АБВГДЕЖЗИКЛМНОПРСТУФХЦЧШЭЯ ABCDEFGHIKLMNOPQRSTUVWZ CarberpCardingCardsellerCash machine, automated teller machineCertificateCertificate managementCertificate revocationCertificate revocation listCertificate-based authentication (CBA)CertificationCertification auditCertification centerCertification documentsCertification schemeCertification service providerCertified clientChallengeChameleon signatures, CHAM-SIGChange controlChannelChannel effectChecksumChoose your own device (CYOD)CipherCipherCipher suite, security associationCiphertextCiphertextCiphertextCiphertext-only attackClaimClaimantClassified information, critical informationClassifying informationClickjackingClientClientClient endpointClient notification endpointClosed-set testCode bookCode groupCode vocabularyCode-based cryptographyCognitive computingCoin flipping (by telephone) protocolCollision, existential collisionCollision-intractable hash functionCombining functionCommercial informationCommitmentCommitment schemeCommon information modelCommon misuse scoring system (CMSS)Common vulnerabilities and exposures (CVE)Common weakness enumeration (CWE)Communication and consultationCommunication channelCommunication complexityCommunication facilityCommunication networkCommunication protocolCommunication securityCommunications security (COMSEC)Communucation channelCommutation keyCompensating controlCompetenceCompleteness propertyComplexity-based securityComposite keyCompression functionCompromiseCompromise assessmentCompromise of a partyCompromised keyComputational workloadComputerComputer attackComputer crimeComputer cryptographyComputer forensicsComputer forensicsComputer networkComputer resourceComputer security (COMPUSEC)Computer security evaluationComputer systemComputer system securityComputer virusComputer-security audit (security audit)ConfidenceConfidential clientConfidentialityConfidentialityConfiguration itemConformityConfusion propertyConfusion transformConnection integrity service with recoveryConnection integrity service without recoveryConnectionism, connectionist paradigm, connectionist model, connectionist approachConsentConsequenceContext-based authenticationContinual improvementContinuous learning, continual learning, lifelong learningContract signing protocolControlControl sequenceControllabilityControllable territoryCorporate owned, personally enabled (COPE)Corrective actionCorrelation attackCorrelation cryptanalysisCovert channelCovert channel capacityCovert statistical channelCovert storage channelCovert timing channelCrimewareCritical structureCross-site request forgery (CSRF или XSRF), one-click attack или session ridingCross-site scripting (XSS)CryptanalysisCryptanalysis based on collision searchCryptanalystCryptanalytic assumptionsCrypto API (application programming interface)Crypto drainerCrypto wallet drainerCryptoanalytic method, method of cryptanalysisCryptocurrenciesCryptofilterCryptogramCryptographic algorithmCryptographic assumptionCryptographic deviceCryptographic functionCryptographic hardwareCryptographic hash functionCryptographic hash function with keyCryptographic information protection facilityCryptographic keyCryptographic key disclosure, key compromiseCryptographic mechanismCryptographic moduleCryptographic module life cycleCryptographic operationCryptographic primitiveCryptographic protectionCryptographic protection of informationCryptographic protocolCryptographic securityCryptographic serviceCryptographic system (cryptosystem)Cryptographic system analysis (cryptanalysis)Cryptographic tokenCryptographic tool, cryptographic mechanismCryptographic tool, cryptographic moduleCryptographic transformationCryptographically strong pseudorandom bit generatorCryptographically strong pseudorandom sequenceCryptographyCryptology (mathematical cryptography)CryptoperiodCryptoprotocolCryptoproviderCryptorouterCryptoserverCryptosynthesisCryptosynthesis, cryptographic synthesisCryptosystemCryptosystem, cipherCryptosystem, cipher, encryption system, enciphering system, ciphersystemCumulative match characteristic plotCyber attackCyber crimeCyber espionageCyber incidentCyber infrastructureCyber operationCyber terrorismCyber warfareCyberriskCybersecurityCyberspace