Carberp

Carding

Cardseller

Cash machine, automated teller machine

Certificate

Certificate management

Certificate revocation

Certificate revocation list

Certificate-based authentication (CBA)

Certification

Certification audit

Certification center

Certification documents

Certification scheme

Certification service provider

Certified client

Challenge

Chameleon signatures, CHAM-SIG

Change control

Channel

Channel effect

Checksum

Choose your own device (CYOD)

Cipher

Cipher

Cipher suite, security association

Ciphertext

Ciphertext

Ciphertext

Ciphertext-only attack

Claim

Claimant

Classified information, critical information

Classifying information

Clickjacking

Client

Client

Client endpoint

Client notification endpoint

Closed-set test

Code book

Code group

Code vocabulary

Code-based cryptography

Cognitive computing

Coin flipping (by telephone) protocol

Collision, existential collision

Collision-intractable hash function

Combining function

Commercial information

Commitment

Commitment scheme

Common information model

Common misuse scoring system (CMSS)

Common vulnerabilities and exposures (CVE)

Common weakness enumeration (CWE)

Communication and consultation

Communication channel

Communication complexity

Communication facility

Communication network

Communication protocol

Communication security

Communications security (COMSEC)

Communucation channel

Commutation key

Compensating control

Competence

Completeness property

Complexity-based security

Composite key

Compression function

Compromise

Compromise assessment

Compromise of a party

Compromised key

Computational workload

Computer

Computer attack

Computer crime

Computer cryptography

Computer forensics

Computer forensics

Computer network

Computer resource

Computer security (COMPUSEC)

Computer security evaluation

Computer system

Computer system security

Computer virus

Computer-security audit (security audit)

Confidence

Confidential client

Confidentiality

Confidentiality

Configuration item

Conformity

Confusion property

Confusion transform

Connection integrity service with recovery

Connection integrity service without recovery

Connectionism, connectionist paradigm, connectionist model, connectionist approach

Consent

Consequence

Context-based authentication

Continual improvement

Continuous learning, continual learning, lifelong learning

Contract signing protocol

Control

Control sequence

Controllability

Controllable territory

Corporate owned, personally enabled (COPE)

Corrective action

Correlation attack

Correlation cryptanalysis

Covert channel

Covert channel capacity

Covert statistical channel

Covert storage channel

Covert timing channel

Crimeware

Critical structure

Cross-site request forgery (CSRF или XSRF), one-click attack или session riding

Cross-site scripting (XSS)

Cryptanalysis

Cryptanalysis based on collision search

Cryptanalyst

Cryptanalytic assumptions

Crypto API (application programming interface)

Crypto drainer

Crypto wallet drainer

Cryptoanalytic method, method of cryptanalysis

Cryptocurrencies

Cryptofilter

Cryptogram

Cryptographic algorithm

Cryptographic assumption

Cryptographic device

Cryptographic function

Cryptographic hardware

Cryptographic hash function

Cryptographic hash function with key

Cryptographic information protection facility

Cryptographic key

Cryptographic key disclosure, key compromise

Cryptographic mechanism

Cryptographic module

Cryptographic module life cycle

Cryptographic operation

Cryptographic primitive

Cryptographic protection

Cryptographic protection of information

Cryptographic protocol

Cryptographic security

Cryptographic service

Cryptographic system (cryptosystem)

Cryptographic system analysis (cryptanalysis)

Cryptographic token

Cryptographic tool, cryptographic mechanism

Cryptographic tool, cryptographic module

Cryptographic transformation

Cryptographically strong pseudorandom bit generator

Cryptographically strong pseudorandom sequence

Cryptography

Cryptology (mathematical cryptography)

Cryptoperiod

Cryptoprotocol

Cryptoprovider

Cryptorouter

Cryptoserver

Cryptosynthesis

Cryptosynthesis, cryptographic synthesis

Cryptosystem

Cryptosystem, cipher

Cryptosystem, cipher, encryption system, enciphering system, ciphersystem

Cumulative match characteristic plot

Cyber attack

Cyber crime

Cyber espionage

Cyber incident

Cyber infrastructure

Cyber operation

Cyber terrorism

Cyber warfare

Cyberrisk

Cybersecurity

Cyberspace

Подписаться на новости BIS Journal / Медиа группы Авангард

Подписаться
Введите ваш E-mail

Отправляя данную форму вы соглашаетесь с политикой конфиденциальности персональных данных

15.12.2025
Форум «АнтиФрод Россия» подвёл итоги борьбы с мошенничеством в 2025 году
15.12.2025
Баланс людей и технологий: ключевые выводы CX Fintech Day
15.12.2025
В США появится госстандарт для LLM
15.12.2025
Экологи против новых дата-центров
15.12.2025
Неясный экономический эффект тормозит развитие ИИ-технологий
15.12.2025
Сервис ГК «Солар» за две недели заблокировал 400 тысяч переходов на опасные сайты
15.12.2025
ЦБ РФ: Отдельного приложения для цифрового рубля не будет
12.12.2025
В Европе и США хотят дать «карт-бланш» этичным хакерам
12.12.2025
Бакина: «Пластик» Visa и Mastercard остановился в развитии
12.12.2025
«Они готовы на это, они посчитали свою экономику». ЦОДы определились с аппетитами

Стать автором BIS Journal

Поля, обозначенные звездочкой, обязательные для заполнения!

Отправляя данную форму вы соглашаетесь с политикой конфиденциальности персональных данных