АБВГДЕЖЗИКЛМНОПРСТУФХЦЧШЭЯ ABCDEFGHIKLMNOPQRSTUVWZ CarberpCardingCardsellerCash machineCash-in terminalCertificateCertificate managementCertificate revocationCertificate-based authentication (CBA)CertificationCertification centerCertification service providerChange controlChannelChecksumChoose your own device (CYOD)CipherCiphertextCiphertextCiphertextCiphertext-only attackClassified informationClassifying informationCoin flipping (by telephone) protocolCollision, existential collisionCollision-intractable hash functionCombining functionCommercial informationCommon misuse scoring system (CMSS)Communication channelCommunication complexityCommunication facilityCommunication networkCommunication protocolCommunication securityCommunications security (COMSEC) solution Компонент гарантирования защиты информации, имеющий дело с мерами и управлением, предназначенными для исключения возможности получения лицами неавторизованными информации из коммуникаций и для обеспечения аутентCommunucation channelCommutation keyCompensating controlCompleteness propertyComplexity-based securityComposite keyCompression functionCompromiseCompromise of a partyCompromised keyComputerComputer attackComputer crimeComputer cryptographyComputer networkComputer resourceComputer security (COMPUSEC)Computer security evaluationComputer systemComputer system securityComputer virusComputer-security audit (security audit)ConfidentialityConfidentialityConfiguration itemConfusion propertyConfusion transformConnection integrity service with recoveryConnection integrity service without recoveryConsequenceContext-based authenticationContract signing protocolControlControl sequenceControllable territoryCorporate owned, personally enabled (COPE)Correlation attackCorrelation cryptanalysisCovert channelCovert channel capacityCovert statistical channelCovert storage channelCovert timing channelCrimewareCritical structureCross-Site Request Forgery (CSRF или XSRF), one-click attack или session ridingCross-Site Scripting (XSS)Crypt-analytic method, method of cryptanalysisCryptanalysisCryptanalysis based on collision searchCryptanalystCryptanalytic assumptionsCrypto API (application programming interface)CryptocurrenciesCryptofilterCryptogramCryptographic algorithmCryptographic assumptionCryptographic deviceCryptographic functionCryptographic hardware (device, facility)Cryptographic hash functionCryptographic hash function with keyCryptographic information protection facilityCryptographic keyCryptographic key disclosureCryptographic moduleCryptographic operationCryptographic primitiveCryptographic protectionCryptographic protection of informationCryptographic protocolCryptographic securityCryptographic serviceCryptographic system (cryptosystem)Cryptographic toolCryptographic tool, cryptographic mechanismCryptographically strong pseudorandom bit generatorCryptographically strong pseudorandom sequenceCryptographyCryptology (mathematical cryptography)CryptoperiodCryptoprotocolCryptoproviderCryptorouterCryptoserverCryptosynthesisCryptosynthesisCryptosystemCryptosystem, cipherCryptosystem, cipherCyber attackCyber crimeCyber espionageCyber incidentCyber infrastructureCyber operationCyber terrorismCyber warfareCyberriskCybersecurityCyberspace