code |
1. A set of instructions for a computer. |
code analysis |
The act of reverse-engineering the malicious program to understand the code that implements the software behavior. For example, when looking at compiled programs, the process involves using a disassembler, a debugger, and perhaps a decompiler to examine the program’s low-level assembly or byte-code instructions. A disassembler converts the instructions from their binary form into the human-readable assembly form. A decompiler attempts to recreate the original source code of the program. A debugger allows the analyst to step through the code, interacting with it, and observing the effects of its instructions to understand its purpose. |
codebook |
Document containing plain text and code equivalents in a systematic arrangement, or a technique of machine encryption using a word substitution technique. |
code group (C.F.D.) |
Group of letters, numbers, or both in a code system used to represent a plain text word, phrase, or sentence. |
code vocabulary (C.F.D.) |
Set of plain text words, numerals, phrases, or sentences for which code equivalents are assigned in a code system. |
cognizant security officer/authority |
1. An entity charged with responsibility for physical, technical, personnel, and information security affecting that organization. |
cold site |
A backup facility that has the necessary electrical and physical components of a computer facility, but does not have the computer equipment in place. The site is ready to receive the necessary replacement computer equipment in the event that the user has to move from their main computing location to an alternate site. |
collateral information |
National security information (including intelligence information) classified Top Secret, Secret, or Confidential that is not in the Sensitive Compartmented Information (SCI) or Special Access Program (SAP) category. |