- Cybersecurity The practice of protecting computer systems, networks, devices, and data from unauthorized access, theft, damage, or other forms of cyber-attack. It encompasses a wide range of techniques, technologies, and processes designed to safeguard the integrity, confidentiality, and availability of information. Cybersecurity is critical in managing and mitigating risks related to the use and storage of digital information and is crucial for both individuals and organizations in our increasingly networked world.
- Cybersecurity Architecture The design and framework that outlines the structure and behavior of an organization's security processes, information security systems, personnel, and technologies. It provides a roadmap and strategic context for deploying the right technologies and processes to protect the organization's digital assets and operations. Effective cybersecurity architecture ensures that security controls are integrated into every layer of the technology stack, from the network perimeter to end-user devices, helping to defend against threats and maintain regulatory compliance.
- Cybersecurity Maturity Model Certification (CMMC) A certification process established by the United States Department of Defense (DoD) to certify the cybersecurity readiness of defense contractors. CMMC was designed to protect sensitive, unclassified information that is shared by the DoD with its contractors and subcontractors. The model encompasses several maturity levels that reflect the extent to which cybersecurity practices and processes are established, institutionalized, and consistent within an organization. Contractors must meet the appropriate level of CMMC certification to be eligible for new DoD contracts. Examples of organizations that have obtained CMMC certification include Lockheed Martin and Raytheon.
- Cyberwarfare The use or targeting of computers and networks in warfare or conflict, where state actors and associated groups engage in cyber activities to attack, infiltrate, and sabotage the digital infrastructure of other nations, organizations, or individuals. It includes operations that can disrupt critical systems, steal classified information, interfere with decision-making processes, and affect the physical infrastructure through cyber means. Cyberwarfare presents a complex threat landscape, often blurring the lines between civilian and military targets and posing significant challenges to international law and security. It's an integral part of modern military strategy, with nations actively developing defensive and offensive cyber capabilities.
- Cyclic Redundancy Check (CRC) A method used to detect errors in digital data. It involves applying a mathematical algorithm to the data to produce a CRC value, which acts as a checksum. When data is transmitted or stored and then retrieved, a new CRC value is calculated and compared to the original. If the two values do not match, it indicates that an error has occurred in the data. CRC is a common technique for ensuring the integrity of data in computer networks, storage devices, and error-checking protocols.
Share our FREE glossary with your friends and study buddies.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions, if you find errors please contact us.