Skip to content
SynAc
Browse

Terms

Alphabetical index of published term entries. Use the letter rail to jump.

  1. cross-certificateUpdated Jan 06, 2026

    A public key certificate issued by a CA in one PKI to a CA in another PKI. (See: cross certification.)

  2. cross-certificationUpdated Jan 06, 2026

    The act or process by which a CA in one PKI issues a public key certificate to a CA in another PKI. [X509] (See: bridge CA.)

  3. cross-domain solutionUpdated Jan 06, 2026

    Synonym for "guard".

  4. CrowdsourcedUpdated Jan 06, 2026

    obtain (information or input into a particular task or project) by enlisting the services of a large number of people, either paid or unpaid, typically via the internet.

  5. cryptanalysisUpdated Jan 06, 2026

    The operations performed in defeating or circumventing cryptographic protection of information by applying mathematical techniques and without an initial knowledge of the key employed in providing the protection.

  6. crypto, CRYPTOUpdated Jan 06, 2026

    A prefix ("crypto ") that means "cryptographic".

  7. cryptocurrrencyUpdated Jan 06, 2026

    a digital currency in which transactions are verified and records maintained by a decentralized system using cryptography, rather than by a centralized authority.

  8. cryptographicUpdated Jan 06, 2026

    An adjective that refers to cryptography.

  9. cryptographic algorithmUpdated Jan 06, 2026

    A well defined computational procedure that takes variable inputs, including a cryptographic key, and produces an output.

  10. The source code formats and procedures through which an application program accesses cryptographic services, which are defined abstractly compared to their actual implementation. Example, see: PKCS 11, [R2628].

  11. cryptographic associationUpdated Jan 06, 2026

    A security association that involves the use of cryptography to provide security services for data exchanged by the associated entities. (See: ISAKMP.)

  12. cryptographic boundaryUpdated Jan 06, 2026

    See: secondary definition under "cryptographic module".

  13. cryptographic cardUpdated Jan 06, 2026

    A cryptographic token in the form of a smart card or a PC card.

  14. cryptographic componentUpdated Jan 06, 2026

    A generic term for any system component that involves cryptography. (See: cryptographic module.)

  15. cryptographic hashUpdated Jan 06, 2026

    See: secondary definition under "hash function".

  16. cryptographic ignition keyUpdated Jan 06, 2026

    A physical (usually electronic) token used to store, transport, and protect cryptographic keys and activation data. (Compare: dongle, fill device.)

  17. cryptographic keyUpdated Jan 06, 2026

    See: key. Usage: Usually shortened to just "key".

  18. Cryptographic Message SyntaxUpdated Jan 06, 2026

    An encapsulation syntax (RFC 3852) for digital signatures, hashes, and encryption of arbitrary messages.

  19. cryptographic moduleUpdated Jan 06, 2026

    A set of hardware, software, firmware, or some combination thereof that implements cryptographic logic or processes, including cryptographic algorithms, and is contained within the module's "cryptographic boundary", which is an explicitly defined contiguous perimeter that establishes the physical bounds of the module. [FP140]

  20. cryptographic systemUpdated Jan 06, 2026

    A set of cryptographic algorithms together with the key management processes that support use of the algorithms in some application context.

  21. cryptographic tokenUpdated Jan 06, 2026

    A portable, user controlled, physical device (e.g., smart card or PCMCIA card) used to store cryptographic information and possibly also perform cryptographic functions. (See: cryptographic card, token.)

  22. cryptographyUpdated Jan 06, 2026

    The use of mathematical techniques to provide security services, such as confidentiality, data integrity, entity authentication, and data origin authentication.

  23. CryptojackingUpdated Jan 06, 2026

    a type of cybercrime that involves the unauthorized use of a target's devices (computers, smartphones, tablets, or even servers) by cybercriminals to mine for cryptocurrency

  24. CryptokiUpdated Jan 06, 2026

    A CAPI defined in PKCS 11. Pronunciation: "CRYPTO key". Derivation: Abbreviation of "cryptographic token interface".

  25. cryptologyUpdated Jan 06, 2026

    The mathematical science that deals with cryptanalysis and cryptography.

  26. cryptomalwareUpdated Jan 06, 2026

    is malware that encrypts data on the targets device and demands a ransom to restore it

  27. CryptominersUpdated Jan 06, 2026

    Cryptomining is an online threat that hides on a computer or mobile device and uses the machine’s resources to “mine” cryptocurrencies.

  28. cryptonetUpdated Jan 06, 2026

    A network (i.e., a communicating set) of system entities that share a secret cryptographic key for a symmetric algorithm. (See: controlling authority.)

  29. cryptoperiodUpdated Jan 06, 2026

    The time span during which a particular key value is authorized to be used in a cryptographic system. (See: key management.)

  30. cryptosystemUpdated Jan 06, 2026

    Contraction of "cryptographic system".

  31. cryptovariableUpdated Jan 06, 2026

    Synonym for "key".

  32. In the NICE Framework, cybersecurity work where a person: Addresses problems, installs, configures, troubleshoots, and provides maintenance and training in response to customer requirements or inquiries (e.g., tiered level customer support).

  33. cut-and-paste attackUpdated Jan 06, 2026

    An active attack on the data integrity of cipher text, effected by replacing sections of cipher text with other cipher text, such that the result appears to decrypt correctly but actually decrypts to plain text that is forged to the satisfaction of the attacker.

  34. CyberattackUpdated Jan 06, 2026

    a malicious and deliberate attempt to breach the information system

  35. Cyber-biosecurityUpdated Jan 06, 2026

    an emerging field that addresses the intersection of cybersecurity and biosecurity, focusing on protecting biological data, processes, and systems from cyber threats and malicious activities

  36. cyber ecosystemUpdated Jan 06, 2026

    The interconnected information infrastructure of interactions among persons, processes, data, and information and communications technologies, along with the environment and conditions that influence those interactions.

  37. cyberespionageUpdated Jan 06, 2026

    or cyber spying, is a type of cyberattack in which an unauthorized user attempts to access sensitive or classified data or intellectual property (IP) for economic gain, competitive advantage or political reasons

  38. cyber exerciseUpdated Jan 06, 2026

    A planned event during which an organization simulates a cyber disruption to develop or test capabilities such as preventing, detecting, mitigating, responding to or recovering from the disruption.

  39. cyberforensicUpdated Jan 06, 2026

    the process of collecting, analyzing, and preserving digital evidence to investigate cybercrimes and other incidents

  40. cyber infrastructureUpdated Jan 06, 2026

    An electronic information and communications systems and services and the information contained therein.

  41. cyber operationsUpdated Jan 06, 2026

    In the NICE Framework, cybersecurity work where a person: Performs activities to gather evidence on criminal or foreign intelligence entities in order to mitigate possible or real time threats, protect against espionage or insider threats, foreign sabotage, international terrorist activities, or to support other intelligence activities.

  42. cyber operations planningUpdated Jan 06, 2026

    in the NICE Framework, cybersecurity work where a person: Performs in depth joint targeting and cyber planning process. Gathers information and develops detailed Operational Plans and Orders supporting requirements. Conducts strategic and operational level planning across the full range of operations for integrated information and cyberspace operations.

  43. CybersecuringUpdated Jan 06, 2026

    the process of hardening technologies, processes, and controls to protect systems, networks, programs, devices and data from cyber attacks

  44. cybersecurityUpdated Jan 06, 2026

    The activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation.

  45. Cybersecurity adjacentUpdated Jan 06, 2026

    a number of roles that have cybersecurity responsibilities which typically form only part of their overall responsibilities within an organization.

  46. cybersecurity-awareUpdated Jan 06, 2026

    knowing what security threats are and acting responsibly to avoid potential risks.

  47. The collecting, processing, organizing, and analyzing data into actionable information that relates to capabilities, opportunities, actions, and intent of adversaries in the cyber domain to meet a specific requirement determined by and informing decision makers.

  48. cyberthreatsUpdated Jan 06, 2026

    refers to anything that has the potential to cause serious harm to a computer system

  49. cyberwarfareUpdated Jan 06, 2026

    typically defined as a set of actions by a nation or organization to attack countries or institutions' computer network systems with the intention of disrupting, damaging, or destroying infrastructure by computer viruses or denial of service attacks

  50. CyberWarriorUpdated Jan 06, 2026

    an individual who participates in cyberwarfare, motivated either by personal, patriotic, or religious reasons, but not due to professional requirement