Archives: Glossary Terms

Cluster 

A set of loosely or tightly connected computers that work together and can, for practical purposes, be treated as a single system.

Read More

COBIT 

An IT governance framework developed by ISACA. Not a security framework, but rather a governance framework with security components, its name is an acronym derived from Control, OBjectives, Information, and...

Read More

Cold boot attack

A kind of side-channel attack in which an attacker with physical access to a device retrieves encryption keys after a cold reboot of the system. A computer is “cold booted”...

Read More

Common Vulnerability Scoring System

A qualitative public framework for rating the severity of security vulnerabilities in software. The acronym CVSS is commonly used.

Read More

Copy-paste compromise

Successful breaches accomplished by using only open source tools. The adversary does use any original code to traverser the intrusion kill chain.

Read More

Covert 

Disguised. A covert operation depends for its success upon not being recognized for what it is It may be conducted in plain sight, but represents itself as being something other...

Read More

Covert response

An incident response that is to some degree concealed from those not involved in the response.

Read More

Credential stealing

From the intrusion kill chain model, the first part of an exploitation technique where the hacker tricks their victims into revealing their login credentials.

Read More

Credential stuffing

A type of attack in which hackers take credential combinations, typically username and password pairs, that have been exposed in earlier data breaches and try them against login sites. Credential...

Read More

Creepware

Malware that uses a device’s webcam to surreptitiously observe the device’s user or its environs, without the user’s knowledge or consent.

Read More