The glossary
Cybersecurity Glossary
Learn about Cybrary's impact initiatives where we focus on reducing industry-wide gatekeeping, improving security teams, and making a difference throughout the cybersecurity industry and beyond.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Letter for filtering (will be hidden in prod) :
C
Cyber Warfare
Cyber warfare is virtual warfare waged online over the internet to weaken or harm the financial systems of an organization by stealing private and personal information available online on websites, etc.
Letter for filtering (will be hidden in prod) :
C
Chief Security Officer
A chief security officer is an executive of the company with assigned responsibility to protect assets such as the infrastructure, personnel, including information in digital and physical form.
Letter for filtering (will be hidden in prod) :
C
Checksum
A numerical value that helps to check if the data transmitted is the same as the data stored and that the recipient has error free data. It is often the sum of the numerical values of bits of digital data stored, this value should match with the value at the recipient's end, and a mismatch in the value indicates an error.
Letter for filtering (will be hidden in prod) :
C
Category
A category is a restrictive label applied to classified or unclassified information to limit access.
Letter for filtering (will be hidden in prod) :
C
Cleartext
Cleartext is data in ascii format or data that is not coded or encrypted. All applications and machines support plain text.
Letter for filtering (will be hidden in prod) :
C
Common Attack Pattern Enumeration and Classification (CAPEC)
A common attack pattern enumeration and classification is a document published by mitre corporation that details how vulnerable systems are attacked. The community-developed document describes common attack patterns and how such attacks are executed.
Letter for filtering (will be hidden in prod) :
C
Certification Revocation List
A certificate revocation list is an independent third party that verifies the online identity of an entity. They issue digital certificates that contain information about the owner of the certificate and details of the certificates, thus verifying the identity of the owner.
Letter for filtering (will be hidden in prod) :
C
Cryptography
Cryptography is the science and art of protecting the privacy of information by encrypting it into a secret code, so no one but the authorized person with an encryption key can read or view the information.
Letter for filtering (will be hidden in prod) :
C
Cryptosystem
A system or an algorithm to encrypt plain text to secret code or cipher text to protect the privacy of information stored. A key helps convert plain text to cipher text and vice-versa.
Letter for filtering (will be hidden in prod) :
C
Compliance
Compliance is the act of abiding by, and adhering to the set standards, rules, and laws of the land, or of any such regulatory bodies, authorities. In the software field, for example, development of software adheres to certain standards set by the quality and standards body, and installation process abides by the vendor license agreement.