C(s) Flashcards
Cable modem
Provide Internet access via broadband cable TV
Cache memory
The fastest memory on the system, required to keep up with the CPU as it fetches and executes instructions
Caesar Cipher
A rot-3 substitution cipher
Callback
Modern-based authentication system
Caller ID
Identifies the calling phone number, sometimes used as a weak authentication method
Candidate keys
Any attribute (column) in the table with unique values
CMM
Capability Maturity Model, a maturity framework for evaluating and improving the software development process
CSMA
Carrier Sense Multiple Access, a method used by Ethernet networks to allowed shared usage of a baseband network, and avoid collisions
CASE
Computer-aided software engineering, uses programs to create assist in the creation and maintenance of other computer programs
CBC
Cipher Block Chaining , a block mode of DES that XORs the previous encrypted block of cipher-text to the next block plaintext to be encrypted
CCD
Charged Couple Discharge, a digital CCTV
CCMP
Counter Mode CBC MAC Protocol, used by WPA2 to create a MIC
CCTV
Closed Circuit Television, a detective device used to aid guards in in detecting the presence of intruders in restricted areas
CDN
Content Distribution Networks (also Content Delivery Networks) use a series of distributed caching servers to improve performance and lower the latency of downloaded online content
CPU
Central Processing Unit, the “brains” of the computer, capable of controlling and performing mathematical calculations
Centralized access control
Concentrates Access control in one logical point for a system or organization
CER
Crossover error rate, describes the point where the false reject rate(FRR) and false accept rate(FAR) are equal
Certificate Authority
PKI component that authenticates the identity of a person or organization before issuing a certificate to them
CRL
Certificate Revocation Lists, PKI component which lists digital certificates that have been revoked
Certification
A detailed inspection that verifies whether a system meets the documented security requirements
CFB
Cipher Feedback, a stream mode DES that is similar to block-mode CBC
Chain of custody
Requires that once evidence is acquired, full documentation regarding who, what, when, and where evidence was handled is maintained
Chaining
Block cipher mechanism that seeds the previous Encrypted block into the next block to be encrypted
CHAP
Challenge Handshake Authentication Protocol, a more secure network authentication protocol that uses a shared secret
Change management
The process of understanding, communicating , and documenting changes
CSU/DSU
Channel Service Unit/Data Service Unit, DCE device
Checklist testing
Lists all necessary components required for successful recovery, and ensures that they are, or will be , readily available should a disaster occur. Also known as consistency testing
CIA triad
Confidentiality, integrity, and availability
CIDR
Classless Inter-Domain Routing, allows for many network sizes beyond the arbitrary state-full network sizes
Cipher
A cryptographic algorithm
Cipher disk
Cryptographic device that uses two concentric disks each with alphabet around the periphery
Ciphertext
An encrypted message
Circuit-level proxy
Proxy firewall that operates at Layer 5
Circuit-switched network
Network that provides a dedicated circuit or channel between two nodes
Circumstantial evidence
Evidence that serves to establish the circumstances related to particular points or even other evidence
CIRT
Computer Incident Response Team, a team that performs incident handling
CISC
Complex Instruction Set Computer, CPU instructions that are longer and more powerful
Civil law
Law that resolves disputes between individuals or organizations
Civil law (legal system)
Legal system that leverages codified laws or statutes to determine what is considered within the bounds of law
Clark-Wilson
Real-world integrity model that protects integrity by having subjects access objects via programs
Class I gate
Residential gate designed for home use
Class II gate
Commercial gate, such as a parking garage gate
Class III gate
Industrial/limited access gate, such as a large loading dock
Class IV gate
Restricted access gate, used at an airport or prison