vocabularyC Flashcards
CA
A certificate authority is a neutral third party that offers notarization services for digital certificates.
Cable Modem
A high-speed Internet access technology that uses the same physical medium as cable TV delivery.
Cache Memory
Small, high-speed area of memory on the CPU which briefly keeps accessed memory, but does not require multiple clock cycles.
Candidate Key
A collection of fields that can uniquely identify a record in a table.
CBC
Cipher Block Chaining is a DES mode that takes each block and performs an XOR operation with it, and with the preceding block, before encryption.
CCTV
Closed Circuit Television is a security device that records the physical movement of users through the system.
Centralized Authentication
Authentication type where a single identity controls all access to certain objects. It is a strict control with a single point of failure that allows for easy administration.
CER
Crossover Error Rate is the value or system based upon the point at which the FRR and the FAR cross if it were graphed. The CER allows two different biometric methods to be compared.
CFB
Cipher Feedback is a DES mode that takes the previous block of ciphertext, which is encrypted, and performs an XOR operation with the results and with current plaintext.
Checklist Test
The simplest test in which a DRP team member follows each step from the DRP checklist and provides feedback on their findings. It functions both as a test and an awareness training exercise.
Chosen Ciphertext
An attack in which the attacker decrypts portions of the encrypted message, analyzing the decrypted fragments of the message to possibly discover the key.
Chosen Plaintext
An attack in which the attacker encrypts the plaintext message, making it ciphertext, then compares it to another encrypted message to find similarities or matches.
CIA
The security triad consisting of three tenants, Confidentiality, Integrity, and Availability, combined together to make a secure system.
Cipher
The process of altering or rearranging plaintext so that it is unreadable and generating ciphertext.
Ciphertext
The message after it has been encrypted; it is only readable after it has been decrypted.