Carberp

Carding

Cardseller

Cash machine, automated teller machine

Certificate

Certificate management

Certificate revocation

Certificate revocation list

Certificate-based authentication (CBA)

Certification

Certification audit

Certification center

Certification documents

Certification scheme

Certification service provider

Certified client

Challenge

Chameleon signatures, CHAM-SIG

Change control

Channel

Channel effect

Checksum

Choose your own device (CYOD)

Cipher

Cipher

Cipher suite, security association

Ciphertext

Ciphertext

Ciphertext

Ciphertext-only attack

Claim

Claimant

Classified information, critical information

Classifying information

Clickjacking

Client

Client

Client endpoint

Client notification endpoint

Closed-set test

Code book

Code group

Code vocabulary

Code-based cryptography

Cognitive computing

Coin flipping (by telephone) protocol

Collision, existential collision

Collision-intractable hash function

Combining function

Commercial information

Commitment

Commitment scheme

Common information model

Common misuse scoring system (CMSS)

Common vulnerabilities and exposures (CVE)

Common weakness enumeration (CWE)

Communication and consultation

Communication channel

Communication complexity

Communication facility

Communication network

Communication protocol

Communication security

Communications security (COMSEC)

Communucation channel

Commutation key

Compensating control

Competence

Completeness property

Complexity-based security

Composite key

Compression function

Compromise

Compromise assessment

Compromise of a party

Compromised key

Computational workload

Computer

Computer attack

Computer crime

Computer cryptography

Computer forensics

Computer forensics

Computer network

Computer resource

Computer security (COMPUSEC)

Computer security evaluation

Computer system

Computer system security

Computer virus

Computer-security audit (security audit)

Confidence

Confidential client

Confidentiality

Confidentiality

Configuration item

Conformity

Confusion property

Confusion transform

Connection integrity service with recovery

Connection integrity service without recovery

Connectionism, connectionist paradigm, connectionist model, connectionist approach

Consent

Consequence

Context-based authentication

Continual improvement

Continuous learning, continual learning, lifelong learning

Contract signing protocol

Control

Control sequence

Controllability

Controllable territory

Corporate owned, personally enabled (COPE)

Corrective action

Correlation attack

Correlation cryptanalysis

Covert channel

Covert channel capacity

Covert statistical channel

Covert storage channel

Covert timing channel

Crimeware

Critical structure

Cross-site request forgery (CSRF или XSRF), one-click attack или session riding

Cross-site scripting (XSS)

Cryptanalysis

Cryptanalysis based on collision search

Cryptanalyst

Cryptanalytic assumptions

Crypto API (application programming interface)

Crypto drainer

Crypto wallet drainer

Cryptoanalytic method, method of cryptanalysis

Cryptocurrencies

Cryptofilter

Cryptogram

Cryptographic algorithm

Cryptographic assumption

Cryptographic device

Cryptographic function

Cryptographic hardware

Cryptographic hash function

Cryptographic hash function with key

Cryptographic information protection facility

Cryptographic key

Cryptographic key disclosure, key compromise

Cryptographic mechanism

Cryptographic module

Cryptographic module life cycle

Cryptographic operation

Cryptographic primitive

Cryptographic protection

Cryptographic protection of information

Cryptographic protocol

Cryptographic security

Cryptographic service

Cryptographic system (cryptosystem)

Cryptographic system analysis (cryptanalysis)

Cryptographic token

Cryptographic tool, cryptographic mechanism

Cryptographic tool, cryptographic module

Cryptographic transformation

Cryptographically strong pseudorandom bit generator

Cryptographically strong pseudorandom sequence

Cryptography

Cryptology (mathematical cryptography)

Cryptoperiod

Cryptoprotocol

Cryptoprovider

Cryptorouter

Cryptoserver

Cryptosynthesis

Cryptosynthesis, cryptographic synthesis

Cryptosystem

Cryptosystem, cipher

Cryptosystem, cipher, encryption system, enciphering system, ciphersystem

Cumulative match characteristic plot

Cyber attack

Cyber crime

Cyber espionage

Cyber incident

Cyber infrastructure

Cyber operation

Cyber terrorism

Cyber warfare

Cyberrisk

Cybersecurity

Cyberspace

Подписаться на новости BIS Journal / Медиа группы Авангард

Подписаться
Введите ваш E-mail

Отправляя данную форму вы соглашаетесь с политикой конфиденциальности персональных данных

19.12.2025
НСПК — о едином пространстве для проведения транзакций
19.12.2025
Пентагон видит в ISACA глобальный орган по контролю за ИБ-стандартами
19.12.2025
«Слишком жёсткие правила могут замедлить темпы внедрения ИИ»
19.12.2025
«Здесь востребованы люди, которые умеют совмещать системное мышление с прикладной инженерией»
19.12.2025
NCSC стремится внедрить передовые методы защиты в цепочки поставок
18.12.2025
Эксперт: Продление жизни карт «Мир» грозит ростом скамерской активности
18.12.2025
ИИ-разработчики сами боятся утратить навыки из-за засилья нейросетей
18.12.2025
Max берёт возможный максимум
18.12.2025
ЛК: Геймерам угрожает новый инфокрад
18.12.2025
NCSC будет бороться со скамерами на основе «иллюзии обмана»

Стать автором BIS Journal

Поля, обозначенные звездочкой, обязательные для заполнения!

Отправляя данную форму вы соглашаетесь с политикой конфиденциальности персональных данных