C(s) Flashcards
Cable modem
Provide Internet access via broadband cable TV
Cache memory
The fastest memory on the system, required to keep up with the CPU as it fetches and executes instructions
Caesar Cipher
A rot-3 substitution cipher
Callback
Modern-based authentication system
Caller ID
Identifies the calling phone number, sometimes used as a weak authentication method
Candidate keys
Any attribute (column) in the table with unique values
CMM
Capability Maturity Model, a maturity framework for evaluating and improving the software development process
CSMA
Carrier Sense Multiple Access, a method used by Ethernet networks to allowed shared usage of a baseband network, and avoid collisions
CASE
Computer-aided software engineering, uses programs to create assist in the creation and maintenance of other computer programs
CBC
Cipher Block Chaining , a block mode of DES that XORs the previous encrypted block of cipher-text to the next block plaintext to be encrypted
CCD
Charged Couple Discharge, a digital CCTV
CCMP
Counter Mode CBC MAC Protocol, used by WPA2 to create a MIC
CCTV
Closed Circuit Television, a detective device used to aid guards in in detecting the presence of intruders in restricted areas
CDN
Content Distribution Networks (also Content Delivery Networks) use a series of distributed caching servers to improve performance and lower the latency of downloaded online content
CPU
Central Processing Unit, the “brains” of the computer, capable of controlling and performing mathematical calculations
Centralized access control
Concentrates Access control in one logical point for a system or organization
CER
Crossover error rate, describes the point where the false reject rate(FRR) and false accept rate(FAR) are equal
Certificate Authority
PKI component that authenticates the identity of a person or organization before issuing a certificate to them
CRL
Certificate Revocation Lists, PKI component which lists digital certificates that have been revoked
Certification
A detailed inspection that verifies whether a system meets the documented security requirements
CFB
Cipher Feedback, a stream mode DES that is similar to block-mode CBC
Chain of custody
Requires that once evidence is acquired, full documentation regarding who, what, when, and where evidence was handled is maintained
Chaining
Block cipher mechanism that seeds the previous Encrypted block into the next block to be encrypted
CHAP
Challenge Handshake Authentication Protocol, a more secure network authentication protocol that uses a shared secret