Archives: Glossary Terms

CISA

Cybersecurity and Infrastructure Security Agency

Read More

Clandestine

Illicit and hidden. A clandestine operation depends for its success upon not being detected, because if detected it would immediately be recognized for what it is. Landing a team of...

Read More

Clickbait

Text designed to induce an Internet user to follow a link. It’s often scandalous or salacious, or it might appeal to greed, fear, or a desire for quick self improvement...

Read More

Clickjacking

A cyberattack technique in which a user is induced to click on an apparently benign link that in fact carries them to a malicious site, installs malware, or performs some...

Read More

Clone phishing 

A form of phihing in which a legitimate, delivered, email including an attachment or link has been copied and used to create an almost identical, but now malicious, copy or...

Read More

Cloud computing

Internet-based computer storage and operations, conducted on the Internet as opposed to local devices.

Read More

Cloud encryption

Encryption, by a cloud service, of a cloud service customer’s data.

Read More

Cloud intelligence

Intelligence tool and application hosted in a cloud.

Read More

Cloud native 

Referring to application development based on containers, microservices, and dynamic orchestration, all managed on an elastic infrastructure via agile DevOps and continuous delivery.

Read More

CloudTrust Protocol

The mechanism by which cloud service providers assure cloud consumers of the security, privacy, and integrity of the consumers’ data. The artifacts that provide this assurance are known as “elements...

Read More