Skip to content
SynAc
Browse

Terms

Alphabetical index of published term entries. Use the letter rail to jump.

  1. certification pathUpdated Jan 06, 2026

    A linked sequence of one or more public key certificates, or one or more public key certificates and one attribute certificate, that enables a certificate user to verify the signature on the last certificate in the path, and thus enables the user to obtain (from that last certificate) a certified public key, or certified attributes, of the system entity that is the subject of that last certificate. (See: trust anchor, certificate validation, valid certificate.)

  2. certification policyUpdated Jan 06, 2026

    Synonym for either "certificate policy" or "certification practice statement".

  3. "A statement of the practices which a certification authority employs in issuing certificates." [DSG, R3647] (See: certificate policy.)

  4. certification requestUpdated Jan 06, 2026

    An algorithm independent transaction format (e.g., PKCS 10, RFC 4211) that contains a DN, and a public key or, optionally, a set of attributes, collectively signed by the entity requesting certification, and sent to a CA, which transforms the request to an X.509 public key certificate or another type of certificate.

  5. certifyUpdated Jan 06, 2026

    Issue a digital certificate and thus vouch for the truth, accuracy, and binding between data items in the certificate (e.g., "X.509 public key certificate"), such as the identity of the

  6. C fieldUpdated Jan 06, 2026

    See: Compartments field.

  7. chainUpdated Jan 06, 2026

    See: trust chain.

  8. A peer entity authentication method (employed by PPP and other protocols, e.g., RFC 3720) that uses a randomly generated challenge and requires a matching response that depends on a cryptographic hash of some combination of the challenge and a secret key. [R1994] (See: challenge response, PAP.)

  9. challenge-responseUpdated Jan 06, 2026

    An authentication process that verifies an identity by requiring correct authentication information to be provided in response to a challenge. In a computer system, the authentication information is usually a value that is required to be computed in response to an unpredictable challenge value, but it might be just a password.

  10. A mechanism [R2195], intended for use with IMAP4 AUTHENTICATE, by which an IMAP4 client uses a keyed hash [R2104] to authenticate itself to an IMAP4 server. (See: POP3 APOP.)

  11. Change CredentialUpdated Jan 06, 2026

    Adversaries may modify software and device credentials to prevent operator and responder access. Depending on the device, the modification or addition of this password could prevent any device configuration actions from being accomplished and may require a factory reset or replacement of hardware. These credentials are often built in features provided by the device vendors as a means to restrict access to management interfaces.

  12. Change Operating ModeUpdated Jan 06, 2026

    Adversaries may change the operating mode of a controller to gain additional access to engineering functions such as Program Download. Programmable controllers typically have several modes of operation that control the state of the user program and control access to the controllers API. Operating modes can be physically selected using a key switch on the face of the controller but may also be selected with calls to the controllers API. Operating modes and the mechanisms by which they are selected often vary by vendor and product line. Some commonly implemented operating modes are described below:

  13. channelUpdated Jan 06, 2026

    An information transfer path within a system. (See: covert channel.)

  14. channel capacityUpdated Jan 06, 2026

    The total capacity of a link to carry information; usually expressed in bits per second. (RFC 3753) (Compare: bandwidth.)

  15. checksumUpdated Jan 06, 2026

    A value that (a) is computed by a function that is dependent on the contents of a data object and (b) is stored or transmitted together with the object, for detecting changes in the data. (See: cyclic redundancy check, data integrity service, error detection code, hash, keyed hash, parity bit, protected checksum.)

  16. Chinese wall policyUpdated Jan 06, 2026

    A security policy to prevent conflict of interest caused by an entity (e.g., a consultant) interacting with competing firms. (See: Brewer Nash model.)

  17. chosen-ciphertext attackUpdated Jan 06, 2026

    A cryptanalysis technique in which the analyst tries to determine the key from knowledge of plain text that corresponds to cipher text selected (i.e., dictated) by the analyst.

  18. chosen-plaintext attackUpdated Jan 06, 2026

    A cryptanalysis technique in which the analyst tries to determine the key from knowledge of cipher text that corresponds to plain text selected (i.e., dictated) by the analyst.

  19. cipherUpdated Jan 06, 2026

    A cryptographic algorithm for encryption and decryption.

  20. cipher block chainingUpdated Jan 06, 2026

    A block cipher mode that enhances ECB mode by chaining together blocks of cipher text it produces. [FP081] (See: block cipher, [R1829], [R2405], [R2451], [SP38A].)

  21. cipher feedbackUpdated Jan 06, 2026

    A block cipher mode that enhances ECB mode by chaining together the blocks of cipher text it produces and operating on plaintext segments of variable length less than or equal to the block length. [FP081] (See: block cipher, [SP38A].)

  22. cipher textUpdated Jan 06, 2026

    Data that has been transformed by encryption so that its semantic information content (i.e., its meaning) is no longer intelligible or directly available. (See: ciphertext. Compare: clear text, plain text.)

  23. ciphertextUpdated Jan 06, 2026

    Data or information in its encrypted form.

  24. ciphertext auto-keyUpdated Jan 06, 2026

    "Cryptographic logic that uses previous cipher text to generate a key stream." [C4009, A1523] (See: KAK.)

  25. ciphertext-only attackUpdated Jan 06, 2026

    A cryptanalysis technique in which the analyst tries to determine the key solely from knowledge of intercepted cipher text (although the analyst may also know other clues, such as the cryptographic algorithm, the language in which the plain text was written, the subject matter of the plain text, and some probable plaintext words.)

  26. ciphonyUpdated Jan 06, 2026

    The process of encrypting audio information.

  27. Clark-Wilson modelUpdated Jan 06, 2026

    A security model [Clark] to maintain data integrity in the commercial world. (Compare: Bell LaPadula model.)

  28. class 2, 3, 4, 5Updated Jan 06, 2026

    Assurance levels for PKIs, and for X.509 public key certificates issued by a PKI. [DoD7] (See: "first law" under "Courtney's laws".) "Class 2": Intended for applications handling unclassified, low value data in minimally or moderately protected environments. "Class 3": Intended for applications handling unclassified, medium value data in moderately protected environments, or handling unclassified or high value data in highly protected environments, and for discretionary access control of classified data in highly protected environments. "Class 4": Intended for applications handling unclassified, high value data in minimally protected environments. "Class 5": Intended for applications handling classified data in minimally protected environments, and for authentication of material that would affect the security of classified systems.

  29. See: Tutorial under "Trusted Computer System Evaluation Criteria".

  30. classificationUpdated Jan 06, 2026

    A grouping of classified information to which a hierarchical, restrictive security label is applied to increase protection of the data from unauthorized disclosure. (See: aggregation, classified, data confidentiality service. Compare: category, compartment.)

  31. classification labelUpdated Jan 06, 2026

    A security label that tells the degree of harm that will result from unauthorized disclosure of the labeled data, and may also tell what countermeasures are required to be applied to protect the data from unauthorized disclosure. Example: IPSO. (See: classified, data confidentiality service. Compare: integrity label.)

  32. classification levelUpdated Jan 06, 2026

    A hierarchical level of protection (against unauthorized disclosure) that is required to be applied to certain classified data. (See: classified. Compare: security level.)

  33. classifiedUpdated Jan 06, 2026

    Refers to information (stored or conveyed, in any form) that is formally required by a security policy to receive data confidentiality service and to be marked with a security label (which, in some cases, might be implicit) to indicate its protected status. (See: classify, collateral information, SAP, security level. Compare: unclassified.)

  34. classifyUpdated Jan 06, 2026

    To officially designate an information item or type of information as being classified and assigned to a specific security level. (See: classified, declassify, security level.)

  35. clean systemUpdated Jan 06, 2026

    A computer system in which the operating system and application system software and files have been freshly installed from trusted software distribution media. (Compare: secure state.)

  36. clearUpdated Jan 06, 2026

    Synonym for "erase". [C4009]

  37. clearance levelUpdated Jan 06, 2026

    The security level of information to which a security clearance authorizes a person to have access.

  38. clear textUpdated Jan 06, 2026

    Data in which the semantic information content (i.e., the meaning) is intelligible or is directly available, i.e., not encrypted. (See: cleartext, in the clear. Compare: cipher text, plain text.)

  39. cleartextUpdated Jan 06, 2026

    Synonym for "clear text" [I7498 2].

  40. clientUpdated Jan 06, 2026

    A system entity that requests and uses a service provided by another system entity, called a "server". (See: server.)

  41. client-server systemUpdated Jan 06, 2026

    A distributed system in which one or more entities, called clients, request a specific service from one or more other entities, called servers, that provide the service to the clients.

  42. ClientsideUpdated Jan 06, 2026

    refers to everything in a web application that is displayed or takes place on the client (end user device)

  43. Clipboard DataUpdated Jan 06, 2026

    Adversaries may abuse clipboard manager APIs to obtain sensitive information copied to the device clipboard. For example, passwords being copied and pasted from a password manager application could be captured by a malicious application installed on the device.(Citation: Fahl Clipboard)

  44. closed security environmentUpdated Jan 06, 2026

    A system environment that meets both of the following conditions: (a) Application developers (including maintainers) have sufficient clearances and authorizations to provide an acceptable presumption that they have not introduced

  45. cloud computingUpdated Jan 06, 2026

    A model for enabling on demand network access to a shared pool of configurable computing capabilities or resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.

  46. Cloud GroupsUpdated Jan 03, 2026

    Adversaries may attempt to find cloud groups and permission settings. The knowledge of cloud permission groups can help adversaries determine the particular roles of users and groups within an environment, as well as which users are associated with a particular group.

  47. Cloud Instance Metadata APIUpdated Jan 03, 2026

    Adversaries may attempt to access the Cloud Instance Metadata API to collect credentials and other sensitive data.

  48. codeUpdated Jan 06, 2026

    A system of symbols used to represent information, which might originally have some other representation. Examples: ASCII, BER, country code, Morse code. (See: encode, object code, source code.)

  49. code bookUpdated Jan 06, 2026

    Document containing a systematically arranged list of plaintext units and their ciphertext equivalents. [C4009]

  50. code signingUpdated Jan 06, 2026

    A security mechanism that uses a digital signature to provide data integrity and data origin authentication for software that is being distributed for use. (See: mobile code, trusted distribution.)