Previous

NEXT

code

1. A set of instructions for a computer.
Source: www.merrianwebster.com
2. System of communication in which arbitrary groups of letters, numbers, or symbols represent units of plain text of varying length.
Source: NSTISSI No. 7002

code analysis

The act of reverse-engineering the malicious program to understand the code that implements the software behavior. For example, when looking at compiled programs, the process involves using a disassembler, a debugger, and perhaps a decompiler to examine the program’s low-level assembly or byte-code instructions. A disassembler converts the instructions from their binary form into the human-readable assembly form. A decompiler attempts to recreate the original source code of the program. A debugger allows the analyst to step through the code, interacting with it, and observing the effects of its instructions to understand its purpose.
Source: CNSSI No. 1011

codebook

Document containing plain text and code equivalents in a systematic arrangement, or a technique of machine encryption using a word substitution technique.

code group (C.F.D.)

Group of letters, numbers, or both in a code system used to represent a plain text word, phrase, or sentence.

code vocabulary (C.F.D.)

Set of plain text words, numerals, phrases, or sentences for which code equivalents are assigned in a code system.

cognizant security officer/authority

1. An entity charged with responsibility for physical, technical, personnel, and information security affecting that organization.
Source: CNSSI No. 4005 (COMSEC)
2. The single principal designated by a Senior Official of the Intelligence Community (SOIC) to serve as the responsible official for all aspects of security program management concerning the protection of national intelligence, sources and methods, under SOIC responsibility.
Source: ICS 700-1

cold site

A backup facility that has the necessary electrical and physical components of a computer facility, but does not have the computer equipment in place. The site is ready to receive the necessary replacement computer equipment in the event that the user has to move from their main computing location to an alternate site.
Source: NIST SP 800-34 Rev 1

collateral information

National security information (including intelligence information) classified Top Secret, Secret, or Confidential that is not in the Sensitive Compartmented Information (SCI) or Special Access Program (SAP) category.
Source: ICS 700-1