Terms
Alphabetical index of published term entries with tag filters and quick sort.
- Updated Jan 06, 2026
A public key certificate issued by a CA in one PKI to a CA in another PKI. (See: cross certification.)
- Updated Jan 06, 2026
The act or process by which a CA in one PKI issues a public key certificate to a CA in another PKI. [X509] (See: bridge CA.)
- Updated Jan 06, 2026
Synonym for "guard".
- TERMCrowdsourcedUpdated Jan 06, 2026
obtain (information or input into a particular task or project) by enlisting the services of a large number of people, either paid or unpaid, typically via the internet.
- TERMcryptanalysisUpdated Jan 06, 2026
The operations performed in defeating or circumventing cryptographic protection of information by applying mathematical techniques and without an initial knowledge of the key employed in providing the protection.
- TERMcrypto, CRYPTOUpdated Jan 06, 2026
A prefix ("crypto ") that means "cryptographic".
- TERMcryptocurrrencyUpdated Jan 06, 2026
a digital currency in which transactions are verified and records maintained by a decentralized system using cryptography, rather than by a centralized authority.
- TERMcryptographicUpdated Jan 06, 2026
An adjective that refers to cryptography.
- Updated Jan 06, 2026
A well defined computational procedure that takes variable inputs, including a cryptographic key, and produces an output.
- Updated Jan 06, 2026
The source code formats and procedures through which an application program accesses cryptographic services, which are defined abstractly compared to their actual implementation. Example, see: PKCS 11, [R2628].
- Updated Jan 06, 2026
A security association that involves the use of cryptography to provide security services for data exchanged by the associated entities. (See: ISAKMP.)
- Updated Jan 06, 2026
See: secondary definition under "cryptographic module".
- Updated Jan 06, 2026
A cryptographic token in the form of a smart card or a PC card.
- Updated Jan 06, 2026
A generic term for any system component that involves cryptography. (See: cryptographic module.)
- Updated Jan 06, 2026
See: secondary definition under "hash function".
- Updated Jan 06, 2026
A physical (usually electronic) token used to store, transport, and protect cryptographic keys and activation data. (Compare: dongle, fill device.)
- Updated Jan 06, 2026
See: key. Usage: Usually shortened to just "key".
- Updated Jan 06, 2026
An encapsulation syntax (RFC 3852) for digital signatures, hashes, and encryption of arbitrary messages.
- Updated Jan 06, 2026
A set of hardware, software, firmware, or some combination thereof that implements cryptographic logic or processes, including cryptographic algorithms, and is contained within the module's "cryptographic boundary", which is an explicitly defined contiguous perimeter that establishes the physical bounds of the module. [FP140]
- Updated Jan 06, 2026
A set of cryptographic algorithms together with the key management processes that support use of the algorithms in some application context.
- Updated Jan 06, 2026
A portable, user controlled, physical device (e.g., smart card or PCMCIA card) used to store cryptographic information and possibly also perform cryptographic functions. (See: cryptographic card, token.)
- TERMcryptographyUpdated Jan 06, 2026
The use of mathematical techniques to provide security services, such as confidentiality, data integrity, entity authentication, and data origin authentication.
- TERMCryptojackingUpdated Jan 06, 2026
a type of cybercrime that involves the unauthorized use of a target's devices (computers, smartphones, tablets, or even servers) by cybercriminals to mine for cryptocurrency
- TERMCryptokiUpdated Jan 06, 2026
A CAPI defined in PKCS 11. Pronunciation: "CRYPTO key". Derivation: Abbreviation of "cryptographic token interface".
- TERMcryptologyUpdated Jan 06, 2026
The mathematical science that deals with cryptanalysis and cryptography.
- TERMcryptomalwareUpdated Jan 06, 2026
is malware that encrypts data on the targets device and demands a ransom to restore it
- TERMCryptominersUpdated Jan 06, 2026
Cryptomining is an online threat that hides on a computer or mobile device and uses the machine’s resources to “mine” cryptocurrencies.
- TERMcryptonetUpdated Jan 06, 2026
A network (i.e., a communicating set) of system entities that share a secret cryptographic key for a symmetric algorithm. (See: controlling authority.)
- TERMcryptoperiodUpdated Jan 06, 2026
The time span during which a particular key value is authorized to be used in a cryptographic system. (See: key management.)
- TERMcryptosystemUpdated Jan 06, 2026
Contraction of "cryptographic system".
- TERMcryptovariableUpdated Jan 06, 2026
Synonym for "key".
- Updated Jan 06, 2026
In the NICE Framework, cybersecurity work where a person: Addresses problems, installs, configures, troubleshoots, and provides maintenance and training in response to customer requirements or inquiries (e.g., tiered level customer support).
- Updated Jan 06, 2026
An active attack on the data integrity of cipher text, effected by replacing sections of cipher text with other cipher text, such that the result appears to decrypt correctly but actually decrypts to plain text that is forged to the satisfaction of the attacker.
- TERMCyberattackUpdated Jan 06, 2026
a malicious and deliberate attempt to breach the information system
- Updated Jan 06, 2026
an emerging field that addresses the intersection of cybersecurity and biosecurity, focusing on protecting biological data, processes, and systems from cyber threats and malicious activities
- TERMcyber ecosystemUpdated Jan 06, 2026
The interconnected information infrastructure of interactions among persons, processes, data, and information and communications technologies, along with the environment and conditions that influence those interactions.
- TERMcyberespionageUpdated Jan 06, 2026
or cyber spying, is a type of cyberattack in which an unauthorized user attempts to access sensitive or classified data or intellectual property (IP) for economic gain, competitive advantage or political reasons
- TERMcyber exerciseUpdated Jan 06, 2026
A planned event during which an organization simulates a cyber disruption to develop or test capabilities such as preventing, detecting, mitigating, responding to or recovering from the disruption.
- TERMcyberforensicUpdated Jan 06, 2026
the process of collecting, analyzing, and preserving digital evidence to investigate cybercrimes and other incidents
- Updated Jan 06, 2026
An electronic information and communications systems and services and the information contained therein.
- TERMcyber operationsUpdated Jan 06, 2026
In the NICE Framework, cybersecurity work where a person: Performs activities to gather evidence on criminal or foreign intelligence entities in order to mitigate possible or real time threats, protect against espionage or insider threats, foreign sabotage, international terrorist activities, or to support other intelligence activities.
- Updated Jan 06, 2026
in the NICE Framework, cybersecurity work where a person: Performs in depth joint targeting and cyber planning process. Gathers information and develops detailed Operational Plans and Orders supporting requirements. Conducts strategic and operational level planning across the full range of operations for integrated information and cyberspace operations.
- TERMCybersecuringUpdated Jan 06, 2026
the process of hardening technologies, processes, and controls to protect systems, networks, programs, devices and data from cyber attacks
- TERMcybersecurityUpdated Jan 06, 2026
The activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation.
- Updated Jan 06, 2026
a number of roles that have cybersecurity responsibilities which typically form only part of their overall responsibilities within an organization.
- Updated Jan 06, 2026
knowing what security threats are and acting responsibly to avoid potential risks.
- Updated Jan 06, 2026
The collecting, processing, organizing, and analyzing data into actionable information that relates to capabilities, opportunities, actions, and intent of adversaries in the cyber domain to meet a specific requirement determined by and informing decision makers.
- TERMcyberthreatsUpdated Jan 06, 2026
refers to anything that has the potential to cause serious harm to a computer system
- TERMcyberwarfareUpdated Jan 06, 2026
typically defined as a set of actions by a nation or organization to attack countries or institutions' computer network systems with the intention of disrupting, damaging, or destroying infrastructure by computer viruses or denial of service attacks
- TERMCyberWarriorUpdated Jan 06, 2026
an individual who participates in cyberwarfare, motivated either by personal, patriotic, or religious reasons, but not due to professional requirement