cardholder is not physically present at the point of sale.
    • card reader: A device that reads the data stored on a smart card.
    • Card Verifiable: Indicates that a card can be verified as authentic.
    • Card Verifiable Certificate: A digital certificate that verifies the authenticity of a smart card.
    • Card Management System to Card: Communication flow from a Card Management System to a specific card.
    • cardholder: The person who owns a smart card.
    • Cardholder to Card: Communication flow from a cardholder to a specific card.
    • Cardholder to External System: Communication flow from a cardholder to an external system, such as a bank or merchant.
    • Cardholder Unique Identifier: A unique identifier assigned to a cardholder.
    • Career and Technical Education: Education programs that focus on developing skills for specific occupations and industries.
    • Career and Technical Student Organization: A student organization focused on career and technical education.
    • Carrier Grade NAT: Network Address Translation designed for large, carrier-grade networks.
    • CAS: Content Access System - a system that controls access to digital content.
    • CASB: Cloud Access Security Broker - a security tool that mediates access to cloud services.
    • Cascaded Style Sheet: A file that defines the presentation styles of a web page.
    • cascading: The principle that styles defined in different style sheets can override each other.
    • CASSA: Canadian Security Screening Agency - a Canadian government agency responsible for airport security and screening.
    • catalog: A collection of items or information that is organized in a specific way.
    • categorization: The process of assigning items or information to specific categories.
    • Category: A group or class of items that share common characteristics.
    • C-ATO: Continuous Authority to Operate - an authorization that is continuously reviewed and monitored.
    • CAVP: Computer Assisted Vulnerability Processor - a tool used to analyze and identify security vulnerabilities.
    • CAVS: Computer Assisted Vulnerability Scoring System - a system used to score the severity of security vulnerabilities.
    • CAW: Certification Authority Workstation - a workstation used for issuing and managing digital certificates.
    • CBA: Cybersecurity Baseline Assessment - a formal assessment that provides an overview of an organization's cybersecurity posture.
    • CBAC: Content Based Access Control - a method of granting access to information based on the content of the information itself.
    • CBC: Cipher Block Chaining - a block cipher mode of operation used in cryptography.
    • CBC-MAC: Cipher Block Chaining - Message Authentication Code - a method of generating a message authentication code using CBC.
    • CBD: Canonical Binary Distribution - a standard distribution of software that is widely accepted.
    • CBDC: Central Bank Digital Currency - a digital form of currency issued by a central bank.
    • CBEFF: Common Biometric Exchange Formats Framework - a framework for exchanging biometric data.
    • CBEFF Basic Structure: The foundational structure for exchanging information within the CBEFF framework.
    • CBEFF Client: A system that uses CBEFF to exchange biometric data.
    • CBEFF Nested Structure: A structure used within the CBEFF framework for organizing data.
    • CBEFF Patron: A system that provides biometric data using CBEFF.
    • CBEFF Root Header: The top-level header in a CBEFF message.
    • CBEFF Sub-Header: A header used within a CBEFF message to organize or label segments.
    • CBOR: Concise Binary Object Representation - a binary encoding format for data.
    • CBP: Customs and Border Protection - a US agency responsible for border security and customs enforcement.
    • CC: Common Criteria - an international standard for evaluating the security of IT systems.
    • CCA: Chosen Ciphertext Attack - a type of cryptanalytic attack where the attacker can choose a ciphertext and obtain the corresponding plaintext.
    • CCA with nonce misuse-resilience: A type of CCA attack where the attacker can use the nonce (a random number) in unintended ways to break the system.
    • CCAm: Common Configuration Administrator - A system that manages and maintains the configuration of a network.
    • CCB: Change Control Board - a board that reviews and approves changes to systems.
    • CCC: Commercial COMSEC Evaluation Program (CCEP) - a program that evaluates the security of commercial communications security devices.
    • CCCS: Common Control Coordination System - a system that coordinates and manages security controls.
    • CCE: Common Configuration Enumeration - A process for identifying and documenting the configuration of systems.
    • CCE ID: A unique identifier assigned to a common configuration item.
    • CCEB: Common Configuration Enumeration Baseline - A baseline configuration for a system or network.
    • CCEP: Commercial COMSEC Evaluation Program - a program that evaluates the security of commercial communications security devices.
    • CCEVS: Common Criteria Evaluation and Validation Scheme - a scheme for evaluating the security of IT systems.
    • CCI: Common Control Identifier - A unique identifier assigned to a common control.
    • CCIPS: Common Control Information Protection System - a system that manages and controls information access.
    • CCM: Counter Mode with Cipher Block Chaining - Message Authentication Code - a method of generating a message authentication code using Counter Mode.
    • CCMP: Counter Mode with Cipher Block Chaining - Message Authentication Code Protocol - a protocol for generating a message authentication code using Counter Mode.
    • CCN: Common Control Number - A unique identifier assigned to a common control.
    • CCoA: Common Control Oversight Authority - An authority that oversees the implementation and effectiveness of common controls.
    • CCRB: Common Control Review Board - A board that reviews and approves common controls.
    • CCSDS: Consultative Committee for Space Data Systems - A consortium that develops and maintains standards for space data systems.
    • CCSS: Common Configuration Scoring System - A system used to assess the security posture of a system or network based on configuration.
    • ccTLD: country-code Top-Level Domain - A domain name that is associated with a specific country (e.g., .ca for Canada, .de for Germany).
    • CCTV: Closed Circuit Television - a system of cameras used for surveillance.
    • CD: Compact Disc - a type of optical disc used to store data.
    • CD File System: A file system specifically designed for Compact Discs.
    • CDC: Centers for Disease Control and Prevention - a U.S. agency responsible for public health.
    • CDFS: Compact Disc File System - A file system designed for Compact Discs.
    • CDH: Cofactor Diffie-Hellman - a cryptographic protocol related to Diffie-Hellman key exchange.
    • CDM: Continuous Diagnostics and Mitigation - A government program designed to continuously monitor and improve the security of government systems.
    • CDMA: Code Division Multiple Access - a wireless technology for transmitting data.
    • CDMA Subscriber Identity Module (CSIM): A SIM card used for CDMA networks.
    • CDN: Content Delivery Network - A network of servers that deliver content to users closer to their location.
    • CDP: Continuous Data Protection - A technology that continuously backs up data to ensure recovery in case of failure.
    • CDR: Call Detail Record - Detailed information about a phone call, including the numbers involved, duration, and time.
    • CD-R: Compact Disc-Recordable - A type of compact disc that can be written to once.
    • CD-Read Only Memory: A type of compact disc that cannot be written to.
    • CD-Recordable: A type of compact disc that allows for writing data.
    • CD-Rewritable: A type of compact disc that allows for multiple rewrites of data.
    • CD-ROM: Compact Disc-Read Only Memory - a type of compact disc that cannot be written to.
    • CD-RW: Compact Disc-Rewritable - a type of compact disc that allows for multiple rewrites of data.
    • CDS: Cross-Domain Solutions - a type of security solution that allows systems in different security domains to communicate with each other.
    • CE: Conformity Assessment - An evaluation process that confirms if a product or system meets specific requirements.
    • CEA: Consumer Electronics Association - An organization that represents consumer electronics manufacturers and retailers.
    • CED-DA: Center for Enterprise Dissemination-Disclosure Avoidance - A research center focused on preventing the accidental disclosure of sensitive data.
    • CEDS: Computer Forensic Reference Data Sets - A collection of data sets used for testing and evaluating computer forensics tools.
    • CEF: Common Event Format - a standard format for exchanging security events.
    • CeFi: Centralized Finance - a type of financial system where assets and processes are controlled by a central authority.
    • Cell on Wheels: A mobile cell tower.
    • Cellular Network Isolation Card (CNIC): A card inserted into a cellular phone to isolate the phone from the cellular network.
    • Cellular Telecommunications and Internet Association: An industry group that represents mobile operators and device manufacturers.
    • Center for Education and Research in Information Assurance and Security (CERIAS): A research center that specializes in information security.
    • Center for Enterprise Dissemination-Disclosure Avoidance: A research center that studies methods to protect sensitive information while making it available for research.
    • Center for Internet Security: A non-profit organization that provides cybersecurity resources and guidance.
    • Centered Binomial Distribution: A statistical distribution used to model the probability of successes in a series of trials.
    • Centers for Medicare and Medicaid Services: A U.S. agency responsible for administering Medicare and Medicaid.
    • Centers of Academic Excellence (CAEs): Universities that have been recognized for their expertise in cybersecurity education and research.
    • Centimeter: A unit of measurement (100 centimeters equals 1 meter).
    • CentOS: Community Enterprise Operating System - a Linux distribution that is popular for servers and data centers.
    • Central Bank Digital Currency: A digital form of currency issued by a central bank.
    • Central Facility Finksburg: Possibly a location for a data processing or computing center.
    • Central Limit Theorem: A theorem in statistics that states that the distribution of sample means will tend to be normal, even if the underlying population distribution is not normal.
    • central management: The process of managing and controlling a system or network from a central location.
    • central office of record: The primary location where records are stored and maintained.
    • Central Oversight Authority: An authority that oversees the operation and implementation of a particular program or initiative.
    • Central Processing Unit (CPU): The brain of a computer that executes instructions.
    • Central Public Safety Service Provider: An organization that provides public safety services, potentially including cybersecurity.
    • Central Reservation System: A system used for making and managing reservations, potentially for hotels or transportation.
    • Central Security Service: A government agency responsible for providing cybersecurity support to the military.
    • central services node: A central point in a system or network where services are provided or managed.
    • Central Verification System: A system used to verify the authenticity of information.
    • centralized finance: A financial system where assets and transactions are managed and controlled by a central authority.
    • Centralized network: A network where resources and data are managed from a central point.
    • Centre for the Protection of National Infrastructure: An organization responsible for protecting critical infrastructure in a country.
    • centric architecture: An architectural approach where a specific component or element is central to the design.
    • Centrum Wiskunde & Informatica: A Dutch research institute for mathematics and computer science.
    • CEO: Chief Executive Officer - the top executive of a company.
    • CEP: Common Event Format - a standardized format for exchanging security events.
    • CERG: Cybersecurity Emerging Research Group - a group that conducts research on emerging cybersecurity threats.
    • CERIAS: Center for Education and Research in Information Assurance and Security - a university research center specializing in information security.
    • CERT: Computer Emergency Readiness Team - a team that responds to computer emergencies and security incidents.
    • CERT Coordination Center: A central coordinating body for CERTs.
    • CERT/CC: Computer Emergency Response Team/Coordination Center - A central organization that coordinates security incident response and provides resources and guidance.
    • certificate: A digital document that verifies the identity of a person, organization, or device.
    • Certificate Authority (CA): An organization that issues and manages digital certificates.
    • Certificate Authority Authorization: The authorization given to a Certificate Authority to issue digital certificates.
    • certificate authority workstation (CAW): A workstation used for issuing and managing digital certificates.
    • Certificate Chain: A series of certificates that link a specific certificate to a trusted root certificate.
    • Certificate class: A category or type of digital certificate.
    • Certificate Enrollment Policy: Policy that outlines the requirements for obtaining a digital certificate.
    • Certificate Enrollment Service: A service that allows individuals or organizations to enroll for digital certificates.
    • certificate management: The process of managing digital certificates, including issuance, revocation, and renewal.
    • Certificate Management Service: A service that manages digital certificates.
    • Certificate owner: The person or organization that owns a digital certificate.
    • certificate revocation list (CRL): A list of certificates that have been revoked.
    • Certificate Signing Request: A request from a user or organization to a Certificate Authority to issue a digital certificate.
    • Certificate Status Authority: An organization that provides information about the status of digital certificates.
    • certificate status server: A server that stores and provides information about the status of digital certificates.
    • Certificate Transparency: A mechanism that increases the transparency of the certificate issuance process.
    • Certificate Usage Type: The purpose for which a digital certificate is used.
    • certificate-inventory management: The process of managing and tracking digital certificates.
    • certificate-related information: Information related to digital certificates, such as expiration dates, issuing authorities, and revocation status.
    • certification: The process of verifying that a system or product meets specific security requirements.
    • Certification Agent: A person or system responsible for issuing and managing digital certificates.
    • certification analyst: A person who analyzes and evaluates security systems to determine if they meet certification requirements.
    • certification authority: An organization that issues and manages digital certificates.
    • Certification Authority System: A system that manages digital certificates.
    • Certification Authority Workstation: A workstation used for issuing and managing digital certificates.
    • certification package: A collection of documents and information that is used to support a certification request.
    • certification practice statement (CPS): A document that outlines the practices and procedures of a Certificate Authority.
    • certification test and evaluation: Testing and evaluation to determine if a system or product meets certification requirements.
    • certified TEMPEST technical authority: A person who is certified to perform TEMPEST testing and evaluation.
    • certifier: A person or organization who is authorized to certify systems or products.
    • CES: Consumer Electronics Show - An annual trade show focused on consumer electronics technology.
    • CESER: Counter-Emanations Security Evaluation Report - A report that evaluates the susceptibility of a system to electromagnetic interference.
    • CF: Compact Flash - a type of flash memory card commonly used in cameras and other devices.
    • CFATS: Chemical Facility Anti-Terrorism Standards - A set of standards that require chemical facilities to implement security measures to prevent and respond to terrorism.
    • CFB: Cipher Feedback - a block cipher mode of operation used in cryptography.
    • CFC: Chlorofluorocarbon - a type of chemical that was once used in refrigerants but is now banned due to its impact on the environment.
    • CFFB: Cipher Feedback - a block cipher mode of operation used in cryptography.
    • CFI: Control Flow Integrity - a security technique that prevents attackers from modifying the execution path of a program.
    • CFO: Chief Financial Officer - the executive responsible for the financial management of an organization.
    • CFOC: Chief Financial Officers Council - a council composed of chief financial officers from various organizations.
    • CFRDC: Computer Forensics Research and Development Center - a research center specializing in computer forensics.
    • CFReDS: Computer Forensic Reference Data Sets - a collection of data sets used for testing and evaluating computer forensics tools.
    • CFTT: Computer Forensics Tool Testing - a process for testing and evaluating computer forensics tools.
    • CGE: Cisco Global Exploiter - a tool used to exploit vulnerabilities in Cisco products.
    • CGI: Common Gateway Interface - a standard interface used by web servers to interact with external programs.
    • CGN: Carrier Grade NAT - Network Address Translation designed for large, carrier-grade networks.
    • cgroup: Control Group - a Linux kernel feature that allows for managing and isolating resource usage for processes.
    • chain: A sequence of items or events that are linked together.
    • chain of custody: A documented record of the movement and handling of evidence.
    • chain of evidence: The documentation of the origin and path of evidence for legal purposes.
    • chain of trust: A hierarchy of trust relationships, often used in cryptography.
    • Chain-based proof of stake consensus model: A type of blockchain consensus algorithm that uses a chain of validators to secure the network.
    • Chained Secure Zone: A sequence of secure areas connected together.
    • chaining: The process of linking together multiple blocks or elements in a sequence.
    • Challenge: A request for a user or system to provide evidence of their identity or capability.
    • challenge and reply authentication: A type of authentication where a server challenges the client to provide a response based on a secret value.
    • Challenge-Handshake Authentication Protocol: A protocol used for authenticating users or devices.
    • Challenge-Response Authentication Mechanism: A method of authenticating users or devices by challenging them to provide a correct response.
    • Challenge-Response Protocol: A set of rules for exchanging challenges and responses during authentication.
    • Change Control Board: A board that reviews and approves changes to systems.
    • Change of Authorization: A change to the authorization level of a system or user.
    • Channel: A path or medium for transmitting data.
    • CHAP: Challenge Handshake Authentication Protocol - A protocol used for authenticating users or devices.
    • characteristic: A feature or attribute of a system or object.
    • characterization: The process of identifying and describing the characteristics of a system or object.
    • Chassis Management Controller: A component that manages the operation of a server chassis.
    • Check Fact Reference: A source or document used to verify the accuracy of a statement or claim.
    • check word: A password or key used for access control.
    • Checking Disabled: Indicates that a security check or control is not active or enabled.
    • Checklist: A list of items or tasks that need to be completed.
    • Checklist Developer: A person or system responsible for creating and maintaining checklists.
    • Checklist Group: A group of checklists that share a common purpose.
    • Checklist Revision: A modification or update to a checklist.
    • Checklist Role: The role or function associated with a checklist.
    • Checklist Type: The type of checklist, such as a security checklist or a compliance checklist.
    • checksum: A value that is calculated from a block of data to ensure data integrity.
    • Chemical Facility Anti-Terrorism Standards (CFATS): A security program designed to safeguard chemical facilities from terrorist attacks.
    • CHERI: Capability Hardware Enhanced RISC Instructions - A set of hardware instructions designed to enhance security.
    • Chief Artificial Intelligence Officer: An executive who leads the development and implementation of artificial intelligence initiatives.
    • Chief Data Officer: An executive responsible for managing and protecting an organization's data.
    • Chief Executive Officer: The top executive responsible for the overall management and direction of a company or organization.
    • Chief Financial Officer: An executive responsible for the financial management of an organization.
    • Chief Financial Officers Council: A council composed of chief financial officers from various organizations.
    • chief information officer (CIO): An executive responsible for the information technology strategy and operations of an organization.
    • Chief Information Officers (CIO) Council: A council composed of chief information officers from various organizations.
    • chief information security officer: An executive responsible for information security strategy, policies, and operations.
    • Chief Learning Officer: An executive who oversees learning and development initiatives within an organization.
    • Chief Operating Officer (COO): An executive responsible for the day-to-day operations of an organization.
    • Chief Privacy Officer: An executive responsible for protecting the privacy of an organization's data.
    • Chief Product Security Officer: An executive responsible for the security of an organization's products.
    • Chief Risk Officer: An executive responsible for managing and mitigating risk within an organization.
    • Chief Security Officer: An executive responsible for the overall security of an organization.
    • Chief Technology Officer: An executive responsible for the technology strategy and operations of an organization.
    • Children‘s Online Privacy Protection Act: A U.S. law that protects the privacy of children online.
    • Chinese Remainder Theorem: A mathematical theorem that is used in cryptography.
    • Choose Your Own Device: A policy that allows employees to use their personal devices for work purposes.
    • Choreography: The planning and coordination of multiple systems or processes.
    • Chosen Ciphertext Attack: An attack where the attacker can choose a ciphertext and obtain the corresponding plaintext.
    • Chosen Plaintext Attack: An attack where the attacker can choose a plaintext message and obtain the corresponding ciphertext.
    • CHUID: Cardholder Unique Identifier - A unique identifier assigned to a cardholder.
    • CHVP: Capability Hardware Enhanced RISC Instructions - A set of instructions added to processors to enhance security features.
    • CI: Continuous Integration - a software development practice where code changes are integrated frequently and automatically.
    • CI/CD: Continuous Integration/Continuous Deployment - a software development process that emphasizes automation and rapid releases.
    • CIA: Confidentiality, Integrity, Availability - three essential security principles.
    • CIDAR: Common Industrial Protocol - a set of standards for communicating between industrial devices.
    • CIDR: Classless Inter-Domain Routing - an addressing scheme used for IP networks.
    • CIE: Common Industrial Protocol - a set of communications standards for industrial devices.
    • CIF: Common Internet File System - a file system that allows easy access to files on a network.
    • CIFS: Common Internet File System - a file system that allows easy access to files on a network.
    • CIGRE: International Council on Large Electric Systems - An international organization focused on the development of power systems.
    • CIK: Customer Information Key - A unique identifier for a particular customer.
    • CIKR: Customer Information Key Repository - a repository that stores customer information keys.
    • CIM: Computer Integrated Manufacturing - a system that combines computers and robotics in manufacturing processes.
    • CIMA: Chartered Institute of Management Accountants - A professional organization for management accountants.
    • Cin-Day: A day for reviewing and updating security policies and procedures.
    • CIO: Chief Information Officer - The executive responsible for information technology strategy and operations.
    • CIP: Critical Infrastructure Protection - a program or initiative to protect critical infrastructure from attacks.
    • CIPAC: Critical Infrastructure Partnership Advisory Council - A council that advises on the protection of critical infrastructure.
    • CIPH-1K(X): A type of cryptographic algorithm used in securing communications.
    • cipher: An algorithm used to encrypt or decrypt data.
    • Cipher Block Chaining: A block cipher mode of operation that encrypts data in blocks.
    • Cipher Block Chaining - Message Authentication Code (CMAC): A method of generating a message authentication code using CBC.
    • Cipher Feedback: A block cipher mode of operation where the ciphertext of the previous block is used as input for the encryption of the next block.
    • cipher text: Data that has been encrypted using a cipher.
    • cipher text auto-key: An encryption scheme where ciphertext produced in one round becomes the key in the next round.
    • Cipher-based Message Authentication Code: A message authentication code created using a cipher.
    • Ciphering Offset Number: A value used to modify the plaintext during encryption.
    • ciphertext: Data that has been encrypted.
    • Ciphertext Integrity: A property that ensures that ciphertext has not been modified.
    • Ciphertext Integrity with Misuse-resistance: A type of ciphertext integrity that prevents attacks where adversaries can modify ciphertext in specific ways.
    • ciphertext-policy attribute-based encryption: A type of encryption scheme where decryption rights are granted based on attributes associated with the ciphertext.
    • CIPHK(X): A type of cryptographic algorithm used in securing communications.
    • CIPSEA: A type of encryption scheme that combines ciphering and permutation.
    • CIR: Circuit - a path or connection in a network for transmitting data.
    • CIRC: Circuit - a path or connection in a network for transmitting data.
    • Circuit: A path or connection in a network for transmitting data.
    • Circuit Switch Fallback: A mechanism for switching from a circuit-switched network to a packet-switched network if the circuit-switched network fails.
    • CIRT: Computer Incident Response Team - A team that responds to computer security incidents.
    • CIS: Center for Internet Security - A non-profit organization that provides cybersecurity resources and guidance.
    • CISA: Cybersecurity and Infrastructure Security Agency - A U.S. agency responsible for cybersecurity and critical infrastructure protection.
    • Cisco Global Exploiter: A tool used to exploit vulnerabilities in Cisco products.
    • Cisco’s Internetwork Operating System: An operating system for networking devices.
    • CISO: Chief Information Security Officer - An executive responsible for information security strategy, policies, and operations.
    • CISQ: Consortium for Information & Software Quality - An organization that promotes best practices for software development and quality assurance.
    • Citect SCADA system: A supervisory control and data acquisition system used in industrial automation.
    • Cj: Likely a variation of "C" in the list. Might relate to a specific version or state change.
    • CJA: Criminal Justice Act - A U.S. law that provides legal representation to indigent defendants.
    • CJIS: Criminal Justice Information Services - a system that provides access to criminal justice information.
    • CK: Code Signing Key - A key used to digitally sign code.
    • CKG: Cooperative Key Generation - A method of generating keys collaboratively, often involving multiple parties.
    • CKL: Compromised Key List - A list of keys that have been compromised.
    • CKMS: Key Management System - A system used to manage and control cryptographic keys.
    • CKMS component: A part of a key management system.
    • CKMS design: The design of a key management system.
    • CKMS designer: A person responsible for designing a key management system.
    • CKMS developer: A person responsible for developing a key management system.
    • CKMS hierarchy: The organizational structure of a key management system.
    • CKMS implementer: A person responsible for implementing a key management system.
    • CKMS module: A self-contained unit within a key management system.
    • CKMS product: A specific key management system product.
    • CKMS PS: Key Management System Policy Server - A server that manages the policies of a Key Management System.
    • CKMS Security Policy: A policy document that### Cryptography
    • Cryptography is a method of protecting information and communications through the use of codes.
    • Cryptographic systems are used to transform information, making it unreadable to those who are not authorized to see it.
    • Cryptography involves the use of cryptographic keys, which are secret pieces of information that are used to encrypt and decrypt messages.
    • Cryptographic algorithms are mathematical functions that are used to transform plain text into ciphertext and vice versa.
    • Cryptographic hash functions are functions that are used in digital signatures and secure authentication.

    Key Management

    • Cryptographic Key Management System Practice Statement provides specific guidance for organisations on how to implement secure key management practices.
    • Cryptographic Key Management System Security Policy is a document that outlines an organisation's policy for key management.
    • Cryptographic Key Management System is a system that is used to protect keys and ensure they are used properly and securely.

    Common Security Terms

    • CSIRT is a team that is responsible for responding to security incidents.
    • Cyber Threat is a specific action that has the potential to harm a system or network.
    • CVE is a publicly available database system for identifying, defining, and reporting security vulnerabilities.
    • CUI are sensitive government information that needs to be protected.
    • CYOD is a model of device management where employees can bring their own devices to work.
    • CTAP is a standard that is used to connect cryptographic components within systems.
    • CUI Executive Agent is a person appointed by the US government to manage the use and protection of CUI.

    IT and Security Acronyms

    • C, c, C#j, C&A, C&S, C*n, C, CU, CV represent various acronyms related to computer programming, software, and security.

    • C.F.D.C.F.R.C1,…,C64, C2, C3, C3I, C4, CA represent further acronyms, including software, cybersecurity, and government agencies.

    • CA Technologies is a company specialized in software solutions.

    • CAA, CaaS are acronyms standing for Canadian Automobile Association and Communication as a Service.

    • CableLabs is a research and development company focusing on cable technologies.

    • CAC, CAD, CAE, CAESAR, CAESARS, CAG, CAIS, CAK represent further acronyms, including various organizations and applications.

    • calibration, call back, Call Detail Record, Call Oriented Programming, Call Processor, callibration, CAN, Canadian Centre for Cyber Security, Canadian Standards Association are terms related to telecommunications and cybersecurity.

    • Candidate Checklist, Candidate for Deletion are terms often used in project management and software development.

    • canister (COMSEC) refers to a container used to store sensitive information.

    • CAP, Capabilities Catalog, capability, Capability Bases Access Control, Capability Hardware Enhanced RISC Instructions, Capability List, Capability Maturity Model Integration, capability requirement, Capability, Anomalous Event Detection Management, Capability, Anomalous Event Response and Recovery Management, Capability, Behavior Management, Capability, Boundary Management, Capability, Configuration Settings Management, Capability, Credentials and Authentication Management, Capability, Event Preparation Management, Capability, Hardware Asset Management, Capability, ISCM, Capability, Manage and Assess Risk, Capability, Perform Resilient Systems Engineering, Capability, Privilege and Account Management, Capability, Security, Capability, Software Asset Management, Capability, Trust Management, Capability, Vulnerability Management represent various concepts and terms related to cybersecurity and risk management.

    • Capacity Planning, CAPCO, CAPEC, CapEx, CAPI, Capital Expenditures, Capstone Policies, CAPTCHA, Capture, CAPWAP, card, Card Application, Card Authentication Key, Card Capability Container, Card Design Standard, Card Holder Unique Identifier, Card Management, card management system, Card Not Present, card reader, Card Verifiable, Card Verifiable Certificate, Card Management System to Card, cardholder, Cardholder to Card, Cardholder to External System, Cardholder Unique Identifier, Career and Technical Education, Career and Technical Student Organization, Carrier Grade NAT are additional acronyms related to technology, security, and education.

    More Acronyms and Information

    • CAS, CASB, Cascaded Style Sheet, cascading, CASSA, catalog, categorization, Category, C-ATO, CAVP, CAVS, CAW, CBA, CBAC, CBC, CBC-MAC, CBD, CBDC, CBEFF represent acronyms that are used in various fields such as security, software development, finance, and the medical field.

    • CBEFF Client, CBEFF Nested Structure, CBEFF Patron, CBEFF Root Header, CBEFF Sub-Header, CBOR, CBP, CC, CCA, CCA with nonce misuse-resilience, CCAm, CCB, CCC, CCCS, CCE, CCE ID, CCEB, CCEP, CCEVS, CCI, CCIPS, CCM, CCMP, CCN, CCoA, CCRB, CCSDS, CCSS, ccTLD, CCTV, CD, CD File System, CDC, CDFS, CDH, CDM, CDMA, CDMA Subscriber Identity Module (CSIM), CDN, CDP, CDR, CD-R, CD-Read Only Memory, CD-Recordable, CD-Rewritable, CD-ROM, CD-RW, CDS, CE, CEA, CED-DA, CEDS, CEF, CeFi, Cell on Wheels, Cellular Network Isolation Card (CNIC), Cellular Telecommunications and Internet Association, Center for Education and Research in Information Assurance and Security, Center for Enterprise Dissemination-Disclosure Avoidance, Center for Internet Security, Centered Binomial Distribution, Centers for Medicare and Medicaid Services, Centers of Academic Excellence, Centimeter, CentOS, Central Bank Digital Currency, Central Facility Finksburg, Central Limit Theorem, central management, central office of record, Central Oversight Authority, Central Processing Unit, Central Public Safety Service Provider, Central Reservation System, Central Security Service, central services node, Central Verification System, centralized finance, Centralized network, Centre for the Protection of National Infrastructure, centric architecture, Centrum Wiskunde & Informatica, CEO, CEP, CERG, CERIAS, CERT, CERT Coordination Center, CERT/CC, certificate, Certificate Authority (CA), Certificate Authority Authorization, certificate authority workstation (CAW), Certificate Chain, Certificate class, Certificate Enrollment Policy, Certificate Enrollment Service, certificate management, Certificate Management Service, Certificate owner, certificate revocation list (CRL), Certificate Signing Request, Certificate Status Authority, certificate status server, Certificate Transparency, Certificate Usage Type, certificate-inventory management, certificate-related information, certification, Certification Agent, certification analyst, certification authority, Certification Authority System, Certification Authority Workstation, certification package, certification practice statement (CPS), certification test and evaluation, certified TEMPEST technical authority, certifier, CES, CESER, CF, CFATS, CFB, CFC, CFFB, CFI, CFO, CFOC, CFRDC, CFReDS, CFTT, CGE, CGI, CGN, cgroup, chain, chain of custody, chain of evidence, chain of trust, Chain-based proof of stake consensus model, Chained Secure Zone, chaining, Challenge, challenge and reply authentication, Challenge-Handshake Authentication Protocol, Challenge-Response Authentication Mechanism, Challenge-Response Protocol, Change Control Board, Change of Authorization, Channel, CHAP, characteristic, characterization, Chassis Management Controller, Check Fact Reference, check word, Checking Disabled, Checklist, Checklist Developer, Checklist Group, Checklist Revision, Checklist Role, Checklist Type, checksum are further acronyms with an extended explanation below.

    • Chemical Facility Anti-Terrorism Standards (CFATS) are security regulations designed to protect chemical facilities from terrorist attacks.

    • CHERI stands for Capability Hardware Enhanced RISC Instructions, a technology that enhances computer security.

    • Chief Artificial Intelligence Officer (CAIO), Chief Data Officer (CDO), Chief Executive Officer (CEO), Chief Financial Officer (CFO), Chief Information Officer (CIO), Chief Information Security Officer (CISO), Chief Learning Officer (CLO), Chief Operating Officer (COO), Chief Privacy Officer (CPO), Chief Product Security Officer (CPSO), Chief Risk Officer (CRO), Chief Security Officer (CSO), Chief Technology Officer (CTO) refer to various executive roles within an organization.

    • Children's Online Privacy Protection Act (COPPA) is a US law that protects children's privacy online.

    • Chinese Remainder Theorem is a mathematical theorem used in cryptography.

    • Choose Your Own Device (CYOD) is a workplace policy that allows employees to use their own devices for work.

    • Choreography is a method used to design and develop complex systems.

    • Chosen Ciphertext Attack, Chosen Plaintext Attack are types of cryptographic attacks that use adversary's ability to access plaintexts or ciphertexts.

    • CHUID stands for Customer Hardware Unique Identifier.

    • CHVP stands for Customer Hardware Validation Program.

    • CI is a short for Control Inventory.

    • CI/CD is a short for Continuous Integration and Continuous Delivery.

    • CIA represents Confidentiality, Integrity, and Availability, core principles of information security.

    • CIDAR stands for Common Industrial Data Acquisition and Reporting.

    • CIDR stands for Classless Inter-Domain Routing.

    • CIE stands for Commercial Internet Exchange.

    • CIF stands for Cost, Insurance, and Freight.

    • CIFS stands for Common Internet File System.

    • CIGRE stands for International Council on Large Electric Systems.

    • CIK stands for Central Index Key.

    • CIKR stands for Critical Infrastructure Key Resource.

    • CIM stands for Computer Integrated Manufacturing.

    • CIMA stands for Chartered Institute of Management Accountants.

    • CIP stands for Critical Infrastructure Protection.

    • CIPAC stands for Critical Infrastructure Partnership Advisory Council.

    • CIPH-1K(X), cipher, Cipher Block Chaining, Cipher Block Chaining - Message Authentication Code (CMAC), Cipher Feedback, cipher text, cipher text auto-key, Cipher-based Message Authentication Code, Ciphering Offset Number, ciphertext, Ciphertext Integrity, Ciphertext Integrity with Misuse-resistance, ciphertext-policy attribute-based encryption, CIPHK(X), CIPSEA, CIR, CIRC, Circuit, Circuit Switch Fallback, CIRT, CIS, CISA, Cisco Global Exploiter, Cisco's Internetwork Operating System, CISO, CISQ, Citect SCADA system, Cj, CJA, CJIS, CK, CKG, CKL, CKMS, CKMS component, CKMS design, CKMS designer, CKMS developer, CKMS hierarchy, CKMS implementer, CKMS module, CKMS product, CKMS PS, CKMS Security Policy, CKMS SP, CKMS vendor, CL are further acronyms related to cryptography, network security, and other fields.

    • claim, claimant, Claimed Address, Claimed Identity, Claimed signatory, classified information, classified national security information, Classless Inter-Domain Routing, clean host, clean word list, clear, clearance, cleartext, Clen, CLI, client, Client Application, Client Backup-Archive Client, Client Management Script Library, client node, Client-to-Authenticator Protocol, Clinical and Laboratory Standards Institute, CLO, clock, Cloned Tag, Closed Circuit Television, closed security environment, Closed Source Operating System, closed storage, Closed System, cloud access security broker, Cloud Auditor, Cloud Broker, Cloud Carrier, cloud computing, Cloud Consumer, cloud consumer or customer, cloud infrastructure, Cloud Native Computing Foundation, Cloud Provider, cloud provider or provider, Cloud Security Alliance, Cloud Security Policy Framework, Cloud Security Rubik's Cube, cloud service customer, Cloud Service Provider, Cloud workload, CloudSPF, CLR, CLSI, Cluster, Clustered Regularly Interspaced Short Palindromic Repeats, CM, cm, CMaaS, CMAC, CMC, CMCS, CMDAUTH, CMDB, CMIA, CMMI, CMOS, CMRR, CMS, CMSL, CMTC, CMUF, CMVP, CMYK, Cn, CN, CNA, CNAP, CNC, CNCF, CND, CNE, CNG, CNI, CNIC, CNO, CNP, CNSS, CNSS Directive, CNSSAM, CNSSD, CNSSI, CNSSP, CO, COA, coalition partner, CoAP, COBIT, code, code analysis, Code Division Multiple Access (CDMA), code group, Code of Federal Regulations, Code Signing Key, code vocabulary, codebook, Codec, coded, Coder-Decoder, COF, Cofactor Diffie-Hellman are additional acronyms and terms related to technology, security, and various fields.

    Additional information on terms and concepts

    • COFB, COG, Cognitive-based Approach to System Security Assessment, cognizant security officer/authority, COI, cold site, Collaborative Research and Development Agreement, Collaborative Robotic System, Collateral Damage Potential, collateral information, Collecting and Communicating Audit Trails, Collection, Collection System, Collector, collision, Collision resistance, COM, Combined Communications-Electronics Board, Combined Feedback, Command and Control, Command Authority, Command Line Interface, Command, Control, and Communications, Command, Control, Communications and Computers, Command, Control, Communications and Intelligence, Comma-Separated Value, commercial COMSEC evaluation program (CCEP), Commercial Remote Sensing Regulatory Affairs, commercial solutions for classified (CSfC), commercial-off-the-shelf (COTS), Commit-Chain, Committee Draft, Committee of Sponsoring Organizations, Committee of Sponsoring Organizations of the Treadway Commission, Committee on National Security Systems, Committee on National Security Systems Advisory Memorandum, Committee on National Security Systems Directive, Committee on National Security Systems Instruction, Committee on National Security Systems Policy, commodity service, common access card (CAC), Common Attack Pattern Enumeration and Classification, Common Biometric Exchange Formats Framework, common carrier, common configuration enumeration (CCE), common configuration scoring system (CCSS), common control, common control provider, common criteria, Common Criteria Evaluation and Validation Scheme, Common Event Format, common fill device (CFD), Common Gateway Interface, Common Industrial Protocol, Common Internet File System, Common Language Runtime, Common Name, Common Object Request Broker Architecture, common platform enumeration (CPE), common secure configuration, Common Security Control, common services provider (CSP), Common Tier 1, common user application software (CUAS), common vulnerabilities and exposures (CVE), Common Vulnerabilities and Exposures identifiers, Common Vulnerability Enumeration, common vulnerability scoring system (CVSS), common weakness enumeration (CWE), Common Weakness Scoring System, Communicate-P (Function), Communicating group, Communications, communications cover, communications deception, Communications Module, Communications Router, Communications Satellite, communications security, Communications Security Establishment, Communications Security, Reliability and Interoperability Council, Community cloud, Community Enterprise Operating System, community of interest (COI), Community of Practice, community risk, Compact Disc, Compact Disc Read-Only Memory, Compact Disc-Recordable, Compact Flash, Comparison, compartmentalization, Compatible security domains, compensating controls, compensating security control, Competency, competency area, competent security official, Competition for Authenticated Encryption: Security, Applicability, and Robustness, Complementary Error Function, Complementary Metal Oxide Semiconductor, Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA), complex system are further acronyms related to different domains.

    • Compliance audit, Compliance Mapping, component, Component Object Model, Component schema, Component specification, Component Test, composed commercial solution, Comprehensive Test, comprehensive testing, Compressed File, compromise, Compromise recovery, compromised key list (CKL), Compromised state, compromising emanations, COMPUSEC, Computed Tomography, Computer, computer abuse, Computer and Financial Investigations, Computer Crime and Intellectual Property Section, computer cryptography, Computer Emergency Readiness Team, Computer Emergency Response Team, Computer Emergency Response Team/Coordination Center, Computer Forensic Reference Data Sets, Computer Forensic Tool Testing, computer forensics, Computer Forensics Reference Data Sets, Computer Forensics Research and Development Center, Computer Forensics Tool Testing, Computer Incident Response Capability, Computer Incident Response Center, computer incident response team (CIRT), Computer Information Security Officer, Computer Integrated Manufacturing, computer network attack (CNA), computer network defense (CND), computer network exploitation (CNE), computer network operations (CNO), Computer Numerical Control, Computer Security Division, Computer Security Incident, Computer Security Incident Response Capability, Computer Security Incident Response Team (CSIRT), Computer Security Log Management, computer security object, Computer Security Program, Computer Security Resource Center, computer security subsystem, Computer System Security and Privacy Advisory Board, Computer-aided Dispatch, computerized telephone system (CTS), Computing Device, computing environment, COMSAT, COMSEC, COMSEC account, COMSEC account audit, COMSEC account manager, COMSEC aids, COMSEC assembly, COMSEC boundary, COMSEC chip set, COMSEC control program, COMSEC custodian, COMSEC demilitarization, COMSEC element, COMSEC emergency, COMSEC end-item, COMSEC equipment, COMSEC facility, COMSEC incident, COMSEC Incident Monitoring Activity, COMSEC insecurity, COMSEC manager, COMSEC material, COMSEC material control system, COMSEC module, COMSEC monitoring, COMSEC profile, COMSEC service authority, COMSEC software, COMSEC survey, COMSEC system data, COMSEC training, CONAUTH, Concatenation, concept, concept crosswalk, concept mapping, concept of operations, concept of secure function, concept relationship style, concept source, concept system, concept type, concern, concern (system), Concise Binary Object Representation, Condition coverage, Conditioning (of noise source output), conditioning function, Confidence interval, Confidential Compute Architecture, Confidential Computing, Confidential Information Protection and Statistical Efficiency Act, confidentiality, Confidentiality Impact, Confidentiality Key, Confidentiality Mode, confidentiality, integrity, availability, Configurable, configuration, configuration baseline, configuration control, configuration control board (CCB), Configuration Control Review Board, configuration item, configuration management, Configuration Management Database, configuration management plan, Configuration Payload, configuration settings, Configuration Settings Management, Confirmed, Conflict, Conflict resolution, Confluent Hypergeometric Function, Conformance Testing, Conformance Testing Methodology, Conformity Assessment, Connection Signature Resolving Key, CONOP, Consensus Audit Guidelines, Consensus model, consent banner, consequence, Consequence-Driven Cyber-Informed Engineering, Console, Consortium, Consortium for Information & Software Quality, Constrained Application Protocol, constraints, Consultative Committee for Space Data Systems, Consumer Infrared, consumer IoT product, Consumer Technology Association, consumer-grade router device, consumer-grade router product, Consuming Application, Contagion Research Center, Container, Container Network Interface, Container runtime, Container Runtime Interface, Container Storage Interface, Container-as-a-Service, Container-specific operating system, contamination, Content Addressable Storage, Content consumer, Content Delivery Networks, Content Generator, Content producer, content signing certificate, Content Type, contested cyber environment, Context, Context of Use, contingency key, contingency plan, Contingency Planning, continuity, continuity of government (COG), Continuity of Operations, continuity of operations plan (COOP), Continuous Asset Evaluation, Situational Awareness, and Risk Scoring, continuous authority to operate, Continuous Data Protection, continuous delivery/continuous deployment, Continuous Diagnostics and Mitigation (CDM), continuous integration and continuous deployment, continuous monitoring, Continuous Monitoring as a Service, continuous monitoring program, Continuous test, Continuous Threat Detection, Contract, Contract administration office, Contracting Officer Representative, control, Control Algorithm, Control and Provisioning of Wireless Access Points, Control and Status, control assessment, control assessment report, control assessor, control baseline, Control Cell, Control Center, control correlation identifier (CCI), control designation, control effectiveness, control enhancement, Control Group, control inheritance, Control Item, Control Loop, Control Network, Control Objectives for Information and Related Technologies, Control of Interaction Frequency, control parameter, Control Server, Control System, controlled, controlled access area, Controlled Access Program Coordination Office, controlled access protection, controlled area, controlled cryptographic item (CCI), controlled cryptographic item (CCI) assembly, controlled cryptographic item (CCI) component, controlled cryptographic item (CCI) equipment, controlled interface, controlled reception patterned antenna, controlled space, controlled unclassified information (CUI), Controlled Variable, Controller, Controller Area Network, controlling authority (CONAUTH), controlling domain, Control-P (Function), Conventional BIOS, Conversation, COO, cookie, COOP, cooperative key generation (CKG), cooperative remote rekeying, Cooperative Research and Development Agreement, Coordinated Universal Time, Coordination, Coordination Center, CoP, COP, COPE, COPPA, Copy (data), COR, CORBA, Core, Core Baseline, Core Root of Trust for Measurement (CRTM), Core Root of Trust for Verification, Core Software, Core Specification Addendum, Core Specification Addendum 5, Corporate-Owned Personally-Enabled (COPE), correct re-identifications, correctness proof, Correlation, Correlation Power Analysis, CORS, COSO, Cost/Benefit Analysis, CoT, COTR, COTS, Counter, Counter Mode, Counter mode for a block cipher algorithm are diverse terms related to various technology operations within a system.

    • Counter Mode with Cipher Block Chaining (CBC) Message Authentication Code (MAC) Protocol, counterfeit, counterintelligence, countermeasures, Country-code Top-level Domain, courier, Course of Action, cover (TRANSEC), coverage, Cover-Coding, covered entity, covert channel, covert channel analysis, covert storage channel, Covert Testing, covert timing channel, COW, CP, CP Assist for Cryptographic Functions, CPA, CP-ABE, CPACF, CPE, CPE Attribute Comparison, CPE Dictionary, CPE Name, CPE Name Comparison, CPE Name Matching, CPIC, CPLP, CPNI, CPO, CPRT, CPS, CPSO, CPSSP, CPU, CR, CRADA, Cradle, CRAM, CRC, CRD, Create, Read, Create, Read, Update, Delete, CREDC, credential, Credential Management, Credential Management System, credential service provider (CSP), Credit Card Number, CRI, Criminal Justice Information Services, CRISP, CRISPR, CRISPR-Associated Protein, CRISPR-Cas, critical AI system, critical component, critical infrastructure, Critical Infrastructure and Key Resources, Critical Infrastructure Partnership Advisory Council, Critical Infrastructure Protection, critical infrastructure sectors, Critical Infrastructure System, critical program (or technology), Critical Security Control, Critical Services, critical software, Critical Value, criticality, criticality analysis, criticality level, Criticality Reviews, CRL, CRO, Cross Agency Priority, cross certificate, cross domain, cross domain baseline list, cross domain capabilities, cross domain enabled, cross domain portal, cross domain service, cross domain solution (CDS), cross domain solution (CDS) filtering, cross domain sunset list, Cross-certification, Cross-certify, Cross-Domain Solutions, crosslinks, Cross-Origin Resource Sharing, Cross-site Request Forgery (CSRF), Cross-site Scripting (XSS), Crown Jewels Analysis, CRPA, CRR, CRS, CRSRA, CRT, CRTM, CRTV, CRUD, cryptanalysis, CRYPTO, Cryptocurrency, cryptographic, Cryptographic Accelerator, cryptographic alarm, Cryptographic algorithm, Cryptographic Algorithm Validation Program, Cryptographic Algorithm Validation System, cryptographic ancillary equipment (crypto-ancillary equipment), Cryptographic and Security Testing, Cryptographic and Security Testing Laboratory, Cr are additional acronyms and terms related to information and cyber security.

    Cryptography

    • Cryptographic API is a software interface that allows programmers to use cryptographic functions in their applications.
    • Cryptographic Application is any software that uses cryptography to protect data.
    • Cryptographic Authenticator is a hardware or software component that verifies the authenticity of a user or device.
    • Cryptographic binding is a cryptographic technique that links two or more pieces of data together.
    • Cryptographic boundary is a boundary that separates systems or networks that use cryptography.
    • Cryptographic checksum is a cryptographic hash function that is used to verify the integrity of data.
    • Cryptographic component is a hardware or software component that performs cryptographic operations.
    • Cryptographic device is a hardware device that performs cryptographic operations.
    • Cryptographic Engineering Research Group is a group of researchers who study cryptography.
    • Cryptographic equipment is any hardware or software that is used for cryptography.
    • Cryptographic erase is a process of erasing data from a storage device in a way that makes it impossible to recover.
    • Cryptographic function is a mathematical function that is used for cryptographic purposes.
    • Cryptographic hash function is a function that takes an input and produces a fixed-size output, called a hash.
    • Cryptographic Hash Value is the output of a cryptographic hash function.
    • Cryptographic high value product (CHVP) is a product that is considered to be of high value and is therefore subject to stringent security requirements.
    • Cryptographic Ignition Key is used to start a device or system.
    • Cryptographic incident is an event that involves the use of cryptography, such as a security breach.
    • Cryptographic initialization is the process of setting up a cryptographic system.
    • Cryptographic key is a piece of data that is used to encrypt or decrypt data.
    • Cryptographic key component is a part of a cryptographic key.
    • Cryptographic Key Management System Practice Statement is a document that outlines the key management practices of an organization.
    • Cryptographic Key Management System Security Policy is a document that outlines the security policies for a cryptographic key management system.
    • Cryptographic keying relationship is a relationship between two or more cryptographic keys.
    • Cryptographic logic is the design and implementation of cryptographic systems.
    • Cryptographic material is any data that is used for cryptographic purposes.
    • Cryptographic mechanism is a method or process that is used for cryptography.
    • Cryptographic Message Syntax is a standard that defines the format of cryptographic messages.
    • Cryptographic module is a hardware or software component that performs cryptographic operations.
    • Cryptographic Module Security Policy is a document that outlines the security policies for a cryptographic module.
    • Cryptographic Module Validation Program is a program that tests and certifies cryptographic modules.
    • Cryptographic Modules User Forum is a forum for users of cryptographic modules.
    • Cryptographic net (cryptonet) is a network that uses cryptography.
    • Cryptographic officer is a person who is responsible for cryptography in an organization.
    • Cryptographic operation is a process that is performed using cryptography.
    • Cryptographic period (cryptoperiod) is the length of time that a cryptographic key is in use.
    • Cryptographic primitive is a basic cryptographic function that can be used to build more complex cryptographic functions.
    • Cryptographic product is any product that uses cryptography.
    • Cryptographic randomization is the process of generating a random value using cryptography.
    • Cryptographic security (cryptosecurity) is the use of cryptography to protect data from unauthorized access.
    • Cryptographic service is a service that provides cryptographic functions.
    • Cryptographic solution is a system or method that is used for cryptography.
    • Cryptographic synchronization is the process of ensuring that two or more cryptographic systems are in sync.
    • Cryptographic system (cryptosystem) is a system that uses cryptography to protect data.
    • Cryptographic system analysis is the process of analyzing a cryptographic system to identify its strengths and weaknesses.
    • Cryptographic system evaluation is the process of testing and evaluating a cryptographic system.
    • Cryptographic system review is a periodic review of a cryptographic system.
    • Cryptographic system survey is a survey of cryptographic systems.
    • Cryptographic Technology Group is a group of experts in cryptography.
    • Cryptographic token is a physical object that contains cryptographic information.
    • Cryptographic Validation Program is a program that tests and certifies cryptographic products.
    • Cryptography is the practice and study of techniques for secure communication in the presence of adversarial behavior.
    • Cryptologic is the study of cryptography and cryptanalysis.
    • Cryptology is the science of secure communication.
    • Cryptonet evaluation report is a report that documents the evaluation of a cryptonet.
    • Cryptoperiod is the period of time for which a cryptographic key is used.
    • CS3STHLM is a Swedish research project on cybersecurity.
    • CSA is a Canadian Standards Association standard.
    • CSA5 is a Canadian Standards Association standard for cryptographic modules.
    • CSAM is an organization that provides cybersecurity services.
    • CSC is a Computer Sciences Corporation.
    • C-SCRM is a Cybersecurity and Software Risk Management control.
    • CSD is a Canadian Security Directorate.
    • CSE is a Canadian Centre for Cyber Security.
    • CSET is a Cyber Security Evaluation Tool.
    • CSF is a Cybersecurity Framework.
    • CSF Category is a broad category of cybersecurity risks.
    • CSF Community Profile is a profile of cybersecurity risks specific to a community.
    • CSF Core is the core set of cybersecurity functions.
    • CSF Current Profile is a profile of cybersecurity risks specific to the current time.
    • CSF Function is a specific cybersecurity function.
    • CSF Implementation Example is an example of how to implement a cybersecurity function.
    • CSF Informative Reference is a reference document that provides more information about a cybersecurity function.
    • CSF Organizational Profile is a profile of cybersecurity risks specific to an organization.
    • CSF Quick Start Guide is a guide to implementing the Cybersecurity Framework.
    • CSF Subcategory is a subcategory of cybersecurity risk.
    • CSF Target Profile is a profile of cybersecurity risks specific to a target.
    • CSF Tier is a level of cybersecurity maturity.
    • CSFB is a Canadian Security and Intelligence Service.
    • CSfC is a Cybersecurity Framework for Critical Infrastructure.
    • cSHAKE is a cryptographic hash function.
    • CSI is a Computer Security Institute.
    • CSIA is a Cybersecurity Information Sharing and Analysis Organization.
    • CSIM is a Cybersecurity Incident Management system.
    • CSIP is a Cybersecurity Incident Response Plan.
    • CSIRC is a Cybersecurity Incident Response Center.
    • CSIRT is a Computer Security Incident Response Team.
    • CSK is a cryptographic key.
    • CSM is a Cybersecurity Manager.
    • CSMS is a Cybersecurity Management System.
    • CSN is a Canadian Security Network.
    • CSO is a Chief Security Officer.
    • CSP is a Cloud Service Provider.
    • CSR is a Certificate Signing Request.
    • CSRC is a National Institute of Standards and Technology (NIST) Computer Security Resource Center.
    • CSRDA is the Cybersecurity Research and Development Act of 2002.
    • CSRF is a Cross-Site Request Forgery.
    • CSRIC is a Cybersecurity Research Institute.
    • CSRK is a cryptographic key.
    • CSRM is a Cybersecurity Risk Management system.
    • CSRR is a Cybersecurity Risk Register.
    • CSS is a Computer Security Standard.
    • CSSPAB is a Cybersecurity System Security Policy Advisory Board.
    • CST is a Cybersecurity Test.
    • CSTL is a Cybersecurity Training Lab.
    • CSV is a Comma Separated Value.
    • CT is a Cybersecurity Threat.
    • CT&E is a Cybersecurity Testing and Evaluation.
    • CT1 is a Cybersecurity Threat Intelligence.
    • CTA is a Cybersecurity Threat Actor.
    • CTAK is a Certified Threat Analysis and Knowledge.
    • CTAP is a Cybersecurity Training and Awareness Program.
    • CTC is a Cybersecurity Threat Center.
    • CTD is a Cybersecurity Threat Detection.
    • CTE is a Cybersecurity Threat Evaluation.
    • CTG is a Cybersecurity Threat Group.
    • CTI is a Cyber Threat Intelligence.
    • CTIA is a Cyber Threat Intelligence Analysis.
    • CTM is a Cybersecurity Threat Model.
    • CTO is a Chief Technology Officer.
    • CTR is a Counter-Rotation.
    • CTR_DRBG is a Counter-based Random Bit Generator. It is a deterministic random bit generator that is based on a counter.
    • Ctri is a Control and Response.
    • CTS is a Cybersecurity Threat Simulation.
    • CTSO is a Cybersecurity Threat Sharing Organization.
    • CTTA is a Cybersecurity Threat Tactics and Techniques.
    • CU is a Control Unit.
    • CUAS is a Counter-Unmanned Aircraft System.
    • CUI is Controlled Unclassified Information.
    • CUI categories are categories of information that are subject to CUI controls.
    • CUI Executive Agent is the person who is responsible for CUI.
    • CUI program is a program that manages CUI.
    • CUI registry is a registry of CUI.
    • Cumulative Distribution Function (CDF) F(x) is a function that describes the probability that a random variable will take on a value less than or equal to a given value.
    • Cumulative Sums Forward Test is a statistical test that helps to detect random number generators with flaws.
    • Current Profile is a profile of cybersecurity risks specific to the current time.
    • Current Year is the current year.
    • Custodian is the person who is responsible for a specific asset.
    • Custom Environment is a specific environment that is created for a particular purpose.
    • Custom Resource Definition is a definition of a custom resource.
    • customer is a person or organization that purchases goods or services.
    • Customer and Others in the IoT Product Ecosystem are customers of IoT products and services.
    • Customer-Specifiable is something that can be customized by the customer.
    • Customization is the process of making something specific to a customer's needs.
    • Customs and Border Patrol is a branch of the US Department of Homeland Security.
    • Cut is a reduction in the amount of something.
    • CVC is a Customer Verification Code.
    • CVE is a Common Vulnerabilities and Exposures.
    • CVE equivalent is a vulnerability that is equivalent to a CVE.
    • CVE ID is a unique identifier for a CVE.
    • CVE Naming Authority is the authority that assigns CVE IDs.
    • CVE Numbering Authority is the authority that assigns CVE numbers.
    • CVE Record Metadata is data about a CVE.
    • CVP is a Critical Vulnerability Patch.
    • CVSS is a Common Vulnerability Scoring System.
    • CVSS Special Interest Group is a group of experts in CVSS.
    • CVSS-SIG is the CVSS Special Interest Group.
    • CWE is a Common Weakness Enumeration.
    • CWI is a Control Weakness Identification.
    • CWSS is a Common Weakness Scoring System.
    • CY is Current Year.
    • Cyan, Magenta, Yellow, and Key (or blacK) are the four colors used in the CMYK color model.
    • Cyber is a term that refers to computer networks and the internet.
    • Cyber Attack is an attack that targets computer networks, systems, or data.
    • Cyber Cincinnati-Dayton Cyber Corridor is a regional initiative that focuses on cybersecurity.
    • Cyber Courses of Action are a set of actions that are taken to address a cyber threat.
    • Cyber ecosystem is a network of entities that interact in cyberspace.
    • Cyber incident is an event that involves a cyber threat.
    • Cyber Incident Data and Analysis Repository is a database that stores information about cyber incidents.
    • Cyber Incident Response Team is a team that responds to cyber incidents.
    • Cyber Mission Impact Analysis is an analysis of the potential impact of a cyber incident.
    • Cyber Observable eXpression is a language used to describe cyber observables.
    • Cyber range is a simulated environment that is used for cybersecurity training and testing.
    • Cyber Resilience Review is a review of an organization's cyber resilience.
    • Cyber resiliency is an organization's ability to withstand and recover from cyber attacks.
    • Cyber Resiliency and Survivability is the ability of an organization to withstand and recover from cyber attacks.
    • Cyber resiliency concept is a concept that defines cyber resilience.
    • Cyber resiliency construct is a framework that defines cyber resilience.
    • Cyber resiliency control is a control that helps to improve cyber resilience.
    • Cyber resiliency design principle is a principle that guides the design of cyber resilient systems.
    • Cyber resiliency engineering practice is a practice that is used to engineer cyber resilient systems.
    • Cyber Resilient Energy Delivery Consortium is a group of organizations that are working to improve the cyber resilience of the energy delivery system.
    • Cyber risk is the risk of a cyber attack.
    • Cyber Security is the practice of protecting computer networks and data from unauthorized access.
    • Cyber Security Assessment and Management is the process of assessing and managing cybersecurity risks.
    • Cyber Security Evaluation Tool is a tool that is used to evaluate cybersecurity risks.
    • Cyber Security Research and Development Act of 2002 is a US law that provides funding for cybersecurity research and development.
    • cyber survivability is an organization's ability to continue to operate effectively after a cyber attack.
    • Cyber Survivability Attributes are characteristics that contribute to an organization's cyber survivability.
    • Cyber Testing for Resilient Industrial Control Systems is a method for testing the cyber resilience of industrial control systems.
    • Cyber Threat is a potential threat to computer networks or data.
    • Cyber Threat Intelligence is information about cyber threats.
    • Cyber-Informed Engineering refers to engineering processes that take cybersecurity into account.
    • cybersecurity is the practice of protecting computer networks and data from unauthorized access.
    • Cybersecurity and Information Assurance is a field that focuses on protecting information systems.
    • Cybersecurity and Infrastructure Security Agency is a US agency that works to protect critical infrastructure from cyber threats.
    • Cybersecurity and Privacy Learning Program is a program that teaches cybersecurity and privacy.
    • Cybersecurity and Privacy Reference Tool is a resource that provides information on cybersecurity and privacy.
    • Cybersecurity and/or Privacy Learning Program manager is the manager of a cybersecurity and privacy learning program.
    • Cybersecurity Defense Community is a community of cybersecurity professionals.
    • Cybersecurity Enhancement Act of 2014 is a US law that strengthens federal cybersecurity efforts.
    • cybersecurity event is an event that focuses on cybersecurity.
    • Cybersecurity for Energy Delivery Systems is a field that focuses on protecting energy delivery systems from cyber threats.
    • Cybersecurity for Smart Manufacturing Systems is a field that focuses on protecting smart manufacturing systems from cyber threats.
    • Cybersecurity for the Operational Technology Environment is a field that focuses on protecting operational technology from cyber threats.
    • cybersecurity framework category is a broad category of cybersecurity risks.
    • cybersecurity framework core is the core set of cybersecurity functions.
    • cybersecurity framework function is a specific cybersecurity function.
    • cybersecurity framework profile is a profile of cybersecurity risks specific to an organization or system.
    • cybersecurity framework subcategory is a subcategory of cybersecurity risk.
    • Cybersecurity Incident is an event that involves a cyber threat.
    • Cybersecurity National Action Plan is a plan that outlines the US government's cybersecurity strategy.
    • cybersecurity outcome is the result of cybersecurity efforts.
    • Cybersecurity Risk is the risk of a cyber attack.
    • Cybersecurity Risk Information Sharing Program is a program that shares information about cybersecurity risks.
    • Cybersecurity Risk Management is the process of assessing and managing cybersecurity risks.
    • Cybersecurity Risk Register is a list of cybersecurity risks.
    • cybersecurity risks throughout the supply chain are cybersecurity risks that exist throughout the supply chain.
    • Cybersecurity State is the state of cybersecurity in a particular region or sector.
    • Cybersecurity Strategy and Implementation Plan is a plan that outlines an organization's cybersecurity strategy and implementation plan.
    • cybersecurity supply chain risk assessment is an assessment of the cybersecurity risks in a supply chain.
    • Cybersecurity Supply Chain Risk Management is the process of managing cybersecurity risks in a supply chain.
    • Cybersecurity Virtual Machine is a virtual machine that is used for cybersecurity purposes.
    • CybersecVM is a Cybersecurity Virtual Machine.
    • cyberspace is the global network of computers and their related devices.
    • cyberspace attack is an attack that targets computer networks, systems, or data.
    • cyberspace capability is a capability that is used in cyberspace.
    • cyberspace defense is the practice of protecting computer networks from attack.
    • cyberspace operations (CO) are operations that are conducted in cyberspace.
    • cyberspace superiority is the ability to dominate cyberspace.
    • CybOX is an open standard for describing cyber observables.
    • Cycle Time is the time it takes for a process to complete.
    • cyclic redundancy check (CRC) is a type of error detection code.
    • CYOD is Choose Your Own Device.
    • CyOTE is Cyber Operations Training Environment.
    • CyTRICS is a network security product.

    Data Security Standards

    • Data Security Standard (DSS) is a set of security guidelines and requirements for organizations that handle sensitive data, particularly financial information.
    • Data Security Standard Payment Card Industry (DSS PCI) is a specific DSS aimed at protecting credit card data.

    Data Concepts

    • Data is raw, unprocessed information.
    • Data integrity ensures the accuracy and completeness of data.
    • Data privacy is the right of individuals to control how their personal information is collected, used, and disclosed.
    • Data governance is a framework for managing data across an organization to ensure its quality, security, and compliance.
    • Data mining is the process of extracting meaningful patterns from large datasets.

    Networking and Communication

    • Datagram Transport Layer Security (DTLS), a protocol that provides secure communication for datagrams, which are independent units of data transmission.
    • Domain Name System (DNS), a hierarchical and distributed naming system that translates human-readable domain names into numerical IP addresses for computers.
    • Domain Name System Security Extensions (DNSSEC), an extension to DNS that provides cryptographic validation of domain names to prevent spoofing and other attacks.
    • Direct-Sequence Spread Spectrum (DSSS), a technique used for wireless communication that spreads data over a wide frequency band to improve resistance to interference and jamming.
    • D/A (Digital to Analog), a type of converter that changes digital signals into analog signals.

    Security Concepts

    • Decryption is the process of converting encrypted data back into its original, readable format.
    • Diffie-Hellman (DH) key exchange is a cryptographic method for securely exchanging keys over an insecure channel.
    • Denial-of-service (DoS) attack is a cyberattack aimed at making a computer or network resource unavailable to legitimate users.
    • Defensive Design is a security approach that incorporates security considerations into the design and development of software and hardware.
    • Demilitarized zone (DMZ) is a network segment between a public network (like the internet) and a private network, acting as a buffer between the two.
    • Data Diode is a unidirectional device that allows data to flow only in one direction, preventing information from flowing back to the source.

    Cybersecurity

    • Cybersecurity refers to protecting computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction.
    • Defense-in-depth is a security strategy that uses multiple layers of security controls to protect valuable assets.
    • De-identification is a process of removing or replacing personally identifiable information from data, making it more difficult to trace data back to individuals.
    • Degradation refers to a decline in the security posture of a system or network, often due to vulnerabilities or attacks.

    Hardware and Software

    • Device Cybersecurity Capability, a set of security functionalities and capabilities required for a device to be considered secure.
    • Digital Signal Processor (DSP), an integrated circuit designed to perform digital signal processing operations such as filtering, modulation, and decoding.
    • Dynamic Link Library (DLL), a type of library file that contains functions and resources shared by multiple programs on a computer.
    • Direct Random String (DRS), a method of generating random strings without human involvement to enhance security.

    Other

    • Database Management System (DBMS), a software application used to create, manage, and access databases, which are organized collections of data.
    • Domain authority is a metric used to evaluate the credibility and influence of a website.
    • Disaster Recovery is the process of restoring IT systems and operations after a disruptive event.
    • Designated Accrediting Authority is an entity responsible for approving the security posture of IT systems and networks.
    • Direct Memory Access (DMA) is a feature that allows devices to access system memory directly, bypassing the central processing unit (CPU), which can improve performance.
    • Data Object, a discrete unit of data that can be accessed and manipulated by software applications.

    Data and Information Security

    • 3DES: Triple DES is a block cipher that encrypts data three times using the Data Encryption Standard (DES).
    • D/A: Digital to Analog Converter converts digital signals into analog signals.
    • D/RTBH: Destination-based Remotely Triggered Black-Holing is a mechanism used to block traffic from specific destinations.
    • D/S: Data/Signal refers to the combination of data and signal information.
    • D2D: Device-to-Device refers to the direct communication between two devices.
    • DA: Daily Account - A type of account used for personal transactions.
    • DAA: Designated Approval Authority is an individual designated to approve requests or actions.
    • DAC: Discretionary Access Control allows users to specify access rights to specific files or objects.
    • DACL: Discretionary Access Control List is a list of permissions granted to users and groups for a particular object.
    • DACUM: Developing a Curriculum - A process designed to create and enhance educational curricula.
    • DAD: Digital Asset Database - A database used to manage and track digital assets.
    • DAG: Directed Acyclic Graph - A type of graph used to represent directed relationships without circular dependencies.
    • damage: Any harm or disruption to a system or data.
    • damage-limiting operations: Actions taken to minimize the impact of damage or a security breach.
    • DAML: DARPA Agent Markup Language - A markup language used to describe agents and their capabilities.
    • DANE: DNS-Based Authentication of Named Entities - A method used to securely associate a domain name with a specific entity.
    • DAO: Decentralized Autonomous Organization - A type of organization that operates autonomously using blockchain technology.
    • DAPA: Department of Agency Procedures & Administr. - Department that manages agency procedures and administrative processes within an institution.
    • DAR: Defense Acquisition Regulation - Regulations that govern the acquisition of goods and services for the United States Department of Defense
    • DARPA: Defense Advanced Research Projects Agency - A U.S. Department of Defense agency responsible for the development of emerging technologies.
    • DARPA Agent Markup Language: A markup language used to describe agents and their capabilities.
    • DAS: Direct Attached Storage - Storage that is directly connected to a computer.
    • DASH7: A wireless communication protocol used for industrial automation and control.
    • Dashboard: A visual representation of key performance indicators (KPIs) and data.
    • DAST: Dynamic Application Security Testing - A type of security testing that analyzes running applications.
    • Data Access: Permission or authorization to access specific information.
    • Data Access Object: An object that provides access to data.
    • data accuracy: The reliability and correctness of data.
    • data aggregation: The process of collecting data from multiple sources and combining it into a single dataset.
    • data asset: Any information or data that has value to an organization.
    • Data Block: A group of data that is transmitted together.
    • data center group: A group of data centers that operate together.
    • Data Collector: A system or device used to gather data.
    • data dictionary: A collection of definitions for data elements.
    • Data Diode: A device that allows data to flow in one direction only.
    • data element: A specific piece of data, such as a name or address.
    • Data Encryption Algorithm: An algorithm used to encrypt data.
    • Data Encryption Standard (DES): A symmetrical block cipher that uses a 56-bit key and 64-bit blocks.
    • Data Execution Prevention: A security feature that prevents the execution of data.
    • data flow control: The management of the flow of data through a system.
    • Data Governance: A set of policies and procedures designed to ensure the quality and security of data.
    • Data Historian: A system used to store and manage historical data.
    • Data in Transit: Data that is being transmitted over a network.
    • data integrity: The consistency and accuracy of data.
    • data intruder: A malicious actor who seeks to access or modify data without authorization.
    • data life cycle: The various stages of data from its creation to its disposal.
    • Data Link Layer: The second layer in the OSI model, responsible for managing data transmission between devices.
    • data linking: The process of combining data from multiple sources.
    • data loss prevention: Measures taken to prevent the loss of data.
    • Data Management Officer: An individual responsible for the management of data within an organization.
    • data mining: The process of extracting knowledge and insights from large datasets.
    • Data Object: A piece of data that is stored and managed as a single entity.
    • data origin authentication: The process of verifying the source of data.
    • data privacy: The protection of personal data.
    • Data Processing: The manipulation and transformation of data.
    • data provenance: The history of data, including its origin, transformations, and uses.
    • data spillage: The unauthorized movement of data outside its intended scope.
    • data subjects: Individuals whose personal data is processed.
    • Data Transfer Device: A device used to transfer data between systems.
    • data transfer solution: A solution that enables the transfer of data between systems or locations.
    • data universe: The complete set of data that an organization has.
    • data-at-rest: Data that is stored on a device or system.
    • Database: An organized collection of structured information.
    • Database Administrator: An individual responsible for the management of a database.
    • Database Management System: Software used to create, manage, and access databases.
    • Database of Genotypes and Phenotypes: A database that contains genetic and phenotypic information about individuals.
    • Datagram Congestion Control Protocol: A protocol used to control congestion in datagram networks.
    • Datagram Transport Layer Security: A protocol designed for securing datagram networks.
    • Dataset: A collection of related data.
    • Date of Birth: The individual's date of birth.
    • DB: Database - an organized collection of information.
    • DBA: Database Administrator, who manages a database, ensuring availability, security, and performance.
    • DbGaP: Database of Genotypes and Phenotypes, a database containing genetic and phenotypic information.
    • dBm: Decibels relative to one milliwatt, a unit of power measurement.
    • DBMS: Database Management System, software used to create, manage, and access databases.
    • DC: Data Center, a facility housing computer systems and related equipment.
    • DC3: The Data Center Council, a non-profit organization focused on data center best practices.
    • DCCP: Datagram Congestion Control Protocol, a protocol used to control congestion in datagram networks.
    • DCE: Distributed Computing Environment, a computing environment that allows different computers to work together.
    • DCG: Data Center Group, a group of data centers that operate together.
    • DCID: Director of Central Intelligence Directive, a directive issued by the Director of National Intelligence.
    • DCISE: Defense Cyber Crime Center, a center dedicated to combating cybercrime.
    • DCMA: Defense Contract Management Agency, an agency responsible for managing contracts for the Department of Defense.
    • DCMS: Defense Communications and Meteorological Satellite, a satellite used by the U.S. Department of Defense.
    • DCO: Defensive Cyberspace Operation, actions employed by the Department of Defense to defend against attacks.
    • DCO-RA: Defensive cyberspace operation response action, a specific action taken within a DCO.
    • DCRTM: Defense Cyber Response Training Model, a model used to train defenders for cyberattacks.
    • DCS: Defense Communications System, a system used by the Department of Defense for secure communication.
    • dd: A command-line utility used to copy or convert data.
    • DD VE: Data Domain Virtual Edition, a virtualized version of the Data Domain storage system.
    • DDIL: Digital Device Interoperability Layer, a layer that provides interoperability between digital devices.
    • DDMS: Defense Discovery Metadata Standard, a standard used to describe and exchange metadata within the Department of Defense.
    • DDNS: Dynamic Domain Name System, a system that dynamically updates DNS records.
    • DDoS: Distributed Denial of Service, a type of cyberattack where multiple computers are used to overwhelm a target.
    • DE: Derived PIV Credential, a credential derived from a PIV credential.
    • DEA: Data Encryption Algorithm, an algorithm used to encrypt data.
    • Deactivated state: State where a system or device is not operational.
    • Dead Peer Detection: A technology used to identify when a peer node in a communication network is no longer operational.
    • decapsulation: The process of removing an outer layer of data from a packet.
    • decapsulation key: A key used to decrypt the outer layer of a packet.
    • Decentralized Autonomic Data: A type of data management system that is decentralized and self-governing.
    • Decentralized Autonomous Organization (DAO): An organization that operates autonomously using blockchain technology.
    • Decentralized Exchange (DEX): A cryptocurrency exchange that operates without a central authority.
    • decentralized finance (DeFi): Financial services that operate on decentralized networks.
    • Decentralized Identifier: A unique identifier that is not controlled by a central authority.
    • Decentralized network: A network that is not controlled by a central authority.
    • decertification: The process of revoking a certification.
    • Decibels referenced to one milliwatt (dBm): A unit of power measurement.
    • decipher: To decrypt a message.
    • Decision or branch coverage: A type of code coverage that ensures all branches of a program are tested.
    • decision tree: A data structure used to represent decision rules.
    • decode: The process of converting data from an encoded form to an understandable form.
    • decrypt: To convert encrypted data back to its original form.
    • Decryption: The process of converting encrypted data back to its original form.
    • decryption key: A key used to decrypt a message.
    • Decryption-Verification: The process of decrypting a message and verifying its authenticity.
    • Dedicated Proxy Server: A type of proxy server that is dedicated to serving a single purpose.
    • Deep Packet Inspection (DPI): A technique used to analyze the content of network packets.
    • default classification: The default security classification assigned to data.
    • Defect: An error or flaw in a system or process.
    • Defect Check: A systematic test to identify defects in software.
    • Defense Contract Management Agency: An agency responsible for managing contracts for the Department of Defense.
    • Defense Courier Service: A service for secure transport of sensitive information.
    • Defense Cyber Crime Center: A center dedicated to combating cybercrime.
    • Defense Discovery Metadata Standard (DDMS): A standard used to describe and exchange metadata within the Department of Defense.
    • Defense Federal Acquisition Regulations Supplement (DFARS): A supplement to the Federal Acquisition Regulations that applies to the Department of Defense.
    • Defense Industrial Base (DIB): The network of companies and organizations that support the U.S. military.
    • Defense Industrial Base Cybersecurity Sharing (DIB CS): A program that encourages information sharing between the DIB and the government.
    • Defense Information System Network (DISN): The Department of Defense's secure network.
    • Defense Information Systems Agency (DISA): An agency responsible for providing information technology services to the Department of Defense.
    • Defense Intelligence Agency (DIA): The intelligence agency for the Department of Defense.
    • Defense Science Board (DSB): A board that advises the Secretary of Defense on science and technology issues.
    • defense-in-breadth: A security strategy that involves protection across a wide range of systems, networks, and data.
    • defense-in-depth: A security strategy that involves multiple layers of defense.
    • defensive cyberspace operation response action (DCO-RA): A specific action taken within a defensive cyberspace operation.
    • defensive cyberspace operations (DCO): Actions employed by the Department of Defense to defend against attacks.
    • Defensive Design: A design approach that incorporates security considerations from the beginning.
    • DeFi: Decentralized Finance, financial services that operate on decentralized networks.
    • Degauss: To remove magnetic information from a storage device.
    • Degradation: A decline in performance or quality.
    • Degraded Cybersecurity State: A state where the cybersecurity posture of a system has been compromised.
    • de-identification: The process of removing or replacing identifying information.
    • de-identification model: A framework used to de-identify data.
    • de-identified information: Data that has been de-identified..
    • delay (path delay): The time it takes for a signal to travel from one point to another.
    • Delegation Signer: An individual authorized to delegate a task.
    • deleted file: A file that has been removed from a storage device.
    • Delivery Status Notification: A notification sent to the sender of an email indicating the delivery status.
    • delivery-only client (DOC): A client application that only handles the delivery of content.
    • Dell Remote Access Controller: A web-based interface for remotely managing Dell computers.
    • Dell Trusted Device: A device that has been certified by Dell as meeting certain security standards.
    • demilitarize: To remove military capabilities from a system or device.
    • demilitarized zone (DMZ): A network perimeter that separates internal networks from the external internet.
    • DeNB: Donor eNodeB, a base station in a cellular network that shares resources with another base station.
    • denial of service (DoS): A type of cyberattack that aims to prevent legitimate users from accessing a system.
    • Denied, Disrupted, Intermittent, and Limited Impact: A range of possible impacts of a cyberattack.
    • Deny by Default: A security policy that denies access unless it is explicitly granted.
    • Deoxyribonucleic acid (DNA): The genetic material found in all living organisms.
    • DEP: Data Execution Prevention, a security feature that prevents the execution of data.
    • Department of Commerce: A U.S. government department responsible for promoting economic growth and competitiveness.
    • Department of Defense: The U.S. government department responsible for providing military forces to defend the nation.
    • Department of Defense Directive (DoDD): A directive issued by the U.S. Department of Defense.
    • Department of Defense information network operations: Operations related to the Department of Defense's information networks.
    • Department of Defense information networks (DODIN): The Department of Defense's computer networks.
    • Department of Defense Instruction (DoDI): An instruction issued by the U.S. Department of Defense.
    • Department of Defense Manual (DoDM): A manual issued by the U.S. Department of Defense.
    • Department of Education Disclosure Review Board: A board that reviews requests for the release of educational records.
    • Department of Energy: A U.S. government department responsible for promoting energy independence and security.
    • Department of Health and Human Services: A U.S. government department responsible for protecting the health of Americans.
    • Department of Homeland Security: A U.S. government department responsible for protecting the homeland from terrorism and other threats.
    • Department of Transportation: A U.S. government department responsible for promoting safe and efficient transportation.
    • Department of Veterans Affairs: A U.S. government department responsible for providing benefits to veterans.
    • Department/Agency: A government organization or unit.
    • deprecated: No longer supported or recommended for use.
    • Deprecated Identifier Name: A name that is no longer recommended for use.
    • depth: The measurement of the distance from one point to another.
    • DER: Digital Encoding Rules, encoding rules for digital certificates.
    • De-registration (of a key): The process of removing a key from a system.
    • derived credential: A credential that is derived from another credential.
    • Derived Personal Identity Verification (PIV): A type of credential that uses biometric data to verify identity.
    • Derived Personal Identity Verification Credential: A credential derived from a PIV credential.
    • Derived PIV Application: A credential derived from a PIV credential.
    • Derived PIV Credential: A credential derived from a PIV credential.
    • Derived PIV Credential Management System: A system used to manage derived PIV credentials.
    • Derived PIV Credentials: Credentials derived from a PIV credential.
    • Derived Relationship Mapping: A mapping that shows the relationships between different pieces of data.
    • derived requirement: A requirement that is derived from another requirement.
    • Derived Test Requirement: A test requirement that is derived from another requirement.
    • Derived PIV Credential Issuer: An entity that issues derived PIV credentials.
    • DES: Data Encryption Standard - A symmetrical block cipher with a 56-bit key and 64-bit blocks for encrypting data.
    • descriptive label: A label that describes the purpose or content of data.
    • design: The process of creating a plan or specification for a system or product.
    • design characteristics: The features or properties of a design.
    • design margin: The difference between the design requirements and the actual performance of a system.
    • design principle: A guiding principle that influences the design of a system.
    • Designated Accrediting Authority: An entity that is authorized to accredit systems.
    • designated approval authority (DAA): An individual authorized to approve requests for access to classified information.
    • designated cipher function: A specific encryption algorithm used for a particular purpose.
    • designing for cyber resiliency and survivability: Incorporating security features into a system to enhance resilience and survivability.
    • Desired State: The desired or target state of a system.
    • Desired State Specification: A document that outlines the desired state of a system.
    • Destination Address: The address of the recipient of a message or data.
    • Destination Network Address Translation: A method used to change the destination address of network packets.
    • destroy: To permanently delete or erase data or a physical device.
    • Destroyed state: A state where a system or device is no longer operational.
    • Destruction: The act of destroying data or a physical device.
    • DET: Data Element Tag, a tag used to identify a data element.
    • detailed assessment: A comprehensive evaluation of a system or process.
    • Detect: To discover or identify something, such as a security threat.
    • detect (CSF function): One of the functions defined in the Cybersecurity Framework (CSF) - focused on identifying potential threats.
    • Detect, Anomalies and Events: A CSF (Cybersecurity Framework) function designed to detect anomalies and events that could indicate a security threat.
    • Deterministic Algorithm: An algorithm that produces the same output for a given input.
    • Deterministic Random Bit Generator: A mechanism for generating random bits based on a deterministic algorithm.
    • developer: An individual who creates software or applications.
    • Developers Alliance for Standards Harmonization (DASH): An alliance of developers working to harmonize standards.
    • Developing the Curriculum: A process designed to create and enhance educational curricula.
    • Development Kit (DevKit): A set of tools and resources for developing software or applications.
    • Development Operations (DevOps): A methodology that emphasizes collaboration between development and operations teams.
    • Development, Security, and Operations (DevSecOps): A methodology that incorporates security considerations into the entire software development lifecycle.
    • Device: A physical component of a system.
    • Device Cybersecurity Capability: The security capabilities of a device.
    • Device Cybersecurity Capability Core Baseline: A minimum set of security capabilities for a device.
    • device distribution profile: A profile that defines the distribution of devices.
    • Device Identifier: Unique identifier for a specific device.
    • Device Identifier Composition Engine: An engine that generates device identifiers.
    • Device Identity: Information that identifies a particular device.
    • device registration manager: A system responsible for managing device registrations.
    • Device Role: The function or purpose of a device.
    • DevID: Device Identifier, a unique identifier for a specific device.
    • Devkit: Development Kit, a set of tools and resources for developing software or applications.
    • DevOps: Development Operations, a methodology that emphasizes collaboration between development and operations teams.
    • DevSecOps: Development, Security, and Operations - A methodology that incorporates security considerations into the entire software development lifecycle.
    • DEX: Decentralized Exchange, a cryptocurrency exchange that operates without a central authority.
    • DFA: Differential Fault Attack, a type of cryptanalytic attack.
    • DFARS: Defense Federal Acquisition Regulations Supplement, a supplement to the Federal Acquisition Regulations that applies to the Department of Defense.
    • DFW: Distributed Firewall, a type of firewall deployed across multiple locations.
    • DG: Data Group, a group of related data elements.
    • DH: Diffie-Hellman, a key exchange algorithm.
    • DHCP: Dynamic Host Configuration Protocol, a protocol used to automatically assign IP addresses to devices.
    • DHE: Diffie-Hellman ephemeral, a variant of the Diffie-Hellman algorithm.
    • DHHS: Department of Health and Human Services.
    • DHK: Diffie-Hellman Key, a secret key shared between two parties using Diffie-Hellman key exchange.
    • DHkey: Diffie-Hellman key, a cryptographic key.
    • DHS: Department of Homeland Security.
    • DI: Digital Identity, a unique identifier that represents an individual or entity in a digital environment.
    • DIA: Defense Intelligence Agency, the intelligence agency for the Department of Defense.
    • Diabetes Technology Social (DTS): A group focused on the use of technology to manage diabetes.
    • DIACAP: Department of Defense Information Assurance Certification and Accreditation Process.
    • Diagnostics: The process of identifying and analyzing problems.
    • DIB: Defense Industrial Base, the network of companies and organizations that support the U.S. military.
    • DIB CS: Defense Industrial Base Cybersecurity Sharing, a program that encourages information sharing between the DIB and the government.
    • DICE: Digital Interoperability and Collaboration Environment, a platform for digital collaboration.
    • DICOM: Digital Imaging and Communications in Medicine, a standard for medical imaging.
    • Dictionary: A list of definitions and terms.
    • Dictionary Contributor: An individual who contributes to a dictionary.
    • Dictionary Creator: A person who creates a dictionary.
    • Dictionary Maintainer: An individual responsible for maintaining a dictionary.
    • Dictionary Management Documents: Documents related to the management of a dictionary.
    • Dictionary Search: The process of searching for a term or definition in a dictionary.
    • Dictionary User: Someone who uses a dictionary.
    • DICWG: Digital Instrumentation and Control Working Group, a group that focuses on digital instrumentation and control.
    • DID: Decentralized Identifier, a unique identifier that is not controlled by a central authority.
    • Differential Analysis aided Power Attack: A type of side-channel attack.
    • Differential Fault Attack: A type of cryptanalytic attack that exploits errors introduced into a device.
    • Differential Power Analysis: A type of side-channel attack that analyzes power consumption to gain information about a cryptographic algorithm.
    • differential privacy: A technique used to protect the privacy of individuals in datasets.
    • Differential Quaternary Phase Shift Keying (DQPSK): A type of digital modulation where data is encoded as different phase changes.
    • Differentiated Services Code Point (DSCP): A mechanism used to classify network traffic based on priority.
    • Diffie Hellman (algorithm): A key exchange algorithm that allows two parties to establish a shared secret key over an insecure channel.
    • Diffie-Hellman (algorithm): A key exchange algorithm that allows two parties to establish a shared secret key over an insecure channel.
    • Diffie-Hellman Key: A secret key shared between two parties using Diffie-Hellman key exchange.
    • Diffie-Hellman key exchange: A protocol used for establishing a shared secret key between two parties over an insecure channel.
    • Digest: A condensed summary of a message or document.
    • Digital: Relating to information that is represented in a binary form.
    • Digital asset: Any information or data that has value to an organization.
    • Digital Authentication: The process of verifying the identity of a user or device.
    • Digital Certificate: An electronic document used to verify the identity of a user or device.
    • Digital Evidence: Electronic data that is admissible in a court of law.
    • Digital Fingerprint: A unique identifier for a digital file.
    • digital forensics: The investigation of computer systems for evidence.
    • digital identity: A unique identifier that represents an individual or entity in a digital environment.
    • digital infrastructure: The network of hardware and software that supports digital operations.
    • digital media: Media that uses digital technology to store and transmit information.
    • Digital Policy: A set of rules and guidelines that govern the use of digital technology.
    • Digital Policy Management: The process of managing digital policies.
    • Digital Rights Management (DRM): A technology used to protect copyrighted material.
    • Digital Security by Design: The process of incorporating security into the design of a system.
    • Digital Signal Processor (DSP): A digital circuit designed to process signals.
    • digital signature: Electronic signature that uses cryptography to verify the authenticity of a message or document.
    • Digital Signature Algorithm: A cryptographic algorithm used to generate digital signatures..
    • Digital Signature Standard: A standard for creating and verifying digital signatures.
    • Digital Subscriber Line (DSL): Technology that uses existing telephone lines to provide high-speed internet access.
    • Digital Versatile Disc-Recordable (DVD-R): A type of optical disc for writing data.
    • Digital Video Disc (DVD): A type of optical disc for storing data.
    • Digital Video Recorder (DVR): A device that records video.
    • Digitization: The process of converting analog data into digital format.
    • DIMA: Digital Identity Management Architecture, a framework for managing digital identities.
    • DIMM: Dual In-Line Memory Module, a type of memory module.
    • direct BLACK wireline: A type of communication link that is hardened against interference.
    • Direct Current (DC): A type of electrical current that flows in one direction.
    • Direct Digital Manufacturing (DDM): A type of manufacturing process that uses digital models to create products.
    • direct identifier: A specific piece of data that identifies an individual or entity.
    • direct identifying data: Data that directly identifies a specific person or entity.
    • Direct Memory Access (DMA): A technology that allows a device to directly access computer memory.
    • Direct Platform Data: Data that is collected directly from a platform.
    • Direct Random String: A randomly generated string of characters.
    • Directed Acyclic Graph (DAG): A type of graph used to represent directed relationships without circular dependencies.
    • Directly Attached Storage (DAS): Storage that is directly connected to a computer.
    • directly identifying variables: Variables that directly identify a specific person or entity.
    • Director Central Intelligence Directive (DCID): A directive issued by the Director of National Intelligence.
    • Director of National Intelligence (DNI): The individual responsible for overseeing the U.S. intelligence community.
    • Directory: A list of files or folders.
    • Directory Services Protector: A service that protects a directory from unauthorized access.
    • Directory Services Restore Mode: A mode used to restore a directory.
    • Direct-Sequence Spread Spectrum: A type of communication system that uses spread spectrum technology.
    • Direct-To-Consumer (D2C): A business model where products or services are sold directly to consumers.
    • dirty word list: A list of words or phrases that are considered inappropriate.
    • DIS: Defense Information System, the Department of Defense's computer system.
    • DISA: Defense Information Systems Agency, an agency responsible for providing information technology services to the Department of Defense.
    • disallowed: Not permitted or authorized.
    • disassociability: The ability to separate a piece of data from its source.
    • Disaster Recovery: The process of restoring operations after a disaster.
    • disaster recovery plan (DRP): A plan to manage disasters and restore operations.
    • disciplined oscillator: A type of oscillator that produces a very stable signal.
    • disclosure: The act of revealing information.
    • disclosure limitation: Measures taken to restrict the disclosure of information.
    • Disclosure Review Board: A Board that reviews requests for the release of information.
    • Discovery: The process of identifying and collecting data.
    • Discovery Service: A service that helps to locate resources.
    • Discrete Fourier Transform Test: a test used to detect defects in digital circuits.
    • Discrete Logarithm Cryptography: A type of cryptography based on the difficulty of solving the discrete logarithm problem.
    • Discrete Process: A process that is independent of other processes.
    • discretionary access control (DAC): A type of access control where users can specify access permissions for files or objects.
    • Discretionary Access Control List: A list of permissions granted to users for a particular object.
    • discussion: A conversation or debate.
    • Disinfecting: The process of removing malware from a system.
    • disinformation: False or misleading information.
    • Disintegration: The process of breaking down a system or data.
    • disk image: A copy of the contents of a hard drive..
    • Disk Imaging: The process of creating a disk image.
    • Disk-to-Disk Copy: Copying data from one hard drive to another.
    • Disk-to-File Copy: Copying data from a disk to a file. .
    • DISN: Defense Information System Network, the Department of Defense's secure network.
    • Disposal: The process of getting rid of data or a system.
    • disruption: An interruption or interference with a system or process.
    • distinguishable information: Information that can be readily differentiated from other information.
    • distinguished name (DN): A unique identifier for an entity in a directory.
    • distinguishing identifier: Unique identifier used to differentiate one entity or resource from another.
    • Distributed Computing Environment: A computing environment that allows different computers to work together.
    • distributed denial of service (DDoS): A type of cyberattack where multiple computers are used to overwhelm a target.
    • distributed energy resource: A source of energy located within a distributed network.
    • Distributed Firewall: A type of firewall deployed across multiple locations.
    • Distributed Ledger Technology (DLT): A type of technology that enables the secure and transparent recording of transactions.
    • Distributed Logical Router: A virtual router that operates across a network.
    • Distributed network: A network that spans multiple locations.
    • Distributed Network Protocol (DNP3): A protocol used to communicate with devices in a distributed network.
    • distributed self-assessment: A self-assessment conducted by multiple teams or organizations.
    • Distribution: The act of sending data or information to multiple recipients.
    • Distribution System: A system that distributes data or information.
    • District of Columbia: A U.S. territory located in the capital city of Washington, D.C.
    • Disturbance: An interruption or disruption to a system or process.
    • DIT: Digital Identity Trust, the level of trust associated with a digital identity.
    • DITSCAP: Defense Information Technology Security Certification and Accreditation Process, a Department of Defense process for certifying and accrediting IT systems.
    • DIV: Diversifier, a cryptographic component used to add randomness to a system.
    • Diversifier: A cryptographic component used to add randomness to a system.
    • Diversifier Hiding Key: A key used to hide a diversifier.
    • Diversionary: Designed to divert attention or resources.
    • DKEYx(Y): Derived PIV Key, a key derived from a PIV credential.
    • DKIM: DomainKeys Identified Mail, a method used to verify the authenticity of email messages.
    • DLC: Data Link Control, a protocol used to manage data transmission on a data link.
    • DLL: Dynamic Link Library, a library of code that can be loaded by multiple programs.
    • DLO: Data Loss Prevention, measures taken to prevent the loss of data.
    • DLP: Data Loss Prevention, measures taken to prevent the loss of data.
    • DLR: Distributed Logical Router, a virtual router that operates across a network.
    • DLT: Distributed Ledger Technology, a type of technology that enables the secure and transparent recording of transactions.
    • DMA: Direct Memory Access, a technology that allows a device to directly access computer memory.
    • DMARC: Domain-based Message Authentication, Reporting and Conformance, a method used to authenticate emails.
    • DMZ: Demilitarized Zone, a network perimeter that separates internal networks from the external internet.
    • DN: Distinguished Name, a unique identifier for an entity in a directory.
    • DNA: Deoxyribonucleic acid, the genetic material found in all living organisms.
    • DNAT: Destination Network Address Translation, a method used to change the destination address of network packets.
    • DNI: Director of National Intelligence, the individual responsible for overseeing the U.S. intelligence community.
    • DNP3: Distributed Network Protocol, a protocol used to communicate with devices in a distributed network.
    • DNS: Domain Name System, a hierarchical and decentralized naming system for computers, services, or other resources connected to the Internet or a private network.
    • DNS Administrator: An individual responsible for managing a DNS server..
    • DNS Full Zone Transfer Query Type: A type of DNS query that retrieves all records for a specific domain.
    • DNS Security Extensions (DNSSEC): A set of security extensions for the DNS.
    • DNS-Based Authentication of Named Entities (DANE): A method used to securely associate a domain name with a specific entity.
    • DNSBL: DNS Blacklist, a list of domains that are known to be associated with spam or other malicious activity.
    • DNS-SD: DNS Service Discovery, a service that provides information about available services over a network.
    • DNSSEC: DNS Security Extensions, a set of security extensions for the DNS.
    • DNSSEC-Aware Name Server: A name server that supports DNSSEC.
    • DNSSEC-Aware Recursive Name Server: A recursive name server that supports DNSSEC.
    • DNSSEC-Aware Resolver: A name server that supports DNSSEC.
    • DNSSEC-Aware Stub Resolver: A stub resolver that supports DNSSEC.
    • DOB: Date of Birth, the individual's date of birth.
    • DOC: Delivery-only client, a client application that only handles the delivery of content.
    • Document Type Definition (DTD): A document that defines the structure of an XML document.
    • DoD: Department of Defense.
    • DoD Cybersecurity Analysis and Review: A Department of Defense process for analyzing and reviewing cybersecurity.
    • DoD Discovery Metadata Standard (DDMS): A standard used to describe and exchange metadata within the Department of Defense.
    • DoD Information Assurance Certification and Accreditation Process (DIACAP): A Department of Defense process for certifying and accrediting IT systems.
    • DoD Information Technology Security Certification and Accreditation Process (DITSCAP): A Department of Defense process for certifying and accrediting IT systems.
    • DoD portion of the Intelligence Mission Area: The portion of the intelligence mission that is the responsibility of the Department of Defense.
    • DoD Strategy for Operating in Cyberspace: A Department of Defense strategy for operating in cyberspace.
    • DODCAR: Department of Defense Cyber Awareness Report, a report on cybersecurity threats to the Department of Defense.
    • DoDD: Department of Defense Directive, a directive issued by the U.S. Department of Defense.
    • DoD-Defense Industrial Base Collaborative Information Sharing Environment: An environment for information sharing between the Department of Defense and the Defense Industrial Base.
    • DoDI: Department of Defense Instruction

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    This glossary provides a comprehensive overview of cybersecurity and privacy terms as outlined by NIST standards and CNSSI 4009. Definitions are context-specific and may vary by source document, ensuring readers understand the terminology as it's intended within the cybersecurity field.

    More Like This

    Cybersecurity Glossary Quiz
    5 questions
    Cybersecurity Best Practices
    10 questions

    Cybersecurity Best Practices

    FlawlessBagpipes9804 avatar
    FlawlessBagpipes9804
    Cybersecurity Chapter 6 Review Flashcards
    12 questions
    Use Quizgecko on...
    Browser
    Browser