- CCSP (Certified Cloud Security Professional)An advanced-level certification offered by ISC2 that validates expertise in cloud security architecture, design, operations, and service orchestration. CCSP certification is aimed at IT and information security leaders who aim to ensure the security of cloud environments.
- CCTV Surveillance The use of video cameras (Closed-Circuit Television) to transmit a signal to a specific, limited set of monitors for security and monitoring purposes. It's commonly employed in public areas, businesses, and private properties to deter crime, monitor traffic, ensure public safety, and gather evidence for legal purposes. Advanced systems may include features like motion detection, night vision, and remote access. The widespread use of CCTV has implications for privacy and civil liberties, which are addressed by various regulations and laws.
- Cell In the context of computer systems, a cell is a fundamental unit of data storage, often found in a grid within a database or a spreadsheet. Each cell is identified by its unique address, resulting from the combination of its corresponding row and column labels, and can hold a piece of data such as a text string, a number, or a formula. Proper cell management, including access controls and data encryption, is crucial to prevent unauthorized data access or manipulation, ensuring data integrity and confidentiality.
- Cell-level Encryption (CLE) A database encryption method that encrypts individual cells, or fields, within a database table, allowing for fine-grained control over access to sensitive data. Each cell can be encrypted with a unique key, which prevents unauthorized users from reading the data while still allowing the database to perform complex queries, as the database structure remains accessible.
- Cell Suppression A data protection technique used in statistical databases to ensure the privacy and confidentiality of sensitive information. By intentionally withholding (suppressing) the publication of certain data cells (individual entries or values) in a released table, this method prevents the disclosure of information that could be used to identify individuals or confidential attributes, especially in tables with small cell counts. Cell suppression is a form of data anonymization aimed at reducing the risk of re-identification in datasets that are shared or published for research, analysis, or public use.
- Cellular networks A type of wireless communication network that uses radio frequencies to transmit data between mobile devices and the network operator's network infrastructure. Cellular networks are commonly used in smartphones and other mobile devices to provide access to the Internet, phone calls, and other services. Examples of cellular networks include GSM, LTE, and 5G networks.
- Centralized data processing A system in which data is collected and processed in a single location or server. It is commonly used in organizations to manage and control access to data. For example, a company may use centralized data processing to manage employee records and financial data.
- Central Processing Unit (CPU) The primary component of a computer that performs most of the processing inside a computer. Known as the "brain" of the computer, it executes instructions from programs, performing basic arithmetic, logic, controlling, and input/output (I/O) operations specified by the instructions. The CPU's performance is a key determinant of the computer's overall system speed.
- Certificate Often referred to as a digital certificate or a public key certificate, a certificate is a digital document that binds a public key to an identity. This document is used in various forms of online transactions and communications to prove the identity of an entity, like a person, company, or server. Certificates play a key role in public key infrastructure (PKI) systems, helping to prevent impersonation and interception by confirming that an entity is who it claims to be and thus promoting trust and security in digital communications.
- Certificate Authority (CA) An entity that issues digital certificates, which are used to verify the identity of organizations and individuals in digital communications, ensuring secure transactions and data transfer over the Internet. The CA validates entities and binds a public key with an identity, producing a certificate that can be used for secure communication.
Share our FREE glossary with your friends and study buddies.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions, if you find errors please contact us.