Chain-in-depth
The market analysis in the supply chain strategy to identify alternative integrators/suppliers (level 1), the suppliers of the integrators/suppliers (level 2), or the suppliers of the suppliers of the integrators/suppliers (level 3), and other deep levels, thus providing a supply chain-in-depth analysis.
Chain of custody
A process that tracks the movement of evidence through its collection, safeguarding, and analysis life cycle by documenting each person who handled the evidence, the date/time it was collected or transferred, and the purpose for the transfer.
Chain of evidence
A process of recording that shows who obtained the evidence, where and when the evidence was obtained, who secured the evidence, where it was stored, and who had control or possession of the evidence. The chain of evidence ties to the rules of evidence and the chain of custody.
Chain of trust
A chain of trust requires that the organization establish and retain a level of confidence that each participating external service provider in the potentially complex consumer-provider relationship provides adequate protection for the services rendered to the organization.
Chained checksum
A checksum technique in which the hashing function is a function of data content and previous checksum values.
Challenge handshake authentication protocol (CHAP)
An authentication mechanism for point-to-point protocol (PPP) connections that encrypt the user’s password. It uses a three-way handshake between the client and the server.
Challenge-response
An authentication procedure that requires calculating a correct response to an unpredictable challenge.
Challenge-response protocol
An authentication protocol where the verifier sends the claimant a challenge (usually a random value or a nonce) that the claimant combines with a shared secret (often by hashing the challenge and secret together) to generate a response that is sent to the verifier. The verifier knows the shared secret and can independently compute the response and compare it with the response generated by the claimant. If the two are the same, the claimant is considered to have successfully authenticated himself. When the shared secret is a cryptographic key, such protocols are generally secure against eavesdroppers. When the shared secret is a password, an eavesdropper does not directly intercept the password itself, but the eavesdropper may be able to find the password with an offline password guessing attack.
Channel scanning
Changing the channel being monitored by a wireless intrusion detection and prevention system.
Chatterbots
Bots that can talk (chat) using animation characters.
Check-digit
A check-digit calculation helps ensure that the primary key or data is entered correctly. This is a technical and detective control.
Check-point
Restore procedures are needed before, during, or after completion of certain transactions or events to ensure acceptable fault-recovery.
Checksum
A value automatically computed on data to detect error or manipulation during transmission. It is an error-checking technique to ensure the accuracy of data transmission. The number of bits in a data unit is summed and transmitted along with the data. The receiving computer then checks the sum and compares. Digits or bits are summed according to arbitrary rules and used to verify the integrity of data (that is, changes to data). This is a technical and detective control.
Chief information officer (CIO)
A senior official responsible for (1) providing advice and other assistance to the head of the organization and other senior management personnel of the organization to ensure that information technology is acquired and information resources are managed in a manner that is consistent with laws, executive orders, directives, policies, regulations, and priorities established by the head of the organization; (2) developing, maintaining, and facilitating the implementation of a sound and integrated information technology architecture for the organization; and (3) promoting the effective and efficient design and operation of all major information resources management processes for the organization, including improvements to work processes of the organization.
Chokepoint
A chokepoint creates a bottleneck in a system, whether the system is a social, natural, civil, military, or computer system. For example, the installation of a firewall in a computer system between a local network and the Internet creates a chokepoint and makes it difficult for an attacker to come through that network channel. In graph theory and network analysis, a chokepoint is any node in a network with a high centrality (Wikipedia).
Cipher
(1) A series of transformations that converts plaintext to ciphertext using the cipher key. (2) A cipher block chaining-message authentication code (CBC-MAC) algorithm. (3) A secret-key block-cipher algorithm used to encrypt data and to generate a MAC to provide assurance that the payload and the associated data are authentic.
Cipher key
Secret, cryptographic key that is used by the Key Expansion Routine to generate a set of Round Keys; can be pictured as a rectangular array of bytes, having four rows and NK columns.
Cipher suite
Negotiated algorithm identifiers, which are understandable in human readable form using a pneumonic code.
Ciphertext
(1) Data output from the cipher or input to the inverse cipher. (2) The result of transforming plaintext with an encryption algorithm. (3) It is the encrypted form of a plaintext message of data. Also known as crypto-text or enciphered information.
Circuit-level gateway firewall
A type of firewall that can be used either as a stand-alone or specialized function performed by an application-level gateway. It does not permit an end-to-end Transmission Control Protocol (TCP) connection. This firewall can be configured to support application-level service on inbound connections and circuit-level functions for outbound connections. It incurs overhead when examining the incoming application data for forbidden functions but does not incur that overhead on outgoing data.
Civil law
Law that deals with suits for breach of contract or tort cases, such as suits for personal injuries.
Claimant
(1) A party whose identity is to be verified using an authentication protocol. (2) An entity which is or which represents a principal for the purposes of authentication, together with the functions involved in an authentication exchange on behalf of that entity. (3) A claimant acting on behalf of a principal must include the functions necessary for engaging in an authentication exchange (e.g., a smart card (claimant) can act on behalf of a human user (principal)).
Claimed signatory
From the verifier’s perspective, the claimed signatory is the entity that purportedly generated a digital signature.
Class
(1) A set of objects that share a common structure and a common behavior. (2) A generic description of an object type consisting of instance variables and method definitions. Class definitions are templates from which individual objects can be created.
Class hierarchy
Classes can naturally be organized into structures (tree or network) called class hierarchies. In a hierarchy, a class may have zero or more superclasses above it in the hierarchy. A class may have zero or more classes below, referred to as its subclasses.