Skip to content
SynAc
Browse

Terms

Alphabetical index of published term entries. Use the letter rail to jump.

  1. COMSEC Material Control SystemUpdated Jan 06, 2026

    "Logistics and accounting system through which COMSEC material marked 'CRYPTO' is distributed, controlled, and safeguarded." [C4009] (See: COMSEC account, COMSEC custodian.)

  2. concealment systemUpdated Jan 06, 2026

    "A method of achieving confidentiality in which sensitive information is hidden by embedding it in irrelevant data." [NCS04] (Compare: steganography.)

  3. Conceal Multimedia FilesUpdated Jan 06, 2026

    Adversaries may attempt to hide multimedia files from the user. By doing so, adversaries may conceal captured files, such as pictures, videos and/or screenshots, then later exfiltrate those files.

  4. ConfidentialityUpdated Jan 06, 2026

    Confidentiality is the property that information is not disclosed to unauthorized parties.

  5. configuration controlUpdated Jan 06, 2026

    The process of regulating changes to hardware, firmware, software, and documentation throughout the development and operational life of a system. (See: administrative security, harden, trusted distribution.)

  6. confinement propertyUpdated Jan 06, 2026

    Property of a system whereby a subject has write access to an object only if the classification of the object dominates the clearance of the subject. (See: property, Bell LaPadula model.)

  7. Connection ProxyUpdated Jan 06, 2026

    Adversaries may use a connection proxy to direct network traffic between systems or act as an intermediary for network communications.

  8. consequenceUpdated Jan 06, 2026

    The effect of an event, incident, or occurrence.

  9. constraintUpdated Jan 06, 2026

    A limitation on the function of an identity, role, or privilege. (See: rule based access control.)

  10. Contact ListUpdated Jan 06, 2026

    Adversaries may utilize standard operating system APIs to gather contact list data. On Android, this can be accomplished using the Contacts Content Provider. On iOS, this can be accomplished using the framework.

  11. Adversaries may attempt to discover containers and other resources that are available within a containers environment. Other resources may include images, deployments, pods, nodes, and other information such as the status of a cluster.

  12. Container Orchestration JobUpdated Jan 03, 2026

    Adversaries may abuse task scheduling functionality provided by container orchestration tools such as Kubernetes to schedule deployment of containers configured to execute malicious code. Container orchestration jobs run these automated tasks at a specific date and time, similar to cron jobs on a Linux system. Deployments of this type can also be configured to maintain a quantity of containers over time, automating the process of maintaining persistence within a cluster.

  13. content filterUpdated Jan 06, 2026

    Application software used to prevent access to certain Web servers, such as by parents who do not want their children to access pornography. (See: filter, guard.)

  14. contingency planUpdated Jan 06, 2026

    A plan for emergency response, backup operations, and post disaster recovery in a system as part of a security program to ensure availability of critical system resources and facilitate continuity of operations in a crisis. [NCS04] (See: availability.)

  15. continuity of operations planUpdated Jan 06, 2026

    A document that sets forth procedures for the continued performance of core capabilities and critical operations during any disruption or potential disruption.

  16. controlled access protectionUpdated Jan 06, 2026

    The level of evaluation criteria for a C2 computer system.

  17. controlled cryptographic itemUpdated Jan 06, 2026

    "Secure telecommunications or information handling equipment, or associated cryptographic component, that is unclassified but governed by a special set of control requirements." [C4009] (Compare: EUCI.)

  18. controlled interfaceUpdated Jan 06, 2026

    A mechanism that facilitates the adjudication of the different security policies of interconnected systems. (See: domain, guard.)

  19. controlled security modeUpdated Jan 06, 2026

    A mode of system operation wherein (a) two or more security levels of information are allowed to be handled concurrently within the same system when some users having access to the system have neither a security clearance nor need to know for some of the data handled by the system, but (b) separation of the users and the classified material on the basis, respectively, of clearance and classification level are not dependent only on operating system control (like they are in multilevel security mode). (See: /system operation/ under "mode", protection level.)

  20. controlling authorityUpdated Jan 06, 2026

    "Official responsible for directing the operation of a cryptonet and for managing the operational use and control of keying material assigned to the cryptonet." [C4009, N4006]

  21. control zoneUpdated Jan 06, 2026

    "The space, expressed in feet of radius, surrounding equipment processing sensitive information, that is under sufficient physical and technical control to preclude an unauthorized entry or compromise." [NCSSG] (Compare: inspectable space, TEMPEST zone.)

  22. cookieUpdated Jan 06, 2026

    Data exchanged between an HTTP server and a browser (a client of the server) to store state information on the client side and retrieve it later for server use.

  23. Coordinated Universal TimeUpdated Jan 06, 2026

    UTC is derived from International Atomic Time (TAI) by adding a number of leap seconds. The International Bureau of Weights and Measures computes TAI once each month by averaging data from many laboratories. (See: GeneralizedTime, UTCTime.)

  24. correctionUpdated Jan 06, 2026

    A system change made to eliminate or reduce the risk of reoccurrence of a security violation or threat consequence. (See: secondary definition under "security".)

  25. correctnessUpdated Jan 06, 2026

    "The property of a system that is guaranteed as the result of formal verification activities." [Huff] (See: correctness proof, verification.)

  26. correctness integrityUpdated Jan 06, 2026

    The property that the information represented by data is accurate and consistent. (Compare: data integrity, source integrity.)

  27. correctness proofUpdated Jan 06, 2026

    A mathematical proof of consistency between a specification for system security and the implementation of that specification. (See: correctness, formal specification.)

  28. corruptionUpdated Jan 06, 2026

    A type of threat action that undesirably alters system operation by adversely modifying system functions or data. (See: disruption.)

  29. counterUpdated Jan 06, 2026

    See: counter mode.

  30. Counter-BiometricsUpdated Jan 06, 2026

    refers to the methods used to bypass or spoof biometric security systems

  31. counter-countermeasureUpdated Jan 06, 2026

    An action, device, procedure, or technique used by an attacker to offset a defensive countermeasure.

  32. countermeasureUpdated Jan 06, 2026

    An action, device, procedure, or technique that meets or opposes (i.e., counters) a threat, a vulnerability, or an attack by eliminating or preventing it, by minimizing the harm it can cause, or by discovering and reporting it so that corrective action can be taken.

  33. counter modeUpdated Jan 06, 2026

    A block cipher mode that enhances ECB mode by ensuring that each encrypted block is different from every other block encrypted under the same key. [SP38A] (See: block cipher.)

  34. A block cipher mode [SP38C] that provides both data confidentiality and data origin authentication, by combining the techniques of CTR and a CBC based message authentication code. (See: block cipher.)

  35. country codeUpdated Jan 06, 2026

    An identifier that is defined for a nation by ISO. [I3166]

  36. Courtney's lawsUpdated Jan 06, 2026

    Principles for managing system security that were stated by Robert H. Courtney, Jr.

  37. covert actionUpdated Jan 06, 2026

    An operation that is planned and executed in a way that conceals the identity of the operator.

  38. covert channelUpdated Jan 06, 2026

    An unintended or unauthorized intra system channel that enables two cooperating entities to transfer information in a way that violates the system's security policy but does not exceed the entities' access authorizations. (See: covert storage channel, covert timing channel, out of band, tunnel.)

  39. Covert storage channelUpdated Jan 06, 2026

    The existence of a covert storage channel in a communications channel may release information which can be of significant use to attackers.

  40. covert timing channelUpdated Jan 06, 2026

    A system feature that enables one system entity to signal information to another by modulating its own use of a system resource in such a way as to affect system response time observed by the second entity. (See: covert channel.)

  41. crackerUpdated Jan 06, 2026

    Someone who tries to break the security of, and gain unauthorized access to, someone else's system, often with malicious intent. (See: adversary, intruder, packet monkey, script kiddy. Compare: hacker.)

  42. Adversaries may create or modify system level processes to repeatedly execute malicious payloads as part of persistence. When operating systems boot up, they can start processes that perform background system functions. On Windows and Linux, these system processes are referred to as services.(Citation: TechNet Services) On macOS, launchd processes known as Launch Daemon and Launch Agent are run to finish system initialization and load user specific parameters.(Citation: AppleDocs Launch Agent Daemons)

  43. credentialUpdated Jan 06, 2026

    "identifier credential": A data object that is a portable representation of the association between an identifier and a unit of authentication information, and that can be presented for use in verifying an identity claimed by an entity that attempts to access a system. Example: X.509 public key certificate. (See: anonymous credential.)

  44. Adversaries may search common password storage locations to obtain user credentials. Passwords can be stored in several places on a device, depending on the operating system or application holding the credentials. There are also specific applications that store passwords to make it easier for users to manage and maintain. Once credentials are obtained, they can be used to perform lateral movement and access restricted information.

  45. crimewareUpdated Jan 06, 2026

    a class of malware designed specifically to automate cybercrime

  46. criticalUpdated Jan 06, 2026

    A condition of a system resource such that denial of access to, or lack of availability of, that resource would jeopardize a system user's ability to perform a primary function or would result in other serious consequences, such as human injury or loss of life. (See: availability, precedence. Compare: sensitive.)

  47. Those systems that are so vital to a nation that their incapacity or destruction would have a debilitating effect on national security, the economy, or public health and safety.

  48. critical infrastructureUpdated Jan 06, 2026

    The systems and assets, whether physical or virtual, so vital to society that the incapacity or destruction of such may have a debilitating impact on the security, economy, public health or safety, environment, or any combination of these matters.

  49. CRL distribution pointUpdated Jan 06, 2026

    See: distribution point.

  50. CRL extensionUpdated Jan 06, 2026

    See: extension.