C Flashcards
CA
Certificate Authority
A company, device, or organization that issues digital certificates to verify the identity of people, companies, websites, and email addresses
CAPTCHA
Completely Automated Public Turing Test to Tell Computers and Humans Apart
A type of challenge-response authentication that helps differentiate between real users and automated users
CAR
Corrective Action Report
A document that details the steps taken to address and fix security gaps or non-conformities
CASB
Cloud Access Security Broker
A security policy enforcement point between cloud service providers and enterprise users. It implements zero-trust access control and policy enforcement for cloud environments.
CBC
Cipher Block Chaining
A mode of operation for a block cipher that XORs the previous encrypted block of ciphertext to the next block of plaintext to be encrypted. The first encrypted block is an initialization vector that contains random data.
CCMP
Counter Mode/CBC-MAC Protocol
An encryption protocol based on AES and uses the Counter Mode with CBC-MAC (CCM) mode of operation.
CCTV
Closed-Circuit Television
A TV system in which signals are not publicly distributed, but are monitored, primarily for surveillance and security purposes.
CERT/CIRT
Computer Emergency Response Team
Computer Incident Response Team
A group of IT professionals who prepare for, respond to, and recover from cybersecurity incidents
CFB
Cipher Feedback
An AES mode of operation. Unlike CBC, which directly encrypts plaintext blocks, this mode encrypts the previously encrypted plaintext block, then adds this to the next plaintext block. This means that the same algorithm used to encrypt the data can be used to decrypt it.
CHAP
Challenge Handshake Authentication Protocol
A secure authentication method that uses a challenge-response mechanism to verify a client’s identity to a server during an initial connection. It periodically re-authenticates the user during an online session.
CIA
Confidentiality, Integrity, Availability
A cybersecurity framework that uses three principles to evaluate an organization’s security.
CIO
Chief Information Officer
The individual responsible for establishing, implementing, and ensuring compliance with cybersecurity policies. They are responsible for the effectiveness of cyber protections.
CMS
Content Management System
Software suites that allow users to create, manage, and publish digital content on the web. They allow site admins to easily manage the design, functionality, and operation of websites with minimal technical expertise. They store data, process transactions, and provide access to employees.
COOP
Continuity of Operation Planning
A predetermined set of instructions or procedures that describe how an organization’s mission critical functions will be sustained during and after a disaster event.
COPE
Corporate-Owned, Personally-Enabled
A policy that allows employees to use corporate-owned devices for both work and personal activities.