C


[C]

C2

Command and control.

C2-attack

Effective prevention of C2 of adversary forces by denying information to, influencing, degrading, or destroying the adversary C2 system.

C2-protect

Maintaining effective command and control of own forces by turning to friendly advantage or negating adversary effort to deny information to, influence, degrade, or destroy the friendly C2 system (pending approval in JP 1-02).

CGI

Common Gateway Interface—the method that Web servers use to allow interaction between servers and programs.

CGI Scripts

Allow for the creation of dynamic and interactive Web pages. They also tend to be the most vulnerable part of a Web server (besides the underlying host security).

Check_Password

A hacking program used for cracking VMS passwords.

Chernobyl Packet

Also called Kamikaze Packet. A network packet that induces a broadcast storm and network meltdown. Typically an IP Ethernet datagram that passes through a gateway with both source and destination Ethernet and IP address set as the respective broadcast addresses for the subnetworks being gated between.

Circuit-Level Gateway

One form of a firewall. Validates TCP and UDP sessions before opening a connection. Creates a handshake, and once that takes place, passes everything through until the session is ended.

Clipper Chip

A tamper-resistant VLSI chip designed by NSA for encrypting voice communications. It conforms to the Escrow Encryption Standard (EES) and implements the Skipjack encryption algorithm.

COAST

Computer Operations, Audit, and Security Technology—A multiple project, multiple investigator laboratory in computer security research in the Computer Sciences Department at Purdue University. It functions with close ties to researchers and engineers in major companies and government agencies. Its research focuses on real-world needs and limitations, with a special focus on security for legacy computing systems.

Command and Control Warfare (C2W)

The integrated use of operations security, military deception, psychological operations, electronic warfare, and physical destruction mutually supported by intelligence to deny information to, influence, degrade, or destroy adversary C2 capabilities, while protecting friendly C2 against such actions. C2W is an application of information operations in military operations and is a subset of information warfare. C2W is both offensive and defensive.

Compromise

An intrusion into a computer system where unauthorized disclosure, modification, or destruction of sensitive information may have occurred.

Computer Abuse

Willful or negligent unauthorized activity that affects the availability, confidentiality, or integrity of computer resources. Computer abuse includes fraud, embezzlement, theft, malicious damage, unauthorized use, denial of service, and misappropriation.

Computer Fraud

Computer-related crimes involving deliberate misrepresentation or alteration of data in order to obtain something of value.

Computer Network Attack (CNA)

Operations to disrupt, deny, degrade, or destroy information resident on computers and computer networks or the computers and networks themselves (DODD S-3600.1 of 9 Dec. 96).

Computer Security

Technological and managerial procedures applied to computer systems to ensure the availability, integrity, and confidentiality of information managed by the computer system.

Computer Security Incident

Any intrusion or attempted intrusion into an AIS. Incidents can include probes of multiple computer systems.

Computer Security Intrusion

Any event of unauthorized access to or penetration of an AIS.

Confidentiality

Assuring information will be kept secret with access limited to appropriate persons.

COPS

Computer Oracle and Password System—A computer network monitoring system for UNIX machines. Software tool for checking security on shell scripts and C programs. Checks for security weaknesses and provides warnings.

COTS Software

Commercial off-the-shelf—Software acquired by government contract through a commercial vendor. This software is a standard product not developed by a vendor for a particular government project.

Countermeasure

An action, device, procedure, technique, or other measure that reduces the vulnerability of an AIS. Countermeasures aimed at specific threats and vulnerabilities involve more sophisticated techniques, as well as activities traditionally perceived as security.

Crack

A popular hacking tool used to decode encrypted passwords. System administrators also use Crack to assess weak passwords by novice users in order to enhance the security of the AIS.

Cracker

One who breaks security on an AIS.

Cracking

The act of breaking into a computer system.

Crash

A sudden, usually drastic, failure of a computer system.

Cryptanalysis

  1. The analysis of a cryptographic system or its inputs and outputs to derive confidential variables or sensitive data, including cleartext.

  2. Operations performed in converting encrypted messages to plain text without initial knowledge of the cryptoalgorithm or key employed in the encryption.

Cryptographic Hash Function

A process that computes a value (referred to as a hashword) from a particular data unit in a manner that, when a hashword is protected, manipulation of the data is detectable.

Cryptography

The art or science concerning the principles, means, and methods for rendering plain text unintelligible and for converting encrypted messages into intelligible form.

Cryptology

The science which deals with hidden, disguised, or encrypted communications.

Cyberspace

The world of connected computers and the society that gathers around them; commonly known as the Internet.




Investigative Data Mining for Security and Criminal Detection
Investigative Data Mining for Security and Criminal Detection
ISBN: 0750676132
EAN: 2147483647
Year: 2005
Pages: 232
Authors: Jesus Mena

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net