Security Finder Glossar

 

  • CA
  • Call Tree Test
  • Capability
  • Capital Asset Pricing Model
  • Capital Requirements Directive
  • CAPM
  • Captive Account
  • Captive Insurance Company
  • CaR
  • Carry Trade
  • CCC
  • CDK
  • CERT
  • Certificate
  • Certificate Management Authority – (CMA)
  • Certificate Policy – (CP)
  • Certification
  • Certification Agent
  • Certification Authority – (CA)
  • Chain of Custody
  • Chief Risk Officer (CRO)
  • Chiffrat
  • CIA
  • Cipher
  • Claim
  • Classified information
  • Client/Server-Authentifizierung
  • Co-residence
  • CobiT
  • Combined Ratio
  • Common Malware Enumeration
  • Common Security Control
  • Compliance
  • Compromise
  • Conditional Value at Risk
  • Confidentiality
  • Continuity Requirements Analysis (CRA)
  • Cookie
  • CP
  • Credit Risk Mitigation
  • Credit Risk+
  • Credit- and Liquidity Enhancement
  • Credit-Linked Note (CLN)
  • Credit-Rating
  • Critical Security Parameter
  • CRL
  • Cross-Certificate
  • Cryptology
  • CSP
  • Cyber Security
  • Cyber Threat Intelligence (CTI)
  • Cyber-Abwehr
  • Cyber-Angriff
  • Cyber-Mobbing
  • Cyber-Raum
  • Cyber-Resilience oder Cyber-Widerstandsfähigkeit
  • Cyber-Sicherheit
  • Cyber-Sicherheitsarchitektur
  • Cyber-Sicherheitsgefahr
  • Cyber-Sicherheitskonzepte
  • Cyber-Sicherheitslösungen
  • Cyber-Sicherheitsmassnahmen
  • Cyber-Sicherheitsmechanismus
  • Cyber-Sicherheitsmodelle
  • Cyber-Sicherheitsrisiko
  • Cyber-Sicherheitsschaden
  • Cyber-Sicherheitsstrategien
  • Cyber-Sicherheitssystem
  • Cyber-Verteidigung
  • Cyclic Redundancy Check
  • Common Security Control

    Security control that can be applied to one or more agency information systems and has the following properties: 1) the development, implementation, and assessment of the control can be assigned to a responsible official or organizational element (other than the information system owner); and 2) the results from the assessment of the control can be used to support the security certification and accreditation processes of an agency information system where that control has been applied.     SOURCE: NIST 800 series, FIPS Pubs

    ANBIETER/PARTNER
    Experten- und Marktplattformen
    Cloud Computing

    Technologie-Basis zur Digitalisierung

    mehr
    Sicherheit und Datenschutz

    Vertrauen zur Digitalisierung

    mehr
    Anwendungen

    wichtige Schritte zur Digitalisierung

    mehr
    Digitale Transformation

    Partner zur Digitalisierung

    mehr
    Energie

    Grundlage zur Digitalisierung

    mehr
    Experten- und Marktplattformen
    • company
      Cloud Computing –

      Technologie-Basis zur Digitalisierung

      mehr
    • company
      Sicherheit und Datenschutz –

      Vertrauen zur Digitalisierung

      mehr
    • company
      Anwendungen –

      wichtige Schritte zur Digitalisierung

      mehr
    • company
      Digitale Transformation

      Partner zur Digitalisierung

      mehr
    • company
      Energie

      Grundlage zur Digitalisierung

      mehr
    Values Blogs