compromise |
1. Disclosure of information to unauthorized persons, or a violation of the security policy of a system in which unauthorized intentional or unintentional disclosure, modification, destruction, or loss of an object may have occurred. |
compromised key list (CKL) |
The set of Key Material Identification Numbers (KMIDs) of all keys in a universal that have been reported compromised. Cryptographic devices will not establish a secure connection with equipment whose KMID is on the CKL. |
compromising emanations |
Unintentional signals that, if intercepted and analyzed, would disclose the information transmitted, received, handled, or otherwise processed by telecommunications or information systems equipment. |
computer abuse |
Intentional or reckless misuse, alteration, disruption, or destruction of information processing resources. |
computer cryptography |
Use of a crypto-algorithm program by a computer to authenticate or encrypt/decrypt information. |
computer forensics |
See digital forensics. |
computer incident response team |
Group of individuals usually consisting of security analysts organized to develop, recommend, and coordinate immediate mitigation actions for containment, eradication, and recovery resulting from computer security incidents. Also called a Cyber Incident Response Team, Computer Security Incident Response Team (CSIRT) or a CIRC (Computer Incident Response Center or Computer Incident Response Capability). |