- Cable lock A physical security tool designed to prevent theft of devices. Typically, it is a cable that is securely attached to an immovable object at one end and a device (like a laptop) at the other end. While not a direct deterrent for advanced attacks, cable locks can help prevent opportunistic theft and tampering, enhancing the overall security posture of an environment.
- Cable modem A type of network bridge that allows bi-directional data communication via radio frequency channels on a hybrid fiber-coaxial and radio frequency over glass infrastructure. Cable modems are primarily used to deliver broadband Internet access, leveraging the high bandwidth of a HFC and RFoG network.
- Cables The physical paths used to transmit data between devices. They come in various types, including Ethernet cables, coaxial cables, and fiber optic cables, each with different data transmission speeds, noise resistance, and physical reach. Ensuring the appropriate selection and proper maintenance of cables is crucial for network efficiency and reliability.
- Cache memory A type of computer memory that temporarily stores frequently used data for quick access. By leveraging cache memory, a system can significantly improve its performance and efficiency, as fetching data from the cache (located close to the processor) is faster than obtaining it from primary memory locations. Cache memory management is essential to avoid possible vulnerabilities, such as cache-based side-channel attacks.
- Cache-timing Attack A side-channel attack that exploits the timing information of a system's cache to gain insights into the data and operations processed by the system. Attackers measure the time it takes to perform certain operations to make inferences about the data, such as cryptographic keys, in the cache. These attacks are sophisticated and rely on understanding the timing discrepancies caused by cache hits and misses.
- Caesar cipherA type of substitution cipher that is used to encode messages by shifting each letter in the original message by a fixed number of places in the alphabet. It is a simple and easily breakable cipher but is still sometimes used as a basic form of encryption for simple communication or as a starting point for more complex ciphers. For example, the message "Hello" with a shift of 3 would be encoded as "Khoor".
- Callback In the context of secure communications, callback is a method of authenticating a user where a server initiates a new connection to the user's registered contact information (e.g., phone number or IP address) after receiving a request. This ensures that the access request is indeed coming from a trusted source. This method, though not widely used today due to more advanced techniques, adds an extra layer of security to verify the user's identity.
- Capability In a broader sense, capability refers to the set of functionalities or features a system, device, or software possesses that enable it to perform its tasks or roles effectively. This could include computational power, access permissions, and other software or hardware features. From a security standpoint, understanding a system's capabilities helps identify potential weak points and areas for improvement.
- Capability Maturity Model Integration (CMMI)An enhancement of the original Capability Maturity Model (CMM), CMMI is a process and behavioral model that helps organizations streamline process improvement and encourage productive, efficient behaviors that decrease risks in software, product, and service development. The model provides a set of best practices that guide businesses through a continuum of improvements from an initial, ad hoc state of processes to a mature, disciplined state.
- Capability Table A security tool used in certain computer systems to define the access rights a certain user, process or a piece of software has over specific resources in the system. The table lists out the objects and the corresponding actions that can be performed on those objects, providing a comprehensive view of what is and isn't permitted, thereby assisting in the enforcement of a secure environment.
Share our FREE glossary with your friends and study buddies.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions, if you find errors please contact us.