Cyber Security Glossary
Find definitions for IT security and compliance in our online glossary of key terms, acronyms, and vocabulary.
-
TermDefinition
- Cache A fast storage buffer in the central processing unit of a computer that temporarily stores frequently used information for quick access.
- calibration"A comparison between a device under test and an established standard, such as UTC(NIST). When the calibration is finished, it should be possible to state the estimated time offset and/or frequency offset of the device under test with respect to the standard, as well as the measurement uncertainty."
- Capability Definition: The means to accomplish a mission, function, or objective. Related Term(s): intent
- case"Single entry, single exit multiple way branch that defines a control expression, specifies the processing to be performed for each value of the control expression, and returns control in all instances to the statement immediately following the overall construct."
- causal inference"an intellectual discipline that considers the assumptions, study designs, and estimation strategies that allow researchers to draw causal conclusions based on data. The term ‘causal conclusion’ used here refers to a conclusion regarding the effect of a causal variable (often referred to as(...)
- causative"acting as the cause of something"
- CD-ROM Data storage medium that uses compact discs to store about 1,500 floppy discs worth of data.
- Chain of Custody A chain of custody tracks evidence from its original source to what is offered as evidence in court
- chatbot"Conversational agent that dialogues with its user (for example: empathic robots available to patients, or automated conversation services in customer relations)."
- choreography"An ordered sequence of system-to-system message exchanges between two or more participants. In choreography, there is no central controller, responsible entity, or observer of the process."
- Cipher Synonym(s): cryptographic algorithm
- Ciphertext Definition: Data or information in its encrypted form. Related Term(s): plaintext
- classification"When the output is one of a finite set of values (such as sunny, cloudy or rainy), the learning problem is called classification, and is called Boolean or binary classification if there are only two values."
- classifier"A model that predicts categorical labels from features."
- Client/Server Architecture A computer network design involving desktop PCs that depend on other (generally larger) computers to provide the PCs with information and/or applications. In the client/server environment, the client (PC) and the server are symbiotic and processing occurs in both places. Client- server(...)
- Cloud Computing Definition: A model for enabling on-demand network access to a shared pool of configurable computing capabilities or resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.
- clustering"Detecting potentially useful clusters of input examples."
- Coding Document coding is the process of capturing case-relevant information (i.e. author, date authored, date sent, recipient, date opened, etc.) from a paper document.
- cognitive automation"The identification, assessment, and application of available machine learning algorithms for the purpose of leveraging domain knowledge and reasoning to further automate the machine learning already present in a manner that may be thought of as cognitive. With cognitive automation, the system(...)
- cognitive computing"Complex computational systems designed to — Sense (perceive the world and collect data); — Comprehend (analyze and understand the information collected); - Act (make informed decisions and provide guidance based on this analysis in an independent way); and — Adapt (adapt capabilities based(...)
- Collect & Operate Definition: A NICE Framework category consisting of specialty areas responsible for specialized denial and deception operations and collection of cybersecurity information that may be used to develop intelligence.
- Collection Operations Definition: In the NICE Framework, cybersecurity work where a person: Executes collection using appropriate strategies and within the priorities established through the collection management process.
- column"In the context of relational databases, a column is a set of data values, all of a single type, in a table."
- COMPAS controversy"A canonical example [of algorithmic bias] comes from a tool used by courts in the United States to make pretrial detention and release decisions. The software, Correctional Offender Management Profiling for Alternative Sanctions (COMPAS), measures the risk of a person to recommit another(...)
- Compression A technology that reduces the size of a file. Compression programs are valuable to network users because they help save both time and bandwidth.