IT Glossary - C - ITU Online

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Cryptographic Hash Function

A function used in cryptography to convert data of any size into a fixed-size string of bytes. The output, known as the hash, is designed to uniquely represent the input data. Hash functions are a foundational component in various cryptographic operations, including digital signatures and data integrity verification.

You will find this term commonly used in Security, Cybersecurity

Cryptographic Key Exchange Protocols

Protocols designed to securely exchange cryptographic keys between parties over an insecure communication channel. These protocols ensure that keys can be shared without interception or compromise, enabling secure communication.

You will find this term commonly used in Security, Networking

Cryptographic Key Management

The process of managing cryptographic keys in a cryptosystem, which includes the generation, exchange, storage, use, destruction, and replacement of keys. Effective key management is crucial for maintaining the security of encrypted data and communications.

You will find this term commonly used in Security, Cybersecurity

Cryptographic Key Rotation Policy

A security policy that specifies how and when cryptographic keys should be changed or rotated to maintain the security of encrypted data. Key rotation helps protect against long-term attacks and reduces the risks associated with key compromise or theft.

You will find this term commonly used in Security, Cryptography

Cryptographic Protocol

A formal set of rules that dictates how entities communicate securely across a network. Cryptographic protocols involve procedures for cryptographic key generation, distribution, and exchange; data encryption and decryption; and authentication and integrity checks. They are essential for ensuring secure online communication and data protection.

You will find this term commonly used in Security, Networking

Cryptography

The science of securing communication and data through the use of codes so that only those for whom the information is intended can read and process it. Cryptography is vital for protecting information in computer systems and across the Internet, including financial transactions and confidential communication.

You will find this term commonly used in Security, Cybersecurity

Cryptography Algorithms

Mathematical formulas or protocols used in encrypting and decrypting data. Cryptography algorithms are the basis for ensuring confidentiality, integrity, and authentication in the transmission of digital information. Common types include symmetric-key algorithms (e.g., AES) and asymmetric-key algorithms (e.g., RSA).

You will find this term commonly used in Security, Cybersecurity

Cryptography Key Lifecycle Management

The comprehensive process of managing cryptographic keys from creation to disposal. It includes key generation, distribution, storage, usage, rotation, and destruction. Effective key lifecycle management is crucial for maintaining the security of encrypted data and ensuring that old or compromised keys do not lead to security vulnerabilities.

You will find this term commonly used in Security, Cybersecurity

Cryptography Policy

A set of guidelines and standards that govern the use of cryptographic methods and tools within an organization. A cryptography policy covers aspects such as key management, encryption protocols, and compliance requirements to ensure the secure and effective use of cryptography to protect sensitive information.

You will find this term commonly used in Security, Information Technology

CSS (Cascading Style Sheets)

A style sheet language used for describing the presentation of a document written in a markup language like HTML. CSS is a cornerstone technology of the World Wide Web, alongside HTML and JavaScript, enabling web developers to separate the content and design, improving accessibility and providing more flexibility and control in the specification of presentation characteristics.

You will find this term commonly used in Web Development

Customer Experience Management (CEM or CXM)

The practice of designing and reacting to customer interactions to meet or exceed customer expectations, thereby increasing customer satisfaction, loyalty, and advocacy. It involves understanding customer needs through their interactions with the company and using that insight to enhance the products and services offered.

You will find this term commonly used in Business, IT Management

Customer Identity and Access Management (CIAM)

A subset of identity and access management (IAM) focused on managing and securing customer identities and data. CIAM solutions provide features like registration, authentication, profile management, and data governance to enhance the customer experience while ensuring data privacy and compliance.

You will find this term commonly used in Security, Business

Cyber Attack

An attempt by hackers to damage or destroy a computer network or system. Cyber attacks can be launched from anywhere in the world, and can target anything from personal computers to entire networks or infrastructures, and can involve the theft of data, the disruption of services, or the compromise of security systems.

You will find this term commonly used in Security, Cybersecurity

Cyber Attack Attribution

The process of identifying the source or perpetrator behind a cyber attack. Attribution involves analyzing attack methods, infrastructure, and other digital evidence to determine the responsible party, which can be challenging due to the anonymity and complexity of cyber operations.

You will find this term commonly used in Security, Cybersecurity

Cyber Attack Simulation

A practice in which an organization simulates a cyber attack on its own network to assess the readiness of its defenses and to identify vulnerabilities. Simulations help in training IT security teams, testing the effectiveness of security measures, and improving incident response capabilities.

You will find this term commonly used in Security, Cybersecurity

Cyber Attack Simulations and War Gaming

Exercises designed to mimic the actions of adversaries in cyber attacks to test an organization's preparedness, response capabilities, and resilience. These simulations help identify vulnerabilities, assess the effectiveness of security measures, and train staff in incident response.

You will find this term commonly used in Security, Cybersecurity

Cyber Attack Trend Analysis

The study and interpretation of patterns in cyber attacks to predict future cybersecurity threats and vulnerabilities. Trend analysis helps organizations prepare for and mitigate the impact of potential cyber incidents.

You will find this term commonly used in Security, Cybersecurity

Cyber Espionage

The practice of using cyber techniques to conduct espionage or spying activities to gather confidential information without the permission or knowledge of the holder of the information. It's often state-sponsored and targets government data, intellectual property, and sensitive corporate data.

You will find this term commonly used in Security, Cybersecurity

Cyber Forensics and Incident Analysis

The discipline of investigating cybersecurity incidents and breaches to uncover the cause, extent, and perpetrators of an attack. Cyber forensics involves the collection, preservation, analysis, and presentation of digital evidence to support response activities and legal proceedings, helping organizations understand attack vectors and strengthen their defenses.

You will find this term commonly used in Cybersecurity, Forensics

Cyber Incident Reporting System

A framework or platform for reporting cybersecurity incidents within an organization. Such systems facilitate timely sharing of information about potential security breaches, enabling quicker response and mitigation efforts.

You will find this term commonly used in Security, IT Management

Cyber Incident Response Coordination

The organized approach to managing and responding to cybersecurity incidents, involving the coordination of teams, tools, and procedures to quickly mitigate damage, analyze breaches, and restore services. Effective coordination ensures a unified and efficient response to incidents, minimizing impact and recovery time.

You will find this term commonly used in Cybersecurity, Incident Management

Cyber Incident Response Team (CIRT)

A group within an organization that is responsible for addressing and managing the aftermath of a security breach or cyber attack. The CIRT's responsibilities include investigating the incident, containing the damage, eradicating the cause, recovering systems to normal operation, and communicating with stakeholders throughout the process.

You will find this term commonly used in Security, Cybersecurity

Cyber Insurance

A type of insurance product designed to protect businesses and individual users from Internet-based risks, and more generally from risks relating to information technology infrastructure and activities. Coverage typically includes protection from data breaches, cyber attacks, and other digital security incidents.

You will find this term commonly used in Business, Security

Cyber Insurance Policy Analysis

The examination and evaluation of cyber insurance policies to understand coverage, exclusions, and obligations. Policy analysis helps organizations assess their insurance needs, understand the risks covered, and ensure that their cybersecurity practices align with policy requirements for optimal protection against cyber incidents.

You will find this term commonly used in Business, Security

Cyber Range Training

An interactive, simulated cybersecurity environment used for training and testing cybersecurity skills in a realistic but controlled setting. Cyber ranges allow individuals and teams to practice responding to cyber threats and attacks, enhancing their ability to detect, mitigate, and recover from real-world cybersecurity challenges.

You will find this term commonly used in Cybersecurity, Education

Cyber Resilience

The ability of an organization to prepare for, respond to, and recover from cyberattacks. It combines elements of cybersecurity and business continuity to ensure that an organization can withstand and quickly bounce back from incidents that disrupt its operations, integrity, or reputation.

You will find this term commonly used in Security, Business Continuity

Cyber Resilience Planning

The development of strategies and practices that enable an organization to withstand and quickly recover from cyber incidents. Cyber resilience planning involves preparing for, responding to, and recovering from cyberattacks in a way that minimizes impact and maintains business continuity.

You will find this term commonly used in Security, Business Continuity

Cyber Resilience Strategy

A comprehensive approach that organizations adopt to protect, respond to, recover, and adapt from cyber threats and incidents. Unlike traditional cybersecurity strategies that often focus solely on prevention, cyber resilience encompasses the ability to continue operation during and after a cyber incident has occurred.

You will find this term commonly used in Security, Business Continuity

Cyber Threat Analysis

The process of examining and interpreting data related to potential cyber threats to understand their nature, origin, and potential impact. Cyber threat analysis involves assessing vulnerabilities, identifying potential attack vectors, and determining the motives and capabilities of threat actors to inform security strategies and defenses.

You will find this term commonly used in Security, Cybersecurity

Cyber Threat Hunting

The proactive technique of searching through networks to detect and isolate advanced threats that evade existing security solutions. This approach involves using knowledge about adversaries and their tactics, techniques, and procedures (TTPs) to actively look for, identify, and mitigate potential threats before they can cause harm.

You will find this term commonly used in Security, Cybersecurity

Cyber Threat Intelligence

Information an organization uses to understand the threats that have, will, or are currently targeting the organization. This information is used to prepare, prevent, and identify cyber threats looking to take advantage of valuable resources. Cyber threat intelligence involves the collection, analysis, and dissemination of information about current and potential attacks that threaten an organization's information security.

You will find this term commonly used in Security, Cybersecurity

Cyber Threat Intelligence Analysis

The collection, evaluation, and interpretation of information regarding potential or current cyber threats and vulnerabilities. This analysis helps in understanding the motives, targets, and attack behaviors of cyber adversaries, enabling organizations to prepare and respond effectively to mitigate risks.

You will find this term commonly used in Cybersecurity, Threat Intelligence

Cyber Threat Landscape

The constantly evolving nature of cybersecurity threats faced by organizations and individuals. The cyber threat landscape includes the types of attacks, their frequency, the attackers' tactics, techniques, and procedures (TTPs), and the targeted vulnerabilities. Understanding the landscape is crucial for effective cybersecurity defense planning.

You will find this term commonly used in Security, Cybersecurity

Cyber Threat Modeling

The process of systematically identifying and evaluating potential threats to digital assets and information systems. Threat modeling helps organizations understand their attack surface, prioritize security efforts, and develop strategies to mitigate identified risks.

You will find this term commonly used in Security, Cybersecurity

Cyber-Enabled Information Warfare

The use of cyber capabilities to manipulate, disrupt, or destroy the information and communication assets of adversaries for strategic, operational, or tactical advantage. Cyber-enabled information warfare includes activities such as disinformation campaigns, cyber espionage, and attacks on critical information infrastructure to influence public opinion, disrupt decision-making processes, or degrade communication systems.

You will find this term commonly used in Security, Information Warfare

Cyber-Physical Attack

An attack that targets the vulnerabilities in the interface between the cyber and physical components of a system. Such attacks can have direct effects on physical assets and infrastructure, such as disrupting industrial control systems or causing physical damage through digital means.

You will find this term commonly used in Security, Cybersecurity

Cyber-Physical System (CPS) Design

The process of creating systems that integrate computational algorithms with physical components. CPS design involves considering both the software and hardware aspects of systems that interact with the physical world, such as autonomous vehicles, industrial automation systems, and smart grid technologies.

You will find this term commonly used in Engineering, Cyber-Physical Systems

Cyber-Physical Systems (CPS)

Engineered systems that are built from, and depend upon, the seamless integration of computational algorithms and physical components. CPSs include systems ranging from smart grid, autonomous automobile systems, medical monitoring, to industrial control systems. They often involve real-time computing, sensor networks, and IoT technologies to interact with the physical world.

You will find this term commonly used in AI, IoT

Cyber-Physical Systems Integration

The process of combining cybernetic systems (computing and networks) with physical processes. The integration allows for automated monitoring and control of the physical systems through cyber means, enhancing efficiency, safety, and functionality in sectors like manufacturing, transportation, and energy.

You will find this term commonly used in Cyber-Physical Systems, Automation

Cyber-Physical Systems Security

The practice of protecting cyber-physical systems (CPS), which integrate computation, networking, and physical processes, from cyber threats. Security measures are designed to safeguard the software and hardware components of CPS, as well as the physical processes they control, from unauthorized access and malicious attacks.

You will find this term commonly used in Security, Cyber-Physical Systems

Cybersecurity

The practice of protecting systems, networks, and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes. Implementing effective cybersecurity measures is particularly challenging today because there are more devices than people, and attackers are becoming more innovative.

You will find this term commonly used in Security, Cybersecurity

Cybersecurity Analyst

Analyzes an organization's cybersecurity posture and implements measures to protect against cyber attacks.

You will find this term commonly used in Cybersecurity, Risk Management

Cybersecurity Assessment Framework

A structured approach to assessing an organization's cybersecurity posture, identifying vulnerabilities, and evaluating the effectiveness of current security measures. The framework typically includes criteria for measuring the maturity of cybersecurity practices and provides a roadmap for improvement.

You will find this term commonly used in Security, Cybersecurity

Cybersecurity Assurance Program

A comprehensive set of policies, procedures, and measures implemented by an organization to ensure its cybersecurity practices meet established standards and effectively protect against cyber threats. An assurance program involves regular assessments, audits, and updates to security controls based on evolving threats and business requirements.

You will find this term commonly used in Cybersecurity, Organizational Management

Cybersecurity Audit

A comprehensive review and analysis of an organization's IT infrastructure, policies, and procedures to assess the robustness of its cybersecurity defenses. Cybersecurity audits help identify vulnerabilities, assess the effectiveness of security measures, and ensure compliance with regulatory standards.

You will find this term commonly used in Security, IT Management

Cybersecurity Automation Tools

Software and systems designed to automate repetitive and routine cybersecurity tasks such as vulnerability scanning, threat detection, and incident response. Automation tools help streamline security operations, reduce human error, and enable security teams to focus on more strategic activities.

You will find this term commonly used in Cybersecurity, Automation

Cybersecurity Best Practices

Guidelines and strategies considered most effective in ensuring the protection of information systems from digital attacks. These practices are based on industry standards, regulations, and lessons learned from past cybersecurity incidents.

You will find this term commonly used in Security, Cybersecurity

Cybersecurity Capability Maturity Model (C2M2)

A tool that helps organizations evaluate and improve their cybersecurity capabilities and resilience. The model provides a set of practices for managing cybersecurity risk, organized into maturity levels that range from basic cyber hygiene to advanced risk management processes.

You will find this term commonly used in Security, Cybersecurity

Cybersecurity Compliance

The adherence to laws, regulations, guidelines, and specifications relevant to an organization's cybersecurity operations. Compliance is critical for avoiding legal penalties and ensuring that data is protected according to industry standards and best practices.

You will find this term commonly used in Security, Legal

Cybersecurity Compliance Auditing

The examination and evaluation of an organization's adherence to regulatory and industry cybersecurity standards and practices. Compliance auditing helps ensure that organizations meet legal and contractual obligations to protect sensitive information and maintain security controls, often involving third-party auditors to assess and verify compliance.

You will find this term commonly used in Cybersecurity, Compliance

What's Your
Career Path?
ON SALE 60% OFF
Data Analyst Career Path

Data Analyst Career Path

Become a crucial member of your team as a Data Analyst
Total Hours
56 Hrs 36 Min
icons8-video-camera-58
358 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Network Administrator Career Path

Network Administrator Career Path

Wanting to become a Network Administrator? This training series offers the core training you need.
Total Hours
158 Hrs 43 Min
icons8-video-camera-58
511 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Kubernetes Certification

Kubernetes Certification: The Ultimate Certification and Career Advancement Series

Enroll now to elevate your cloud skills and earn your Kubernetes certifications.
Total Hours
11 Hrs 5 Min
icons8-video-camera-58
207 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
azure-administrator-career-path

AZ-104 Learning Path : Become an Azure Administrator

Master the skills needs to become an Azure Administrator and excel in this career path.
Total Hours
105 Hrs 42 Min
icons8-video-camera-58
421 On-demand Videos

$51.60$169.00

ON SALE 60% OFF
Network Security Analyst

Network Security Analyst Career Path

Become a proficient Network Security Analyst with our comprehensive training series, designed to equip you with the skills needed to protect networks and systems against cyber threats. Advance your career with key certifications and expert-led courses.
Total Hours
96 Hrs 49 Min
icons8-video-camera-58
419 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Google DevOps Engineer Career Path

Google DevOps Engineer Career Path

Expand your cloud knowledge or explore this career option as a Google DevOps Engineer.
Total Hours
41 Hrs 50 Min
icons8-video-camera-58
475 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Career Path

Leadership Mastery: The Executive Information Security Manager

An advanced training series designed for those with prior experience in IT security disicplines wanting to advance into a management role.
Total Hours
95 Hrs 38 Min
icons8-video-camera-58
346 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Cisco Network Career Path

Cisco Network Engineer Career Path

Master Cisco Networks in this comprehensive training series. Elevate your career today.
Total Hours
126 Hrs 29 Min
icons8-video-camera-58
459 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
IT Project Manager

IT Project Manager Career Path

Explore the role of an IT Project Manager with our comprehensive IT Manager Career Path Series.
Total Hours
36 Hrs 58 Min
icons8-video-camera-58
151 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
IT User Support Specialist Career Path

Comprehensive IT User Support Specialist Training: Accelerate Your Career

Advance your tech support skills and be a viable member of dynamic IT support teams.
Total Hours
121 Hrs 41 Min
icons8-video-camera-58
610 On-demand Videos

$51.60$169.00

ON SALE 60% OFF
Web Designer Career Path

Web Designer Career Path

Explore the theoretical foundations and practical applications of web design to craft engaging and functional websites.
Total Hours
33 Hrs 38 Min
icons8-video-camera-58
171 On-demand Videos

$51.60

Add To Cart
ON SALE 61% OFF
ICD 9

ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

The Medical Billing Specialist training series is a comprehensive educational program designed to equip learners with the essential skills and knowledge required in the field of medical billing and coding.
Total Hours
37 Hrs 56 Min
icons8-video-camera-58
192 On-demand Videos

$39.00

Add To Cart