The glossary

Cybersecurity Glossary

Learn about Cybrary's impact initiatives where we focus on reducing industry-wide gatekeeping, improving security teams, and making a difference throughout the cybersecurity industry and beyond.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Letter for filtering (will be hidden in prod) :

C

Computer Emergency Response Team (CERT)

A computer emergency response team (CERT) is a team formed to study the vulnerabilities of information systems of an organization and offer solutions and strategies to face such vulnerabilities. Such teams are highly organized with clearly defined roles and responsibilities.

Letter for filtering (will be hidden in prod) :

C

Chain of Evidence

The chain of evidence shows who obtained the evidence, where the evidence came from, also who secured, had control and possession of the evidence. The chain of evidence goes in the following order: collection and identification; analysis; storage; preservation; presentation in court; return to owner.

Letter for filtering (will be hidden in prod) :

C

Clinger-Cohen Act of 1996

The Clinger-Cohen Act is also known as the information technology management reform act. This statute made significant changes in the way that its resources are managed and procured. The most significant aspect of this act is the requirement that each agency design and implement a process for maximizing the value and assessing and managing the risks of its investments.

Letter for filtering (will be hidden in prod) :

C

Cipher

A cipher is a process to convert data into code, or encrypt, with the help of an algorithm. To decipher the code, a key is required.

Letter for filtering (will be hidden in prod) :

C

Cloud Computing

Cloud computing is a platform that utilizes shared resources to access information, data, etc., rather than local servers. Information is stored on, and retrieved from the cloud or internet. Cloud computing allows remote sharing of files, data and facilitates remote working, as long as users are connected to the internet.

Letter for filtering (will be hidden in prod) :

C

Computer Forensics

Computer forensics is the process of analyzing and investigating computer devices, on suspicion that such devices may have been used in a cybercrime, with the aim of gathering evidence for presentation in a court of law. Computer forensics offers many tools for investigation and analysis to find out such evidence.

Letter for filtering (will be hidden in prod) :

C

Collision

A collision is a situation where two or more devices – networking devices or computers – try sending requests or transmit data to the same device at the same time.

Letter for filtering (will be hidden in prod) :

C

Cipher Text

Cipher text is data converted from plain text into code using an algorithm, making it unreadable without the key.

Letter for filtering (will be hidden in prod) :

C

Claimant

A claimant is the party who needs to be identified via an authentication protocol.

Letter for filtering (will be hidden in prod) :

C

Containment

Containment is steps taken to control any further risks upon identifying a threat.