JavaScriptMessages
APEC
Asia Pacific Economic Cooperation
.English
.Español
.tiếng Việt
.По-русски
.한국어
.日本語
.简体中文版
Home
News
Rss Feeds
SiteMap
Academics
Tools
Tool Downloads (Pg. 1)
Tool Downloads (Pg. 2)
Tool Downloads (Pg. 3)
Tool Downloads (Pg. 4)
Curriculum
CNSS Standards
Ethics and Law
K-12 Material
NSA Centers of Excellence
Teaching Materials
4012 Presentation
Course Modules
Module 1
01. (I) Corporate Resource
02. (II) Basic Problems
03. (III) Ethical Issues
04. (IV) Studies
Teaching Considerations
Module 2
01. (I) Ethics
02. (II) Environment
03. (III) Physical
04. (IV) Data
05. (V) Security Training
Teaching Considerations
Module 3
01. (I) Planning
02. (II) Organizational Policies & Procedures
03. (III) Ethics and Professionalism
04. (IV) Personnel Security
05. (V) Physical Security
06. (VI) System Security
07. (VII) Threats & Vulnerabilities
08. (VIII) Data Security & Recovery
09. (IX) Control and Audit
10. (X) Costs and Benefits
Teaching Considerations
Module 4
01. (I) Underlying Problem
02. (II) Laws as Tools for Information Security
03. (III) Laws and Legislation as Legal Options to
Teaching Considerations
Module 5
01. (I) Overview
02. (II) System Sensitivity
03. (III) Security Requirements
04. (IV) Levels of Security
05. (V) Data Life Cycles
06. (VI) Sample Protection Plan
Teaching Considerations
Module 6
01. (I) Overview
02. (II) Threats
03. (III) Countermeasures
04. (IV) Tradeoffs-Costs & Benefits
05. (V) Network Design
Teaching Considerations
Module 7
01. (I) Overview
02. (II) Development of Security Program
03. (III) Risk Analysis
04. (IV) Contingency Planning
05. (V) Legal Issues for Managers
06. (VI) System Validation & Verification (Accredi
07. (VII) Information Systems Audit
08. (VIII) Computer Security Check List
Teaching Considerations
Module 8
Course Modules Website
Course Videos
IA Videos
Videos (Pg. 1)
Videos (Pg. 2)
Videos (Pg. 3)
Videos (Pg. 4)
Videos (Pg. 5)
Videos (Pg. 6)
Videos (Pg. 7)
External Links
Academic Sites
Government Sites
Independent Organizations
Industry Sites
General Interest
Common Criteria
IA Activities
Professional Certification
Seminal Works
Seminal Papers
Glossary
Publications
Government Documents
Gov Docs (Pg. 1)
Gov Docs (Pg. 2)
Gov Docs (Pg. 3)
Gov Docs (Pg. 4)
Gov Docs (Pg. 5)
Gov Docs (Pg. 6)
IA Posters
IA Posters (Pg. 1)
IA Posters (Pg. 2)
IA Posters (Pg. 3)
IA Posters (Pg. 4)
IA Posters (Pg. 5)
IA Posters (Pg. 6)
Industry Documents
NIATEC Publications
Older Papers
Publisher Databases
Login
Glossary
Filter:
#
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
All
Return to List
C
C Programmer's Disease*
C*
C1
C2
C3
C3I
C4
C4 Systems Security Vulnerability Reporting Program
CA
Cabling#
Cache
Cache Memory
Call
Call Back
Call Forwarding
Call Hold
Call Identifier
Call Processing
Call Set-Up Time
Call Sign Cipher
Call-Back Security#
Called-Party Camp-On
Caller ID#
Calling-Party Camp-On
Callsign
Callsign Cipher
CAMA
Camp-On
Can
Cancel Character
Candygrammar*
Canister
Canonical*
Can't Happen*
Capability
Capability-Based
Capability-Based System
Card Walloper
Carder
Careless Employees
Careware
Cargo Cult Programming
Carnivore
Carrier
Carrier Sense Multiple Access With Collision Detection (CSMA/CD)
Cascade
Cascading
Case And Paste
Casters-Up Mode
Cat
Catastrophe
Catatonic
Categories Of Data
Category
Caution Statement
Caveats
CBA
CBC
CCB
CCEP
CCI
CCI Assembly
CCI Component
CCI Equipment
CCIS
CCITT
CCO
Cd Tilde
CDR
CDRL
CDS
Cell
CELP
Central Computer Facility
Central Office Of
Central Office Of Record
Central Processing Unit
Central Processor
Central security management console
CEOI
CEPR
CERT
Certificate authority (CA)
Certificate Of Action
Certificate Of Action Statement
Certificate revocation list (CRL)
Certification
Certification And Accreditation Program
Certified TEMPEST
Certified Tempest Technical Authority
CERTs (Computer emergency response teams)
CF
CFD
CFE
CGI (Common Gateway Interface)
Chad
Chad Box
Chad Tape
Chadless Tape
Chain
Chain of evidence
Challenge And Reply
Challenge And Reply Authentication
Challenge message
Challenge-response authentication
Change Control Policies
Change Controls
Change management process
Change request
Channel
Channel Hopping
Channel Op
CHANOP
CHAP (Challenge-Handshake Authentication Protocol)
Char
Character
Character Check
Character Generator
Character Interval
Character Recognition
Character Set
Character Stepped
Character-Count
Character-Count And Bit-Count Integrity
Charter of Fundamental Rights
Chase Pointers
Chawmp
Check
Check Bit
Check Character
Check Digit
Check Word
Checksum
Chernobyl Packet
Chiclet Keyboard
Chief security officer (CSO)
Children’s Online Privacy Protection Act
Chine Nual
Chmod
Choke
Chomp
CHOP
Chown
Christmas Tree
Christmas Tree Packet
Chrome
Chroot
Chug
CI
CIA
CIAC
CIK
Cinderella Book
CIP
Cipher
Cipher Block Chaining (CBC)
Cipher System
Cipher Text
Cipher Text Auto-Key
Ciphertext
Ciphony
Circles of trust
Circuit
Circuit Breaker
Circuit firewall
Circuit-Switched Networks
CIRCULAR No. A-127
Circular No. A-130
CIRK
Civil Rights Act
CK
CKG
CKL
Cladding
Clandestine Operation
C-Language
Class
Class A1, Verified Design
Class B1, Labeled Security Protection
Class B3, Security Domains
Class C1, Discretionary Security Protection
Class C2, Controlled Access Protection
Class D, Minimal Protection
Class A
Class B
Class C
Classful addressing
Classic C
Classification
Classification Guide
Classified
Classified Computer Security Program
Classified Data/information
Classified Defence Information
Classified Defense Information
Classified Information
Classified Materials Handling And Shipping
Classless InterDomain Routing (CIDR)
Clean
Clear
Clear Channel
Clear Text
Clearance Level
Clearance Verification
Clearing
Clearing ADP Media
Clearing Magnetic Media
Client firewall
Client/Server Security
CLIs (command-line interfaces)
CLMD
Clobber
Clock
Clocks
Clone
Closed Security
Closed Security Environment
Closed Shop
Closed User Group
Closed User Group With Outgoing Access
Closed-circuit television (CCTV)
Clover Key
CM
CMCS
CMP
CMS
CN
CNCS
CNK
CNLZ
Coax
Coaxial Cable
COBOL
Code
Code Book
Code Character
Code Conversion
Code Element
Code Freeze
Code Grinder
Code Group
Code inspection
Code Restriction
Code System
Code Vocabulary
Code Word
CODEC
Coded Character Set
Coded Image
Coded Set
Code-Excited Linear Prediction
Code-Independent Data Communication
Coder
Codes
Codewalker
Coding Scheme
Coercive Force
Coercivity
Cognizant Agent
Cognizant Security Authority
Coherent
Cokebottle
Cold Boot
Cold sites
Cold Start
Collaborative Computing
Collateral
Collusion
Colours
Combinational Logic Element
COMINT
Comm Mode
Comma-Free Code
Command
Command And Control
Command And Control System
Command Authority
Command Key
Command Languages/interfaces
Command, Control And Communications
Command, Control, Communications, And Computer (C4) Systems
Command, Control, Communications, And Computer (C4) Systems Security
Command, Control, Communications, And Computer System
Command-line interface (CLI)
Comment Out
Commercial Carrier
Commercial COMSEC
Commercial COMSEC Endorsement Program
Commercial vulnerability testing tools
Common Carrier
Common Carrier Security
Common Fill Device
Common Gateway Interface (CGI)
Common Sense
Common word passwords
Common-Channel Interoffice Signaling
Communication Deception
Communications
Communications Assistance for Law Enforcement Act
Communications Center
Communications Center Security
Communications Channel
Communications Cover
Communications Deception
Communications Devices
Communications Intelligence
Communications Profile
Communications Security
Communications Security (COMSEC)
Communications Security Equipment
Communications Security Material
Communications Security Policy And Guidance
Communications Security Survey
Communications System
Communications Systems Abuse
Community Of Interest
COMP
Compact
Companion Document Series
Comparator
Compartment
Compartment "S" Variable
Compartmentalization
Compartmentation
Compartmented Information
Compartmented Intelligence/sensitive Compartmented Information (SCI)
Compartmented Mode
Compartmented Security Mode
Compartmented/partitioned Mode
Compelled Signaling
Competent Authority
Competitor
Compile
Compiler
Compiling Program
Compliance Review
Component
Comprehensive security
Compress
Compression
Compromise
Compromising
Compromising Emanation Performance Requirement
Compromising Emanations
Compulsory tunneling
COMPUSEC
Computer
Computer Abuse
Computer and Internet use policy
Computer Conferencing
Computer Confetti
Computer Crime
Computer Cryptography
Computer Emergency Response Team
Computer Emergency Response Team/Coordination Center (CERT/CC)
Computer emergency response teams (CERTs)
Computer Facility
Computer Fraud
Computer Fraud And Abuse Act
Computer Fraud and Abuse Act of 1986
Computer Graphics 1. Methods and techniques for converting data to or from graphic displays via co
Computer Installation
Computer Language
Computer Management
Computer Matching
Computer Matching Responsibilities
Computer Network
Computer Program
Computer Program Origin
Computer Protection Plan
Computer Routine
Computer Science
Computer Science And Architecture
Computer Security
Computer Security Act
Computer Security Act Of 1987 100-235
Computer Security Incident
Computer Security Law
Computer Security Officer
Computer Security Policy
Computer Security Subsystem
Computer Security Subsystem Interpretation
Computer Security Technical Vulnerability Reporting Program
Computer Security Technical Vulnerability Reporting Program (CSTVRP)
Computer Site
Computer System
Computer System Fault Tolerance
Computer System Manager
Computer System Resilience
Computer Systems Security Officer
Computer Word
Computer-based firewall
Computer-Dependent Language
Computer-Oriented Language
Computers At Risk
Computing System
Computron
COMSEC
COMSEC Account
COMSEC Account Audit
COMSEC Accounting
COMSEC Aid
COMSEC Boundary
COMSEC Chip Set
COMSEC Control
COMSEC Control Program
COMSEC Crypto-Algorithm
COMSEC Custodian
COMSEC End Item
COMSEC Equipment
COMSEC Facility
COMSEC Incident
COMSEC Insecurity
COMSEC Manager
COMSEC Material
COMSEC Material Control System
COMSEC Material Destruction Procedures
COMSEC Material Identification And Inventory
COMSEC Modification
COMSEC Module
COMSEC Monitoring
COMSEC No-Lone Zone
COMSEC Profile
COMSEC Responsible Officer
COMSEC Survey
COMSEC System Data
COMSEC Testing
COMSEC Training
Concealment System
Conceptual Entity
Condition Out
Conducted Signals
Conduit
Confidential Source
Confidentiality
Configuration
Configuration Control
Configuration Control Board
Configuration Management
Configuration Review Board
Confinement
Confinement Channel
Confinement Property
Conformance Testing
CONJ
Connection
Connectionless
Connectionless Data Transfer
Connectionless Mode Transmission
Connection-oriented
Connectivity
Connector Conspiracy
Cons
Consequences
Considered Harmful
Console
Contained
Container
Containment
Contamination
Content Vectoring Protocol (CVP)
Content-Addressable Storage
Contention
Context. User-Friendly
Contingency Key
Contingency Management
Contingency Plan
Contingency Plan Testing
Contingency Planning
Continuity Of Operations
Continuity Plan
Continuity Planning
Continuous Operation
Contract
Contracting For Security Services
Contractor Security Safeguards
Contracts
Contracts, Agreements, And Other Obligations
Control Character
Control Function
Control Line
Control Zone
Control-C
Controllable Isolation
Controlled
Controlled Access
Controlled Access Area
Controlled Access Protection
Controlled Accessibility
Controlled Area
Controlled BLACK Equipment Area(s) (CBEA)
Controlled COMSEC Item
Controlled Cryptographic Item
Controlled Cryptographic Item (CCI)
Controlled Cryptographic Item (CCI) Assembly
Controlled Cryptographic Item (CCI) Component
Controlled Cryptographic Item (CCI) Equipment
Controlled Information
Controlled Security Mode
Controlled Sharing
Controlled Space
Controller
Controlling
Controlling Authority
Controlling Paperwork Burden On The Public
Control-O
Control-Q
Control-S
Conversational Mode
Conversational Service
Conway's Law
Cookbook
Cooked Mode
Cookie
Cookie File
Cookie Jar
COOP
Cooperative Key
Cooperative Key Generation
Cooperative Remote
Cooperative Remote Rekeying
Coordination With Related Disciplines
Copper
Copy Protected
Copy Protection
Copyleft
Copyright Protection And Licensing
COR
Core
Core Cancer
Core Dump
Core Leak
Core Storage
Core Wars
Corporate security policy statement
Corrective Actions
Correctness
Correctness Proof
Correlated Emanations
Cost
Cost Accounting
Cost Benefit Analysis
Cost Distribution
Cost Of Major Failures
Cost of repair
Cost Recovery
Cost/Benefit Analysis
Cost/Time Contamination
Cost/Time Interruption
Cost-Analysis
Cost-Benefit Analysis
Costing Function
Cost-Risk Analysis
COTS
Cots Software
Counterfeit Access Device And Computer Fraud Act
Counterintelligence
Countermeasure
Countermeasures
Coupling
Cover
Cover And Deception
Covert Channel
Covert Channels
Covert Storage
Covert Storage Channel
Covert Storage Channels
Covert Timing
Covert Timing Channel
CP/M
CPC
CPCI
Cpi
CPS
CPU
CPU Registers
CPU Wars
Crack Root
Cracker
Cracking
Crafted
Crank
Crash
Crash And Burn
Cray
Cray Instability
Crayola
Crayola Books
CRB
CRC
Creationism
Credentials
Credit card number theft
Creep
Creeping Elegance
Creeping Featurism
Creeping Featuritis
CRIB
Criminal Prosecution
Criteria
Critical Information
Critical Mass
Critical Processing
Critical Resources
Critical Severity
Critical Systems
Critical Technology
Criticality
CRL (Certificate revocation list)
CRLCMP
CRLF
CRO
Cross Assembler
Cross-Post
Cross-Talk
CRP
Cruft
Crunch
CRWG
Cryppie
Crypt/Crypto
Cryptanalysis
Cryptanalyst
Crypto
Crypto Key
Crypto-Alarm
Crypto-Algorithm
Cryptoanalysis
Crypto-Ancillary
Crypto-Ancillary Equipment
Cryptochannel
Crypto-Equipment
Cryptographic
Cryptographic Authentication
Cryptographic Checkvalue
Cryptographic Component
Cryptographic Equipment
Cryptographic Information
Cryptographic Initialization
Cryptographic Key
Cryptographic Logic
Cryptographic Randomization
Cryptographic System
Cryptographic Techniques
Cryptography
Crypto-Ignition Key
Cryptologic
Cryptology
Cryptomaterial
Cryptonet
Crypto-Operation
Cryptoperiod
Cryptosecurity
Cryptosynchronization
Cryptosystem
Cryptosystem Assessment
Cryptosystem Evaluation
Cryptosystem Review
Cryptosystem Survey
Cryptovariable
CSA
CSC
CSC Bulletin
CSCI
CSC-STD-001-83
CSC-STD-002-85
CSC-STD-0030-85
CSC-STD-004-85
CSE
CSETWG
CSIRTs
CSM
CSO
CSO (chief security officer)
CSPP
CSRD
CSS
CSSO
CSSP
CSTVRP
CSWG
CTAK
CTSS
CTTA
CTY
Cube
CUP
Custodian
Custodian Of Data
Customer
Customer fraud
Customer IT Security Needs
Customer Premises
Customer Service Orientation
Cut A Tape
CVA
CVRP
CWC
Cybercrime Treaty of 2001
Cyberspace
Cyberterror
Cyberwar
Cycle
Cycle (for Overwriting Memory, Disk, Etc. )
Cycle Crunch
Cycle Drought
Cycle Server
Cyclic Redundancy Check
Cypherpunk
Chawmp
n. [University of Florida] 16 or 18 bits (half of a machine word). This term was used by FORTH hackers during the late 1970s/early 1980s; it is said to have been archaic then, and may now be obsolete. It was coined in revolt against the promiscuous use of `word' for anything between 16 and 32 bits; `word' has an additional special meaning for FORTH hacks that made the overloading intolerable. For similar reasons, /gaw'bl/ (spelled `gawble' or possibly `gawbul') was in use as a term for 32 or 48 bits (presumably a full machine word, but our sources are unclear on this). These terms are more easily understood if one thinks of them as `chomp' and `gobble' pronounced in a Florida or other Southern U. S. dialect. For general discussion of similar terms, see nybble.