Computer emergency response team coordination center (CERT/CC)
CERT/CC focuses on Internet security vulnerabilities, provides incident response services to websites that have been the victims of attack, publish security alerts, research security and survivability in wide-area-networked computing environments, and develops website security information. It issues security advisories, helps start incident response teams for user organizations, coordinates the efforts of teams when responding to large-scale incidents, provides training to incident handling staff, and researches the causes of security vulnerabilities.
Computer facility
Physical resources that include structures or parts of structures to house and support capabilities. For small computers, stand-alone systems, and word processing equipment, it is the physical area where the computer is used.
Computer forensic process life cycle
A computer forensic process life cycle consisting of four basic phases: collection, examination, analysis, and reporting.
Computer forensics
The practice of gathering, retaining, and analyzing computer-related data for investigative purposes in a manner that maintains the integrity of the data.
Computer fraud
Computer-related crimes involving deliberate misrepresentation, alteration, or disclosure of data in order to obtain something of value (usually for monetary gain). A computer system must have been involved in the perpetration or cover-up of the act or series of acts. A computer system might have been involved through improper manipulation of input data; output or results; applications programs; data files; computer operations; communications; or computer hardware, systems software, or firmware.
Computer network
A complex consisting of two or more interconnected computers.
Computer security
Measures and controls that ensure confidentiality, integrity, and availability of IT assets, including hardware, software, firmware, and information being processed, stored, and communicated.
Computer security incident
A violation or imminent threat of violation of computer security policies, acceptable use policies, or standard computer security practices.
Computer security incident response team (CSIRT)
A capability set up for the purpose of assisting in responding to computer security-related incidents; also called a computer incident response team (CIRT), a computer incident response center (CIRC), or a computer incident response capability (CIRC).
Computer virus
A computer virus is similar to a Trojan horse because it is a program that contains hidden code, which usually performs some unwanted function as a side effect. The main difference between a virus and a Trojan horse is that the hidden code in a computer virus can only replicate by attaching a copy of itself to other programs and may also include an additional “payload” that triggers when specific conditions are met.
Concentrators
Concentrators gather together several lines in one central location, and are the foundation of a FDDI network and are attached directly to the FDDI dual ring.
Concept of operations
It is a computer operations plan consisting of only one document, where it will describes the scope of entire operational activities.
Confidentiality
(1) Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information. (2) It is the property that sensitive information is not disclosed to unauthorized individuals, entities, devices, or processes. (3) The secrecy of data that is transmitted in the clear. (4) Confidentiality covers data in storage, during processing, and in transit.
Confidentiality mode
A mode that is used to encipher plaintext and decipher ciphertext. The confidentiality modes include electronic codebook (ECB), cipher block chaining (CBC), cipher feedback (CFB), output feedback (OFB), and counter (CTR) modes.
Configuration
The relative or functional arrangement of components in a system.
Configuration accounting
The recording and reporting of configuration item descriptions and all departures from the baseline during design and production.
Configuration auditing
An independent review of computer software for the purpose of assessing compliance with established requirements, standards, and baseline.
Configuration control
The process for controlling modifications to hardware, firmware, software, and documentation to ensure that an information system is protected against improper modifications before, during, and after system implementation.
Configuration control board
An established committee that is the final authority on all proposed changes to the computer system.
Configuration identification
The identifying of the system configuration throughout the design, development, test, and production tasks.
Configuration item
(1) The smallest component of hardware, software, firmware, documentation, or any of its discrete portions, which is tracked by the configuration management system. (2) A collection of hardware or computer programs or any of its discrete portions that satisfies an end-user function.
Configuration management
(1) The management of security features and assurances through control of changes made to a system’s hardware, software, firmware, documentation, test cases, test fixtures, and test documentation throughout the development and operational life of the system. (2) The process of controlling the software and documentation so they remain consistent as they are developed or changed. (3) A procedure for applying technical and administrative direction and surveillance to (i) identify and document the functional and physical characteristics of an item or system, (ii) control any changes to such characteristics, and (iii) record and report the change, process, and implementation status. The configuration management process must be carefully tailored to the capacity, size, scope, phase of the life cycle, maturity, and complexity of the system involved. Compare with configuration control.
Conformance testing
Conformance testing is a testing to determine if a product satisfies the criteria specified in a controlling standard document (e.g., RFC and ISO).
Congestion
Occurs when an additional demand for service occurs in a network switch and when more subscribers attempt simultaneously to access the switch more than the switch can handle. Two types of congestion can take place: (1) network congestion, which is an undesirable overload condition caused by traffic in excess of its capacity to handle, and (2) reception congestion, which occurs at a data switching exchange place.
Connectionless mode
A service that has a single phase involving control mechanisms, such as addressing in addition to data transfer.
Connection-oriented mode
A service that has three distinct phases: establishment, in which two or more users are bound to a connection; data transfer, in which data are exchanged between the users; and release, in which binding is terminated.
Connectivity tree
Routers use the connectivity tree to track Internet group management protocol (IGMP) status and activity.
Connectors
A connector is an electro-mechanical device on the ends of cables that permit them to be connected with, and disconnected from, other cables.
Console