The glossary

Cybersecurity Glossary

Learn about Cybrary's impact initiatives where we focus on reducing industry-wide gatekeeping, improving security teams, and making a difference throughout the cybersecurity industry and beyond.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Letter for filtering (will be hidden in prod) :

C

Critical Infrastructure

Critical infrastructure is the fundamental system of an organization that is important for its survival, any threat to such basic systems would push the entire organization into jeopardy.

Letter for filtering (will be hidden in prod) :

C

Criticality

Criticality is the level of importance assigned to an asset or information. The organization may not function effectively and efficiently in the absence of an asset or information that is highly critical.

Letter for filtering (will be hidden in prod) :

C

Compliance Documents

A compliance document is a document detailing the actions required to comply or adhere to the set standards by regulatory bodies. Any violations of the said rules attract punitive actions from the regulatory bodies.

Letter for filtering (will be hidden in prod) :

C

Consumerization

Consumerization refers to new trends or changes in enterprise technology as more and more consumers embrace such technology. Employees use devices for personal use and as they gain wide acceptance, even organizations start using such technologies.

Letter for filtering (will be hidden in prod) :

C

Confuguration Management

Configuration management is the process of entering, editing, updating information relating to an organization’s hardware and software. Every detail such as the version of software installed, updates applied to the software, and the location of the devices, etc., is recorded, updated regularly.

Letter for filtering (will be hidden in prod) :

C

Control 2

A policy that guarantees an organization that the systems are reliable, and work in accordance with the established rules. It also assures that the organization complies with all the standards and rules as established by various authorities.

Letter for filtering (will be hidden in prod) :

C

Cold Site

A cold site is a backup site that can become operational fairly quickly, usually in one or two days. A cold site might have all the standard office things such as furniture and telephones, however there is unlikely to be any computer equipment in a cold site. Basically, a cold site is a backup facility ready to receive computer equipment should it need to move to an alternate location.

Letter for filtering (will be hidden in prod) :

C

Cyber Espiopnage

Cyber espionage is spying on the computer systems of an organization with the help of a virus to steal or destroy data, information, etc. Such spying is unauthorized and happens in a clandestine manner.

Letter for filtering (will be hidden in prod) :

C

Central Services Node

A central services node is the key management infrastructure core node that provides central security management and data management services.

Letter for filtering (will be hidden in prod) :

C

Certificate Authority (CA)

A certificate authority (CA) is an independent third party that verifies the online identity of an entity. They issue digital certificates that contain information about the owner of the certificate and details of the certificates, thus verifying the identity of the owner.