Glossary C Flashcards
C&C (command and control)
An infrastructure of hosts and services with which attackers direct, distribute, and control malware over botnets. Also known as C2.
CA (certificate authority)
A server that guarantees subject identities by issuing signed digital certificate wrappers for their public keys.
cable lock
Devices can be physically secured against theft using cable ties and padlocks. Some systems also feature lockable faceplates, preventing access to the power switch and removable drives.
CAC (common access card)
A smart card that provides certificate-based authentication and supports two-factor authentication. A CAC is produced for Department of Defense employees and contractors in response to a Homeland Security Directive.
CAN bus (controller area network bus)
A serial network designed to allow communications between embedded programmable logic controllers.
CAPTCHA (completely automated public turing test to tell computers and humans apart)
An image of text characters or audio of some speech that is difficult for a computer to interpret. CAPTCHAs are used for purposes such as preventing bots from creating accounts on web forums and social media sites to spam them.
captive portal
A web page or website to which a client is redirected before being granted full network access.
capture the flag
Training event where learners must identify a token within a live network environment.
card cloning/skimming
Duplicating a smart card by reading (skimming) the confidential data stored on it. Also known as skimming.
carving
The process of extracting data from a computer when that data has no associated file system metadata.
CASB (cloud access security broker)
Enterprise management software designed to mediate access to cloud services by users across all types of devices.
cat command
Linux command to view and combine (concatenate) files.
CBC (cipher block chaining)
An encryption mode of operation where an exclusive or (XOR) is applied to the first plaintext block
CCMP (counter mode with cipher block chaining message authentication code protocol)
An encryption protocol used for wireless LANs that addresses the vulnerabilities of the WEP protocol.
CE (cryptographic erase)
A method of sanitizing a self-encrypting drive by erasing the media encryption key.
chain of custody
The record of evidence history from collection, to presentation in court, to disposal.
change control
The process by which the need for change is recorded and approved.
change management
The process through which changes to the configuration of information systems are implemented, as part of the organization’s overall configuration management efforts.
CHAP (Challenge Handshake Authentication Protocol)
Authentication scheme developed for dial-up networks that uses an encrypted three-way handshake to authenticate the client to the server. The challenge-response is repeated throughout the connection (though transparently to the user) to guard against replay attacks.
checksum
The output of a hash function. chmod Linux command for managing file permissions
CIA triad (confidentiality, integrity, and availability)
The three principles of security control and management. Also known as the information security triad. or AIC triad.
circuit-level stateful inspection firewall
A Layer 5 firewall technology that tracks the active state of a connection, and can make decisions based on the contents of network traffic as it relates to the state of the connection.
CIS (Center for Internet Security)
A not-for-profit organization (founded partly by SANS). It publishes the well-known “Top 20 Critical Security Controls” (or system design recommendations).