Archives: Glossary Terms

Cloud intelligence

Intelligence tool and application hosted in a cloud.

Read More

Cloud native 

Referring to application development based on containers, microservices, and dynamic orchestration, all managed on an elastic infrastructure via agile DevOps and continuous delivery.

Read More

CloudTrust Protocol

The mechanism by which cloud service providers assure cloud consumers of the security, privacy, and integrity of the consumers’ data. The artifacts that provide this assurance are known as “elements...

Read More

Cluster 

A set of loosely or tightly connected computers that work together and can, for practical purposes, be treated as a single system.

Read More

COBIT 

An IT governance framework developed by ISACA. Not a security framework, but rather a governance framework with security components, its name is an acronym derived from Control, OBjectives, Information, and...

Read More

Cold boot attack

A kind of side-channel attack in which an attacker with physical access to a device retrieves encryption keys after a cold reboot of the system. A computer is “cold booted”...

Read More

Common Vulnerability Scoring System

A qualitative public framework for rating the severity of security vulnerabilities in software. The acronym CVSS is commonly used.

Read More

Copy-paste compromise

Successful breaches accomplished by using only open source tools. The adversary does use any original code to traverser the intrusion kill chain.

Read More

Covert 

Disguised. A covert operation depends for its success upon not being recognized for what it is It may be conducted in plain sight, but represents itself as being something other...

Read More

Covert response

An incident response that is to some degree concealed from those not involved in the response.

Read More