Terms
Alphabetical index of published term entries. Use the letter rail to jump.
- cross-certificateUpdated Jan 06, 2026
A public key certificate issued by a CA in one PKI to a CA in another PKI. (See: cross certification.)
- cross-certificationUpdated Jan 06, 2026
The act or process by which a CA in one PKI issues a public key certificate to a CA in another PKI. [X509] (See: bridge CA.)
- cross-domain solutionUpdated Jan 06, 2026
Synonym for "guard".
- CrowdsourcedUpdated Jan 06, 2026
obtain (information or input into a particular task or project) by enlisting the services of a large number of people, either paid or unpaid, typically via the internet.
- cryptanalysisUpdated Jan 06, 2026
The operations performed in defeating or circumventing cryptographic protection of information by applying mathematical techniques and without an initial knowledge of the key employed in providing the protection.
- crypto, CRYPTOUpdated Jan 06, 2026
A prefix ("crypto ") that means "cryptographic".
- cryptocurrrencyUpdated Jan 06, 2026
a digital currency in which transactions are verified and records maintained by a decentralized system using cryptography, rather than by a centralized authority.
- cryptographicUpdated Jan 06, 2026
An adjective that refers to cryptography.
- cryptographic algorithmUpdated Jan 06, 2026
A well defined computational procedure that takes variable inputs, including a cryptographic key, and produces an output.
- cryptographic application programming interfaceUpdated Jan 06, 2026
The source code formats and procedures through which an application program accesses cryptographic services, which are defined abstractly compared to their actual implementation. Example, see: PKCS 11, [R2628].
- cryptographic associationUpdated Jan 06, 2026
A security association that involves the use of cryptography to provide security services for data exchanged by the associated entities. (See: ISAKMP.)
- cryptographic boundaryUpdated Jan 06, 2026
See: secondary definition under "cryptographic module".
- cryptographic cardUpdated Jan 06, 2026
A cryptographic token in the form of a smart card or a PC card.
- cryptographic componentUpdated Jan 06, 2026
A generic term for any system component that involves cryptography. (See: cryptographic module.)
- cryptographic hashUpdated Jan 06, 2026
See: secondary definition under "hash function".
- cryptographic ignition keyUpdated Jan 06, 2026
A physical (usually electronic) token used to store, transport, and protect cryptographic keys and activation data. (Compare: dongle, fill device.)
- cryptographic keyUpdated Jan 06, 2026
See: key. Usage: Usually shortened to just "key".
- Cryptographic Message SyntaxUpdated Jan 06, 2026
An encapsulation syntax (RFC 3852) for digital signatures, hashes, and encryption of arbitrary messages.
- cryptographic moduleUpdated Jan 06, 2026
A set of hardware, software, firmware, or some combination thereof that implements cryptographic logic or processes, including cryptographic algorithms, and is contained within the module's "cryptographic boundary", which is an explicitly defined contiguous perimeter that establishes the physical bounds of the module. [FP140]
- cryptographic systemUpdated Jan 06, 2026
A set of cryptographic algorithms together with the key management processes that support use of the algorithms in some application context.
- cryptographic tokenUpdated Jan 06, 2026
A portable, user controlled, physical device (e.g., smart card or PCMCIA card) used to store cryptographic information and possibly also perform cryptographic functions. (See: cryptographic card, token.)
- cryptographyUpdated Jan 06, 2026
The use of mathematical techniques to provide security services, such as confidentiality, data integrity, entity authentication, and data origin authentication.
- CryptojackingUpdated Jan 06, 2026
a type of cybercrime that involves the unauthorized use of a target's devices (computers, smartphones, tablets, or even servers) by cybercriminals to mine for cryptocurrency
- CryptokiUpdated Jan 06, 2026
A CAPI defined in PKCS 11. Pronunciation: "CRYPTO key". Derivation: Abbreviation of "cryptographic token interface".
- cryptologyUpdated Jan 06, 2026
The mathematical science that deals with cryptanalysis and cryptography.
- cryptomalwareUpdated Jan 06, 2026
is malware that encrypts data on the targets device and demands a ransom to restore it
- CryptominersUpdated Jan 06, 2026
Cryptomining is an online threat that hides on a computer or mobile device and uses the machine’s resources to “mine” cryptocurrencies.
- cryptonetUpdated Jan 06, 2026
A network (i.e., a communicating set) of system entities that share a secret cryptographic key for a symmetric algorithm. (See: controlling authority.)
- cryptoperiodUpdated Jan 06, 2026
The time span during which a particular key value is authorized to be used in a cryptographic system. (See: key management.)
- cryptosystemUpdated Jan 06, 2026
Contraction of "cryptographic system".
- cryptovariableUpdated Jan 06, 2026
Synonym for "key".
- customer service and technical supportUpdated Jan 06, 2026
In the NICE Framework, cybersecurity work where a person: Addresses problems, installs, configures, troubleshoots, and provides maintenance and training in response to customer requirements or inquiries (e.g., tiered level customer support).
- cut-and-paste attackUpdated Jan 06, 2026
An active attack on the data integrity of cipher text, effected by replacing sections of cipher text with other cipher text, such that the result appears to decrypt correctly but actually decrypts to plain text that is forged to the satisfaction of the attacker.
- CyberattackUpdated Jan 06, 2026
a malicious and deliberate attempt to breach the information system
- Cyber-biosecurityUpdated Jan 06, 2026
an emerging field that addresses the intersection of cybersecurity and biosecurity, focusing on protecting biological data, processes, and systems from cyber threats and malicious activities
- cyber ecosystemUpdated Jan 06, 2026
The interconnected information infrastructure of interactions among persons, processes, data, and information and communications technologies, along with the environment and conditions that influence those interactions.
- cyberespionageUpdated Jan 06, 2026
or cyber spying, is a type of cyberattack in which an unauthorized user attempts to access sensitive or classified data or intellectual property (IP) for economic gain, competitive advantage or political reasons
- cyber exerciseUpdated Jan 06, 2026
A planned event during which an organization simulates a cyber disruption to develop or test capabilities such as preventing, detecting, mitigating, responding to or recovering from the disruption.
- cyberforensicUpdated Jan 06, 2026
the process of collecting, analyzing, and preserving digital evidence to investigate cybercrimes and other incidents
- cyber infrastructureUpdated Jan 06, 2026
An electronic information and communications systems and services and the information contained therein.
- cyber operationsUpdated Jan 06, 2026
In the NICE Framework, cybersecurity work where a person: Performs activities to gather evidence on criminal or foreign intelligence entities in order to mitigate possible or real time threats, protect against espionage or insider threats, foreign sabotage, international terrorist activities, or to support other intelligence activities.
- cyber operations planningUpdated Jan 06, 2026
in the NICE Framework, cybersecurity work where a person: Performs in depth joint targeting and cyber planning process. Gathers information and develops detailed Operational Plans and Orders supporting requirements. Conducts strategic and operational level planning across the full range of operations for integrated information and cyberspace operations.
- CybersecuringUpdated Jan 06, 2026
the process of hardening technologies, processes, and controls to protect systems, networks, programs, devices and data from cyber attacks
- cybersecurityUpdated Jan 06, 2026
The activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation.
- Cybersecurity adjacentUpdated Jan 06, 2026
a number of roles that have cybersecurity responsibilities which typically form only part of their overall responsibilities within an organization.
- cybersecurity-awareUpdated Jan 06, 2026
knowing what security threats are and acting responsibly to avoid potential risks.
- cyber threat intelligence (CTI)Updated Jan 06, 2026
The collecting, processing, organizing, and analyzing data into actionable information that relates to capabilities, opportunities, actions, and intent of adversaries in the cyber domain to meet a specific requirement determined by and informing decision makers.
- cyberthreatsUpdated Jan 06, 2026
refers to anything that has the potential to cause serious harm to a computer system
- cyberwarfareUpdated Jan 06, 2026
typically defined as a set of actions by a nation or organization to attack countries or institutions' computer network systems with the intention of disrupting, damaging, or destroying infrastructure by computer viruses or denial of service attacks
- CyberWarriorUpdated Jan 06, 2026
an individual who participates in cyberwarfare, motivated either by personal, patriotic, or religious reasons, but not due to professional requirement