Skip to content
SynAc
Browse

Terms

Alphabetical index of published term entries. Use the letter rail to jump.

  1. Adversaries may modify code signing policies to enable execution of applications signed with unofficial or unknown keys. Code signing provides a level of authenticity on an app from a developer, guaranteeing that the program has not been tampered with and comes from an official source. Security controls can include enforcement mechanisms to ensure that only valid, signed code can be run on a device.

  2. code wordUpdated Jan 06, 2026

    A single word that is used as a security label (usually applied to classified information) but which itself has a classified meaning. (See: classified, /U.S. Government/ security label.)

  3. cold startUpdated Jan 06, 2026

    A procedure for initially keying cryptographic equipment. [C4009]

  4. collateral informationUpdated Jan 06, 2026

    Information that is classified but is not required to be protected by an SAP. (See: /U.S. Government/ classified.)

  5. collection operationsUpdated Jan 06, 2026

    In the NICE Framework, cybersecurity work where a person: Executes collection using appropriate strategies and within the priorities established through the collection management process.

  6. collect & operateUpdated Jan 06, 2026

    A NICE Framework category consisting of specialty areas responsible for specialized denial and deception operations and collection of cybersecurity information that may be used to develop intelligence.

  7. color changeUpdated Jan 06, 2026

    In a system being operated in periods processing mode, the act of purging all information from one processing period and then changing over to the next processing period. (See: BLACK, RED.)

  8. Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries. These interfaces and languages provide ways of interacting with computer systems and are a common feature across many different platforms. Most systems come with some built in command line interface and scripting capabilities, for example, Android is a UNIX like OS and includes a basic Unix Shell that can be accessed via the Android Debug Bridge (ADB) or Java’s package.

  9. Command-Line InterfaceUpdated Jan 06, 2026

    Adversaries may utilize command line interfaces (CLIs) to interact with systems and execute commands. CLIs provide a means of interacting with computer systems and are a common feature across many types of platforms and devices within control systems environments. (Citation: Enterprise ATT&CK January 2018) Adversaries may also use CLIs to install and run new software, including malicious tools that may be installed over the course of an operation.

  10. "Relationship between NSA and industry in which NSA provides the COMSEC expertise (i.e., standards, algorithms, evaluations, and guidance) and industry provides design, development, and production capabilities to produce a type 1 or type 2 product." [C4009]

  11. An organization that has official approval to evaluate the security of products and systems under the Common Criteria, ITSEC, or some other standard. (Compare: KLIF.)

  12. A Government, interagency, standing committee of the President's Critical Infrastructure Protection Board. The CNSS is chaired by the Secretary of Defense and provides a forum for the discussion of policy issues, sets national policy, and promulgates direction, operational procedures, and guidance for the security of national security systems. The Secretary of Defense and the Director of Central Intelligence are responsible for developing and overseeing the implementation of Government wide policies, principles, standards, and guidelines for the security of systems that handle national security information.

  13. A standard for evaluating information technology (IT) products and systems. It states requirements for security functions and for assurance measures. [CCIB] (See: CLEF, EAL, packages, protection profile, security target, TOE. Compare: CMM.)

  14. Common IP Security OptionUpdated Jan 06, 2026

    See: secondary definition under "IPSO".

  15. Commonly Used PortUpdated Jan 06, 2026

    Adversaries may communicate over a commonly used port to bypass firewalls or network detection systems and to blend in with normal network activity, to avoid more detailed inspection. They may use the protocol associated with the port, or a completely different protocol. They may use commonly open ports, such as the examples provided below.

  16. common nameUpdated Jan 06, 2026

    A character string that (a) may be a part of the X.500 DN of a Directory object ("commonName" attribute), (b) is a (possibly ambiguous) name by which the object is commonly known in some limited scope (such as an organization), and (c) conforms to the naming conventions of the country or culture with which it is associated. [X520] (See: "subject" and "issuer" under "X.509 public key certificate".)

  17. communications coverUpdated Jan 06, 2026

    "Concealing or altering of characteristic communications patterns to hide information that could be of value to an adversary." [C4009] (See: operations security, traffic flow confidentiality, TRANSEC.)

  18. communication securityUpdated Jan 06, 2026

    Measures that implement and assure security services in a communication system, particularly those that provide data confidentiality and data integrity and that authenticate communicating entities.

  19. community of interestUpdated Jan 06, 2026

    A set of entities that operate under a common security policy. (Compare: domain.)

  20. community riskUpdated Jan 06, 2026

    Probability that a particular vulnerability will be exploited within an interacting population and adversely affect some members of that population. [C4009] (See: Morris worm, risk.)

  21. community stringUpdated Jan 06, 2026

    A community name in the form of an octet string that serves as a cleartext password in SNMP version 1 (RFC 1157) and version 2 (RFC 1901). (See: password, Simple Network Management Protocol.)

  22. compartmentUpdated Jan 06, 2026

    A grouping of sensitive information items that require special access controls beyond those normally provided for the basic classification level of the information. (See: compartmented security mode. Compare: category, classification.)

  23. compartmented security modeUpdated Jan 06, 2026

    A mode of system operation wherein all users having access to the system have the necessary security clearance for the single, hierarchical classification level of all data handled by the system, but some users do not have the clearance for a non hierarchical category of some data handled by the system. (See: category, /system operation/ under "mode", protection level, security clearance.)

  24. Compartments fieldUpdated Jan 06, 2026

    A 16 bit field (the "C field") that specifies compartment values in the security option (option type 130) of version 4 IP's datagram header format. The valid field values are assigned by the U.S. Government, as specified in RFC 791.

  25. compressionUpdated Jan 06, 2026

    A process that encodes information in a way that minimizes the number of resulting code symbols and thus reduces storage space or transmission time.

  26. Adversaries may modify applications installed on a device to establish persistent access to a victim. These malicious modifications can be used to make legitimate applications carry out adversary tasks when these applications are in use.

  27. Adversaries may modify system software binaries to establish persistent access to devices. System software binaries are used by the underlying operating system and users over adb or terminal emulators.

  28. compromised key listUpdated Jan 06, 2026

    A list that identifies keys for which unauthorized disclosure or alteration may have occurred. (See: compromise.)

  29. Adversaries may manipulate hardware components in products prior to receipt by a final consumer for the purpose of data or system compromise. By modifying hardware or firmware in the supply chain, adversaries can insert a backdoor into consumer networks that may be difficult to detect and give the adversary a high degree of control over the system.

  30. compromise recoveryUpdated Jan 06, 2026

    The process of regaining a secure state for a system after detecting that the system has experienced a security compromise.

  31. Adversaries may manipulate software dependencies and development tools prior to receipt by a final consumer for the purpose of data or system compromise. Applications often depend on external software to function properly. Popular open source projects that are used as dependencies in many applications, such as pip and NPM packages, may be targeted as a means to add malicious code to users of the dependency.(Citation: Trendmicro NPM Compromise)(Citation: Bitdefender NPM Repositories Compromised 2021)(Citation: MANDVI Malicious npm and PyPI Packages Disguised) This may also include abandoned packages, which in some cases could be re registered by threat actors after being removed by adversaries.(Citation: The Hacker News PyPi Revival Hijack 2024) Adversaries may also employ "typosquatting" or name confusion by choosing names similar to existing popular libraries or packages in order to deceive a user.(Citation: Ahmed Backdoors in Python and NPM Packages)(Citation: Meyer PyPI Supply Chain Attack Uncovered)(Citation: Checkmarx oss seo)

  32. Adversaries may manipulate application software prior to receipt by a final consumer for the purpose of data or system compromise. Supply chain compromise of software can take place in a number of ways, including manipulation of the application source code, manipulation of the update/distribution mechanism for that software, or replacing compiled releases with a modified version.

  33. An organization that studies computer and network INFOSEC in order to provide incident response services to victims of attacks, publish alerts concerning vulnerabilities and threats, and offer other information to help improve computer and network security. (See: CSIRT, security incident.)

  34. The centralized CSIRT of the U.S. Department of Energy; a member of FIRST.

  35. computer networkUpdated Jan 06, 2026

    A collection of host computers together with the subnetwork or internetwork through which they can exchange data.

  36. computer network defenseUpdated Jan 06, 2026

    The actions taken to defend against unauthorized activity within computer networks.

  37. In the NICE Framework, cybersecurity work where a person: Uses defensive measures and information collected from a variety of sources to identify, analyze, and report events that occur or might occur within the network in order to protect information, information systems, and networks from threats.

  38. In the NICE Framework, cybersecurity work where a person: Tests, implements, deploys, maintains, reviews, and administers the infrastructure hardware and software that are required to effectively manage the computer network defense service provider network and resources; monitors network to actively remediate unauthorized activities.

  39. computer platformUpdated Jan 06, 2026

    A combination of computer hardware and an operating system (which may consist of software, firmware, or both) for that hardware. (Compare: computer system.)

  40. Computers At RiskUpdated Jan 06, 2026

    The 1991 report [NRC91] of the System Security Study Committee, sponsored by the U.S. National Academy of Sciences and supported by the Defense Advanced Research Projects Agency of the U.S. DoD. It made many recommendations for industry and governments to improve computer security and trustworthiness. Some of the most important recommendations (e.g., establishing an

  41. computer securityUpdated Jan 06, 2026

    Measures to implement and assure security services in a computer system, particularly those that assure access control service.

  42. An organization "that coordinates and supports the response to security incidents that involve sites within a defined constituency." [R2350] (See: CERT, FIRST, security incident.)

  43. computer security objectUpdated Jan 06, 2026

    The definition or representation of a resource, tool, or mechanism used to maintain a condition of security in computerized environments. Includes many items referred to in standards that are either selected or defined by separate user communities. [CSOR] (See: object identifier, Computer Security Objects Register.)

  44. A service operated by NIST is establishing a catalog for computer security objects to provide stable object definitions identified by unique names. The use of this register will enable the unambiguous specification of security parameters and algorithms to be used in secure data exchanges. (See: object identifier.)

  45. computer systemUpdated Jan 06, 2026

    Synonym for "information system", or a component thereof. (Compare: computer platform.)

  46. COMSEC accountUpdated Jan 06, 2026

    "Administrative entity, identified by an account number, used to maintain accountability, custody, and control of COMSEC material." [C4009] (See: COMSEC custodian.)

  47. COMSEC accountingUpdated Jan 06, 2026

    The process of creating, collecting, and maintaining data records that describe the status and custody of designated items of COMSEC material. (See: accounting legend code.)

  48. COMSEC boundaryUpdated Jan 06, 2026

    "Definable perimeter encompassing all hardware, firmware, and software components performing critical COMSEC functions, such as key generation and key handling and storage." [C4009] (Compare: cryptographic boundary.)

  49. COMSEC custodianUpdated Jan 06, 2026

    "Individual designated by proper authority to be responsible for the receipt, transfer, accounting, safeguarding, and destruction of COMSEC material assigned to a COMSEC account." [C4009]

  50. COMSEC materialUpdated Jan 06, 2026

    Items designed to secure or authenticate communications or information in general; these items include (but are not limited to) keys; equipment, devices, documents, firmware, and software that embodies or describes cryptographic logic; and other items that perform COMSEC functions. [C4009] (Compare: keying material.)