The Cyber Glossary: Comprehensive Cybersecurity Terms
Browse alphabetically or search directly for the cybersecurity terms your team needs right now.Learn more about our mission.
C
- C2(Command and Control)
- C3(Command, Control, and Communication)
- C3I(Command, Control, Communications, and Intelligence)
- C4(Command, Control, Communications, and Computers)
- CA(Certificate Authority)
- CA TechnologiesDefinition
- CAA(Certification Authority Authorization)
- CaaS(Containers as a Service)
- CaC(Certification Authority Certificate)
- CAE(Common Attack Patterns Enumeration and Classification)
- CapabilityDefinition
- Capability ListDefinition
- Capability Maturity Model IntegrationDefinition
- Capability RequirementDefinition
- Capability, Anomalous Event Detection ManagementDefinition
- Capability, Anomalous Event Response and Recovery ManagementDefinition
- Capability, Behavior ManagementDefinition
- Capability, Boundary ManagementDefinition
- Capability, Configuration Settings ManagementDefinition
- Capability, Credentials and Authentication ManagementDefinition
- Capability, Event Preparation ManagementDefinition
- Capability, Hardware Asset ManagementDefinition
- Capability, Manage and Assess RiskDefinition
- Capability, Perform Resilient Systems EngineeringDefinition
- Capability, Privilege and Account ManagementDefinition
- Capability, Security ProvidedDefinition
- Capability, Software Asset ManagementDefinition
- Capability, Trust ManagementDefinition
- Capability, Vulnerability ManagementDefinition
- Capacity PlanningDefinition
- CAPCO(Controlled Access Program Coordination Office)
- CAPEC(Common Attack Pattern Enumeration and Classification)
- CapEx(Capital Expenditure)
- CAPI(Cryptography API)
- Capital Expenditures(CapEx)
- Capstone PoliciesDefinition
- CAPTCHA(Completely Automated Public Turing test to tell Computers and Humans Apart)
- CatphishDefinition
- CBP(Customs and Border Protection)
- CCP(Cybersecurity Capability Program)
- CD-R(Compact Disc Recordable)
- CD-Read Only Memory(CD-ROM)
- CD-RecordableDefinition
- CD-Rewritable(Compact Disc Rewritable)
- CD-ROM(Compact Disc Read-Only Memory)
- CD-RW(Compact Disc ReWritable)
- CentOSDefinition
- Central Processing UnitDefinition
- CEO(Chief Executive Officer)
- CERT Coordination Center(Computer Emergency Response Team Coordination Center)
- CERT/CC(CERT Coordination Center)
- CertificateDefinition
- Certificate Authority (CA)(Certificate Authority)
- Certificate Authority AuthorizationDefinition
- Certificate Authority Workstation (CAW)(Certificate Authority Workstation)
- Certificate ChainDefinition
- Certificate classDefinition
- Certificate Enrollment PolicyDefinition
- Certificate Enrollment ServiceDefinition
- Certificate ManagementDefinition
- Certificate Management ServiceDefinition
- Certificate OwnerDefinition
- Certificate Revocation ListDefinition
- Certificate Signing RequestDefinition
- Certificate Status AuthorityDefinition
- Certificate Status ServerDefinition
- Certificate TransparencyDefinition
- Certificate Usage TypeDefinition
- Certificate-inventory managementDefinition
- Certificate-Related InformationDefinition
- CertificationDefinition
- Certification AgentDefinition
- Certification AnalystDefinition
- Certification AuthorityDefinition
- Certification Authority SystemDefinition
- Certification Authority WorkstationDefinition
- Certification PackageDefinition
- Certification Practice Statement (CPS)(Certification Practice Statement)
- Certification Test and EvaluationDefinition
- Certified TEMPEST Technical Authority(Certified TEMPEST Technical Authority)
- CertifierDefinition
- Chain of CustodyDefinition
- Chain of EvidenceDefinition
- Chain of TrustDefinition
- Chain-based Proof of Stake Consensus ModelDefinition
- Chained Secure ZoneDefinition
- Challenge and Reply AuthenticationDefinition
- Challenge-Handshake Authentication ProtocolDefinition
- Challenge-Response Authentication MechanismDefinition
- Challenge-Response ProtocolDefinition
- CI/CD(Continuous Integration/Continuous Deployment)
- CIA(Confidentiality, Integrity, Availability)
- CIDAR(Cyber Incident Detection and Response)
- CIDR(Classless Inter-Domain Routing)
- CIE(Critical Infrastructure Entities)
- CIF(Collaborative Information and Knowledge Sharing Framework)
- CIFS(Common Internet File System)
- CIGRE(International Council on Large Electric Systems)
- CIK(Cryptographic Ignition Key)
- CIKR(Critical Infrastructure and Key Resources)
- CIM(Common Information Model)
- CIMA(Critical Infrastructure Management and Analysis)
- CIO(Chief Information Officer)
- CIoTSP(Continuous Internet of Things Security Posture)
- CIP(Critical Infrastructure Protection)
- CIPAC(Critical Infrastructure Partnership Advisory Council)
- CipherDefinition
- Cipher Block ChainingDefinition
- Cipher Block Chaining - Message Authentication Code (CMAC)Definition
- Cipher FeedbackDefinition
- Cipher TextDefinition
- Cipher Text Auto-KeyDefinition
- Cipher-based Message Authentication CodeDefinition
- Ciphering Offset NumberDefinition
- ciphertextDefinition
- Ciphertext IntegrityDefinition
- Ciphertext Integrity with Misuse-resistanceDefinition
- Ciphertext-Policy Attribute-Based EncryptionDefinition
- CIPSEA(Confidential Information Protection and Statistical Efficiency Act)
- CIR(Cyber Incident Response)
- CIRC(Computer Incident Response Center)
- CircuitDefinition
- Circuit Switch FallbackDefinition
- CIRT(Computer Incident Response Team)
- CIS(Center for Internet Security)
- CISA(Cybersecurity and Infrastructure Security Agency)
- Cisco Global ExploiterDefinition
- Cisco IOS(Internetwork Operating System)
- Cisco’s Internetwork Operating SystemDefinition
- CISO(Chief Information Security Officer)
- CISQ(Consortium for IT Software Quality)
- CISSE(Computer Information Systems Security Evaluation)
- CISSP-ISSAP(Certified Information Systems Security Professional - Information Systems Security Architecture Professional)
- CISSP-ISSMP(Certified Information Systems Security Professional - Information Systems Security Management Professional)
- Citect SCADA SystemDefinition
- CJA(Cyber Job Analysis)
- CK(Cortex XSOAR)
- CKG(Configuration Knowledge Graph)
- CKL(Checklist)
- CKMS(Cryptographic Key Management System)
- CKMS Component(Cryptographic Key Management System Component)
- CKMS DesignDefinition
- CKMS designer(Cryptographic Key Management System)
- CKMS DeveloperDefinition
- CKMS hierarchy(Cryptographic Key Management System)
- CKMS ImplementerDefinition
- CKMS ModuleDefinition
- CKMS product(Cryptographic Key Management System)
- CKMS PS(Cryptographic Key Management System Publication Standard)
- CKMS Security PolicyDefinition
- CKMS SP(Cryptographic Key Management System Special Publication)
- CKMS VendorDefinition
- Classified InformationDefinition
- Classified National Security InformationDefinition
- Classless Inter-Domain RoutingDefinition
- Clean HostDefinition
- Clean Word ListDefinition
- ClearDefinition
- ClearanceDefinition
- CleartextDefinition
- CLI(Command Line Interface)
- Client ApplicationDefinition
- ClientsSideDefinition
- Cloned TagDefinition
- Closed Circuit Television(Closed Circuit Television)
- Closed Security EnvironmentDefinition
- Closed Source Operating SystemDefinition
- Closed StorageDefinition
- Closed SystemDefinition
- Cloud Access Security BrokerDefinition
- Cloud AuditorDefinition
- Cloud BrokerDefinition
- Cloud CarrierDefinition
- Cloud ComputingDefinition
- Cloud ConsumerDefinition
- Cloud InfrastructureDefinition
- Cloud Native Computing FoundationDefinition
- Cloud ProviderDefinition
- Cloud Security AllianceDefinition
- Cloud Security Policy FrameworkDefinition
- Cloud Security Rubik's CubeDefinition
- Cloud Service CustomerDefinition
- Cloud Service ProviderDefinition
- Cloud WorkloadDefinition
- CloudSPFDefinition
- CLR(Common Language Runtime)
- CMaaS(Configuration Management as a Service)
- CMM(Capability Maturity Model)
- CMOS(Complementary Metal-Oxide-Semiconductor)
- CNAP(Cloud-native Application Protection)
- CNCI(Comprehensive National Cybersecurity Initiative)
- CNO(Computer Network Operations)
- CNSS(Committee on National Security Systems)
- CNSS Directive(Committee on National Security Systems Directive)
- Code AnalysisDefinition
- Code Division Multiple Access(Code Division Multiple Access)
- Code of Federal RegulationsDefinition
- Code Signing KeyDefinition
- CodecDefinition
- Cold SiteDefinition
- Collaborative Research and Development AgreementDefinition
- Collaborative Robotic SystemDefinition
- Collateral Damage PotentialDefinition
- Collateral InformationDefinition
- Collect & OperateDefinition
- Collecting and Communicating Audit TrailsDefinition
- CollectionDefinition
- Collection OperationsDefinition
- Collection SystemDefinition
- CollectorDefinition
- CollisionDefinition
- Collision ResistanceDefinition
- Command and ControlDefinition
- Command Line InterfaceDefinition
- Command, Control, and CommunicationsDefinition
- Command, Control, Communications and Computers(C4)
- Command, Control, Communications and IntelligenceDefinition
- Commercial-off-the-Shelf (COTS)(Commercial-off-the-Shelf)
- Common NameDefinition
- Common Vulnerabilities and Exposures (CVE)(Common Vulnerabilities and Exposures)
- Common Vulnerabilities and Exposures identifiersDefinition
- Common Vulnerability Enumeration(CVE)
- Common Vulnerability Scoring System (CVSS)(Common Vulnerability Scoring System)
- Common Weakness Enumeration (CWE)(Common Weakness Enumeration)
- Common Weakness Scoring SystemDefinition
- Composed Commercial SolutionDefinition
- Comprehensive TestDefinition
- Comprehensive TestingDefinition
- Compressed FileDefinition
- Compromise RecoveryDefinition
- Compromised StateDefinition
- CompTIA(Computing Technology Industry Association)
- COMPUSEC(Computer Security)
- ComputerDefinition
- Computer AbuseDefinition
- Computer CryptographyDefinition
- Computer Emergency Readiness Team(CERT)
- Computer Emergency Response Team(CERT)
- Computer Emergency Response Team/Coordination CenterDefinition
- Computer Forensic Reference Data SetsDefinition
- Computer Forensic Tool TestingDefinition
- Computer ForensicsDefinition
- Computer Forensics Reference Data SetsDefinition
- Computer Forensics Research and Development CenterDefinition
- Computer Forensics Tool TestingDefinition
- Computer Incident Response CapabilityDefinition
- Computer Incident Response CenterDefinition
- Computer Incident Response Team (CIRT)(Computer Incident Response Team)
- Computer Information Security OfficerDefinition
- Computer Integrated ManufacturingDefinition
- Computer Network Attack(Computer Network Attack)
- Computer Network DefenseDefinition
- Computer Network Defense (CND)(Computer Network Defense)
- computer network defense analysisDefinition
- Computer Network Defense Infrastructure SupportDefinition
- Computer Network Exploitation(Computer Network Exploitation)
- Computer Network Operations (CNO)(Computer Network Operations)
- Computer Numerical ControlDefinition
- Computer Security DivisionDefinition
- Computer Security IncidentDefinition
- Computer Security Incident Response CapabilityDefinition
- Computer Security Incident Response Team(CSIRT)
- Computer Security Log ManagementDefinition
- Computer Security ObjectDefinition
- Computer Security ProgramDefinition
- Computer Security Resource CenterDefinition
- Computer Security SubsystemDefinition
- Computer System Security and Privacy Advisory BoardDefinition
- Computerized Telephone SystemDefinition
- Computing DeviceDefinition
- Computing EnvironmentDefinition
- COMSAT(Communications Satellite)
- COMSEC(Communications Security)
- ConcatenationDefinition
- Conditioning (of noise source output)Definition
- Confidence IntervalDefinition
- Confidential ComputingDefinition
- ConfidentialityDefinition
- Confidentiality ImpactDefinition
- Confidentiality, Integrity, AvailabilityDefinition
- ConsequenceDefinition
- ConsoleDefinition
- ConsortiumDefinition
- Consortium for Information & Software QualityDefinition
- ConstraintsDefinition
- Content Delivery NetworksDefinition
- Content GeneratorDefinition
- Continuity of OperationsDefinition
- Continuity of Operations PlanDefinition
- Continuity of Operations Plan (COOP)(Continuity of Operations Plan)
- Continuous Asset Evaluation, Situational Awareness, and Risk ScoringDefinition
- Continuous Authority to OperateDefinition
- Continuous Data ProtectionDefinition
- Continuous TestDefinition
- ConversationDefinition
- COP(Community of Practice)
- CounterIntelDefinition
- CrimewareDefinition
- Critical InfrastructureDefinition
- Critical Infrastructure and Key Resources(Critical Infrastructure and Key Resources)
- CRUD(Create, Read, Update, Delete)
- CryptanalysisDefinition
- Crypto-SiphoningDefinition
- CryptocurrencyDefinition
- Cryptographic AcceleratorDefinition
- Cryptographic AlarmDefinition
- Cryptographic AlgorithmDefinition
- Cryptographic Algorithm Validation ProgramDefinition
- Cryptographic Algorithm Validation SystemDefinition
- Cryptographic and Security TestingDefinition
- Cryptographic and Security Testing LaboratoryDefinition
- Cryptographic API: Next GenerationDefinition
- Cryptographic ApplicationDefinition
- Cryptographic Application Programming InterfaceDefinition
- Cryptographic AuthenticatorDefinition
- Cryptographic BindingDefinition
- Cryptographic checksumDefinition
- Cryptographic deviceDefinition
- Cryptographic Engineering Research GroupDefinition
- Cryptographic EraseDefinition
- Cryptographic FunctionDefinition
- Cryptographic Hash FunctionDefinition
- Cryptographic Hash ValueDefinition
- Cryptographic Ignition KeyDefinition
- Cryptographic IncidentDefinition
- Cryptographic InitializationDefinition
- Cryptographic KeyDefinition
- Cryptographic Key ComponentDefinition
- Cryptographic Key Management System Practice StatementDefinition
- Cryptographic Key Management System Security PolicyDefinition
- Cryptographic Keying RelationshipDefinition
- Cryptographic RandomizationDefinition
- Cryptographic ServiceDefinition
- Cryptographic SolutionDefinition
- Cryptographic SynchronizationDefinition
- Cryptographic System AnalysisDefinition
- Cryptographic System EvaluationDefinition
- Cryptographic System ReviewDefinition
- Cryptographic System SurveyDefinition
- Cryptographic Technology GroupDefinition
- Cryptographic TokenDefinition
- Cryptographic Validation ProgramDefinition
- CryptographyDefinition
- CryptojackingDefinition
- CryptologicDefinition
- CryptologyDefinition
- CryptomalwareDefinition
- CryptominersDefinition
- Cryptonet Evaluation ReportDefinition
- CryptoperiodDefinition
- CS(Computer Science)
- CS3STHLMDefinition
- CSA(Certificate Status Authority)
- CSC(Configuration Service Catalog)
- CSEC(Computer Security)
- CSSIA(Cyber Security and Information Assurance)
- csv(Comma-Separated Value)
- Customer Service and Technical SupportDefinition
- CVE(Common Vulnerabilities and Exposures)
- CVE equivalentDefinition
- CVE ID(Common Vulnerabilities and Exposures Identifier)
- CVE Naming AuthorityDefinition
- CVE Numbering AuthorityDefinition
- CVE Record MetadataDefinition
- CVP(Cyclomatic Vulnerability Prediction)
- CVSS(Common Vulnerability Scoring System)
- CVSS Special Interest Group(Common Vulnerability Scoring System Special Interest Group)
- CVSS-SIG(Common Vulnerability Scoring System Special Interest Group)
- CWE(Common Weakness Enumeration)
- CWI(Common Weakness Enumeration)
- CyberDefinition
- Cyber AttackDefinition
- Cyber EcosystemDefinition
- Cyber ExerciseDefinition
- Cyber IncidentDefinition
- Cyber Incident Response PlanDefinition
- Cyber InfrastructureDefinition
- cyber operationsDefinition
- Cyber Operations PlanningDefinition
- Cyber Threat Intelligence (CTI)(Cyber Threat Intelligence)
- CyberattackDefinition
- CyberespionageDefinition
- CybersecuringDefinition
- CybersecurityDefinition
- Cybersecurity adjacentDefinition
- Cybersecurity and Infrastructure Security AgencyDefinition
- Cybersecurity IncidentDefinition
- Cybersecurity National Action PlanDefinition
- Cybersecurity RiskDefinition
- Cybersecurity Risk ManagementDefinition
- Cybersecurity Risks Throughout the Supply ChainDefinition
- Cybersecurity Strategy and Implementation PlanDefinition
- Cybersecurity Supply Chain Risk AssessmentDefinition
- Cybersecurity Supply Chain Risk ManagementDefinition
- cybersecurity-awareDefinition
- Cyberspace AttackDefinition
- Cyberspace Operations (CO)(Cyberspace Operations)
- CyberthreatsDefinition
- CybertruckDefinition
- CyberwarfareDefinition
- CyberWarriorDefinition