The glossary

Cybersecurity Glossary

Learn about Cybrary's impact initiatives where we focus on reducing industry-wide gatekeeping, improving security teams, and making a difference throughout the cybersecurity industry and beyond.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Letter for filtering (will be hidden in prod) :

C

Chain of Custody

A chain of custody is a process that defines rules for evidence to be legally accepted. A neutral third party, who has no interest in the case, collects the evidence after properly identifying it; and that the evidence is accountable until it is presented in the court of law. The collector makes the evidence tamper-proof and seals it tightly. It contains the complete information of the evidence as to how had collected it, and who had access to it.

Letter for filtering (will be hidden in prod) :

C

Challenge Response Protocol

Challenge response protocol is a kind of authentication protocol in which the verifier sends the claimant a challenge. Then, via hashing the challenge or applying a private key operation, a response is generated and sent to the verifier. This information is then verified to establish the claimant’s control of the secret.

Letter for filtering (will be hidden in prod) :

C

Critical Infrastructure

Critical infrastructure is the fundamental system of an organization that is important for its survival, any threat to such basic systems would push the entire organization into jeopardy.

Letter for filtering (will be hidden in prod) :

C

Criticality

Criticality is the level of importance assigned to an asset or information. The organization may not function effectively and efficiently in the absence of an asset or information that is highly critical.

Letter for filtering (will be hidden in prod) :

C

Compliance Documents

A compliance document is a document detailing the actions required to comply or adhere to the set standards by regulatory bodies. Any violations of the said rules attract punitive actions from the regulatory bodies.

Letter for filtering (will be hidden in prod) :

C

Consumerization

Consumerization refers to new trends or changes in enterprise technology as more and more consumers embrace such technology. Employees use devices for personal use and as they gain wide acceptance, even organizations start using such technologies.

Letter for filtering (will be hidden in prod) :

C

Confuguration Management

Configuration management is the process of entering, editing, updating information relating to an organization’s hardware and software. Every detail such as the version of software installed, updates applied to the software, and the location of the devices, etc., is recorded, updated regularly.

Letter for filtering (will be hidden in prod) :

C

Control 2

A policy that guarantees an organization that the systems are reliable, and work in accordance with the established rules. It also assures that the organization complies with all the standards and rules as established by various authorities.

Letter for filtering (will be hidden in prod) :

C

Cold Site

A cold site is a backup site that can become operational fairly quickly, usually in one or two days. A cold site might have all the standard office things such as furniture and telephones, however there is unlikely to be any computer equipment in a cold site. Basically, a cold site is a backup facility ready to receive computer equipment should it need to move to an alternate location.

Letter for filtering (will be hidden in prod) :

C

Cyber Espiopnage

Cyber espionage is spying on the computer systems of an organization with the help of a virus to steal or destroy data, information, etc. Such spying is unauthorized and happens in a clandestine manner.