The glossary

Cybersecurity Glossary

Learn about Cybrary's impact initiatives where we focus on reducing industry-wide gatekeeping, improving security teams, and making a difference throughout the cybersecurity industry and beyond.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Letter for filtering (will be hidden in prod) :

C

Chief Information Security Officer

A chief information security officer is a senior level executive of an organization entrusted with the responsibilities of protecting the information assets of the businesses and making sure that the information policies of the organization align with the objectives of the organization.

Letter for filtering (will be hidden in prod) :

C

Confidentiality

Confidentiality is the set of rules that places restrictions on access to, or sharing of information with the aim of preserving and protecting the privacy of the information.

Letter for filtering (will be hidden in prod) :

C

Ciphony

Ciphony is the process of enciphering audio information with the result of encrypted speech.

Letter for filtering (will be hidden in prod) :

C

Content Filtering

Content filtering is a process by which access to certain content, information, data is restricted, limited, or completely blocked based on organization’s rules. Any objectionable email, website, etc., is blocked using either software or hardware based tools.

Letter for filtering (will be hidden in prod) :

C

Countermeasure

A countermeasure is a defensive mechanism that helps mitigate risk, threat, to a network or computers, using a process, system or a device.

Letter for filtering (will be hidden in prod) :

C

Common Access Card (CAC)

A common access card is a standard identification/smart card issued by the department of defense. A common access card has an embedded integrated chip storing public key infrastructure (PKI) certificates.

Letter for filtering (will be hidden in prod) :

C

Cybersecurity Architecture

Cybersecurity architecture is the information security layout that describes the overall structure, including its various components, and their relationships in an organization. It displays how strong the data security, controls and preventive mechanisms implemented in the organization are.

Letter for filtering (will be hidden in prod) :

C

Control 1

Control is the policies, strategies, guidelines, etc. Established in collaboration with various departments of an organization such as management, legal, technical to help mitigate risk.

Letter for filtering (will be hidden in prod) :

C

Compartmentalization

Compartmentalization is a technique of protecting confidential information by revealing it only to a few people, to those who actually need to know the details to perform their job. Thus, by restricting access to information, data the risk to business objectives is limited.

Letter for filtering (will be hidden in prod) :

C

Certification Management

Certificate management is the process in which certificates are generated, used, transmitted, loaded and destroyed.