Terms
Alphabetical index of published term entries with tag filters and quick sort.
- Updated Jan 06, 2026
A linked sequence of one or more public key certificates, or one or more public key certificates and one attribute certificate, that enables a certificate user to verify the signature on the last certificate in the path, and thus enables the user to obtain (from that last certificate) a certified public key, or certified attributes, of the system entity that is the subject of that last certificate. (See: trust anchor, certificate validation, valid certificate.)
- Updated Jan 06, 2026
Synonym for either "certificate policy" or "certification practice statement".
- Updated Jan 06, 2026
"A statement of the practices which a certification authority employs in issuing certificates." [DSG, R3647] (See: certificate policy.)
- Updated Jan 06, 2026
An algorithm independent transaction format (e.g., PKCS 10, RFC 4211) that contains a DN, and a public key or, optionally, a set of attributes, collectively signed by the entity requesting certification, and sent to a CA, which transforms the request to an X.509 public key certificate or another type of certificate.
- TERMcertifyUpdated Jan 06, 2026
Issue a digital certificate and thus vouch for the truth, accuracy, and binding between data items in the certificate (e.g., "X.509 public key certificate"), such as the identity of the
- TERMC fieldUpdated Jan 06, 2026
See: Compartments field.
- TERMchainUpdated Jan 06, 2026
See: trust chain.
- Updated Jan 06, 2026
A peer entity authentication method (employed by PPP and other protocols, e.g., RFC 3720) that uses a randomly generated challenge and requires a matching response that depends on a cryptographic hash of some combination of the challenge and a secret key. [R1994] (See: challenge response, PAP.)
- Updated Jan 06, 2026
An authentication process that verifies an identity by requiring correct authentication information to be provided in response to a challenge. In a computer system, the authentication information is usually a value that is required to be computed in response to an unpredictable challenge value, but it might be just a password.
- Updated Jan 06, 2026
A mechanism [R2195], intended for use with IMAP4 AUTHENTICATE, by which an IMAP4 client uses a keyed hash [R2104] to authenticate itself to an IMAP4 server. (See: POP3 APOP.)
- Updated Jan 06, 2026
Adversaries may modify software and device credentials to prevent operator and responder access. Depending on the device, the modification or addition of this password could prevent any device configuration actions from being accomplished and may require a factory reset or replacement of hardware. These credentials are often built in features provided by the device vendors as a means to restrict access to management interfaces.
- Updated Jan 06, 2026
Adversaries may change the operating mode of a controller to gain additional access to engineering functions such as Program Download. Programmable controllers typically have several modes of operation that control the state of the user program and control access to the controllers API. Operating modes can be physically selected using a key switch on the face of the controller but may also be selected with calls to the controllers API. Operating modes and the mechanisms by which they are selected often vary by vendor and product line. Some commonly implemented operating modes are described below:
- TERMchannelUpdated Jan 06, 2026
An information transfer path within a system. (See: covert channel.)
- TERMchannel capacityUpdated Jan 06, 2026
The total capacity of a link to carry information; usually expressed in bits per second. (RFC 3753) (Compare: bandwidth.)
- TERMchecksumUpdated Jan 06, 2026
A value that (a) is computed by a function that is dependent on the contents of a data object and (b) is stored or transmitted together with the object, for detecting changes in the data. (See: cyclic redundancy check, data integrity service, error detection code, hash, keyed hash, parity bit, protected checksum.)
- Updated Jan 06, 2026
A security policy to prevent conflict of interest caused by an entity (e.g., a consultant) interacting with competing firms. (See: Brewer Nash model.)
- Updated Jan 06, 2026
A cryptanalysis technique in which the analyst tries to determine the key from knowledge of plain text that corresponds to cipher text selected (i.e., dictated) by the analyst.
- Updated Jan 06, 2026
A cryptanalysis technique in which the analyst tries to determine the key from knowledge of cipher text that corresponds to plain text selected (i.e., dictated) by the analyst.
- TERMcipherUpdated Jan 06, 2026
A cryptographic algorithm for encryption and decryption.
- Updated Jan 06, 2026
A block cipher mode that enhances ECB mode by chaining together blocks of cipher text it produces. [FP081] (See: block cipher, [R1829], [R2405], [R2451], [SP38A].)
- TERMcipher feedbackUpdated Jan 06, 2026
A block cipher mode that enhances ECB mode by chaining together the blocks of cipher text it produces and operating on plaintext segments of variable length less than or equal to the block length. [FP081] (See: block cipher, [SP38A].)
- TERMcipher textUpdated Jan 06, 2026
Data that has been transformed by encryption so that its semantic information content (i.e., its meaning) is no longer intelligible or directly available. (See: ciphertext. Compare: clear text, plain text.)
- TERMciphertextUpdated Jan 06, 2026
Data or information in its encrypted form.
- Updated Jan 06, 2026
"Cryptographic logic that uses previous cipher text to generate a key stream." [C4009, A1523] (See: KAK.)
- Updated Jan 06, 2026
A cryptanalysis technique in which the analyst tries to determine the key solely from knowledge of intercepted cipher text (although the analyst may also know other clues, such as the cryptographic algorithm, the language in which the plain text was written, the subject matter of the plain text, and some probable plaintext words.)
- TERMciphonyUpdated Jan 06, 2026
The process of encrypting audio information.
- Updated Jan 06, 2026
A security model [Clark] to maintain data integrity in the commercial world. (Compare: Bell LaPadula model.)
- TERMclass 2, 3, 4, 5Updated Jan 06, 2026
Assurance levels for PKIs, and for X.509 public key certificates issued by a PKI. [DoD7] (See: "first law" under "Courtney's laws".) "Class 2": Intended for applications handling unclassified, low value data in minimally or moderately protected environments. "Class 3": Intended for applications handling unclassified, medium value data in moderately protected environments, or handling unclassified or high value data in highly protected environments, and for discretionary access control of classified data in highly protected environments. "Class 4": Intended for applications handling unclassified, high value data in minimally protected environments. "Class 5": Intended for applications handling classified data in minimally protected environments, and for authentication of material that would affect the security of classified systems.
- Updated Jan 06, 2026
See: Tutorial under "Trusted Computer System Evaluation Criteria".
- TERMclassificationUpdated Jan 06, 2026
A grouping of classified information to which a hierarchical, restrictive security label is applied to increase protection of the data from unauthorized disclosure. (See: aggregation, classified, data confidentiality service. Compare: category, compartment.)
- Updated Jan 06, 2026
A security label that tells the degree of harm that will result from unauthorized disclosure of the labeled data, and may also tell what countermeasures are required to be applied to protect the data from unauthorized disclosure. Example: IPSO. (See: classified, data confidentiality service. Compare: integrity label.)
- Updated Jan 06, 2026
A hierarchical level of protection (against unauthorized disclosure) that is required to be applied to certain classified data. (See: classified. Compare: security level.)
- TERMclassifiedUpdated Jan 06, 2026
Refers to information (stored or conveyed, in any form) that is formally required by a security policy to receive data confidentiality service and to be marked with a security label (which, in some cases, might be implicit) to indicate its protected status. (See: classify, collateral information, SAP, security level. Compare: unclassified.)
- TERMclassifyUpdated Jan 06, 2026
To officially designate an information item or type of information as being classified and assigned to a specific security level. (See: classified, declassify, security level.)
- TERMclean systemUpdated Jan 06, 2026
A computer system in which the operating system and application system software and files have been freshly installed from trusted software distribution media. (Compare: secure state.)
- TERMclearUpdated Jan 06, 2026
Synonym for "erase". [C4009]
- TERMclearance levelUpdated Jan 06, 2026
The security level of information to which a security clearance authorizes a person to have access.
- TERMclear textUpdated Jan 06, 2026
Data in which the semantic information content (i.e., the meaning) is intelligible or is directly available, i.e., not encrypted. (See: cleartext, in the clear. Compare: cipher text, plain text.)
- TERMcleartextUpdated Jan 06, 2026
Synonym for "clear text" [I7498 2].
- TERMclientUpdated Jan 06, 2026
A system entity that requests and uses a service provided by another system entity, called a "server". (See: server.)
- Updated Jan 06, 2026
A distributed system in which one or more entities, called clients, request a specific service from one or more other entities, called servers, that provide the service to the clients.
- TERMClientsideUpdated Jan 06, 2026
refers to everything in a web application that is displayed or takes place on the client (end user device)
- TERMClipboard DataUpdated Jan 06, 2026
Adversaries may abuse clipboard manager APIs to obtain sensitive information copied to the device clipboard. For example, passwords being copied and pasted from a password manager application could be captured by a malicious application installed on the device.(Citation: Fahl Clipboard)
- Updated Jan 06, 2026
A system environment that meets both of the following conditions: (a) Application developers (including maintainers) have sufficient clearances and authorizations to provide an acceptable presumption that they have not introduced
- TERMcloud computingUpdated Jan 06, 2026
A model for enabling on demand network access to a shared pool of configurable computing capabilities or resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.
- TERMCloud GroupsUpdated Jan 03, 2026
Adversaries may attempt to find cloud groups and permission settings. The knowledge of cloud permission groups can help adversaries determine the particular roles of users and groups within an environment, as well as which users are associated with a particular group.
- Updated Jan 03, 2026
Adversaries may attempt to access the Cloud Instance Metadata API to collect credentials and other sensitive data.
- TERMcodeUpdated Jan 06, 2026
A system of symbols used to represent information, which might originally have some other representation. Examples: ASCII, BER, country code, Morse code. (See: encode, object code, source code.)
- TERMcode bookUpdated Jan 06, 2026
Document containing a systematically arranged list of plaintext units and their ciphertext equivalents. [C4009]
- TERMcode signingUpdated Jan 06, 2026
A security mechanism that uses a digital signature to provide data integrity and data origin authentication for software that is being distributed for use. (See: mobile code, trusted distribution.)