Previous

NEXT

compromise

1. Disclosure of information to unauthorized persons, or a violation of the security policy of a system in which unauthorized intentional or unintentional disclosure, modification, destruction, or loss of an object may have occurred.
Source: NIST SP 800-32
2.
a. (General) the disclosure of classified data to persons not authorized to receive that data.
b. (Automated Information Systems) A violation of the security policy of a system such that an unauthorized disclosure, modification, or destruction of sensitive information has occurred.
Source: NSA/CSS Manual Number 3-16 (COMSEC)

compromised key list (CKL)

The set of Key Material Identification Numbers (KMIDs) of all keys in a universal that have been reported compromised. Cryptographic devices will not establish a secure connection with equipment whose KMID is on the CKL.
Source: CNSSI No. 4032

compromising emanations

Unintentional signals that, if intercepted and analyzed, would disclose the information transmitted, received, handled, or otherwise processed by telecommunications or information systems equipment.
Source: CNSSAM TEMPEST/01-13

computer abuse

Intentional or reckless misuse, alteration, disruption, or destruction of information processing resources.

computer cryptography

Use of a crypto-algorithm program by a computer to authenticate or encrypt/decrypt information.

computer forensics

See digital forensics.

computer incident response team
(CIRT)

Group of individuals usually consisting of security analysts organized to develop, recommend, and coordinate immediate mitigation actions for containment, eradication, and recovery resulting from computer security incidents. Also called a Cyber Incident Response Team, Computer Security Incident Response Team (CSIRT) or a CIRC (Computer Incident Response Center or Computer Incident Response Capability).