Archives: Glossary Terms

Crimeware 

Malware designed to automate cyber crime.

Read More

Cross-site request forgery

Also known as a “one-click attack” or “session riding,” a malicious website exploit where an attacker transmits unauthorized commands to a website from an ostensibly trusted user’s browser.

Read More

Crowd sourcing

Getting services, ideas, or content by soliciting contributions from a large group, especially from an online community, as opposed to employees, suppliers, or experts.

Read More

Cryptographic key

A parameter that defines the output of a cryptographic algorithm. A key affects how plaintext is to be encrypted by a given cryptographic algorithm, and how the resulting ciphertext is...

Read More

Cryptography

Literally, “secret writing”: the practice and study of techniques for securing communications in the presence of adversaries. In a typical instance of cryptography, plaintext data is converted through a cryptographic...

Read More

CVE

Common Vulnerabilities and Exposures. Refers to publicly known vulnerabilities. The Mitre organization maintains a database of CVEs

Read More

CVSS

Common Vulnerability Scoring System (acronym).

Read More

CWE

Common Weakness Enumeration. A categorization system for CVEs maintained by Mitre. CVEs refer to individual vulnerabilities specific to certain software/hardware, whereas CWEs refer to generic types of vulnerabilities

Read More

Cyber privateering

The practice of a government’s hiring of a contractor, often but not always a criminal group, to conduct cyberespionage on its behalf. The cyber privateer receives a list of intelligence...

Read More

Cyber riot

A crowd-sourced cyber attack, sometimes inspired by but seldom closely controlled by a state security agency.

Read More