C |
C2 | Command and Control |
C2W | Command and Control Warfare |
C3 | Command, control and communications |
C3I | Command, control, communications and intelligence |
C4 | Command, Control, Communications, and computers |
C4I | Command, Control, Communications, Computers, and Intelligence |
C4ISR | Command, Control, Communications, Computer Intelligence, Surveillance and Reconnaissance |
C&A | Certification and Accreditation |
CA | Certification Authority |
CAT | Common Authentication Technology |
CAAT | Computer-Assisted Audit Technique |
CADS | Certification Authority Digital Signature |
CALEA | Communications Assistance for Law Enforcement Act |
CAS | Controlled Access System |
CASL | Custom Audit Scripting Language |
CAST | от имен Carlisle Adams and Stafford Tavares |
CAPI | Cryptographic Application Programming Interface |
CAW | Certification authority workstation |
CBAC | Content-based access control |
CBC | Cipher Block Chaining |
CBCC | Cipher Block Chaining With Checksum |
CC | Common Criteria |
CCA | Cardholder Certification Authority |
CCEP | Commercial COMSEC Endorsement Program |
CCI | Common Content Inspection |
CCIPS | Computer Crime and Intellectual Property Section |
CBC | Cipher Block Chaining |
CC | Common Criteria |
CCB | Configuration Control Board |
CCI | 1. Common Content Inspection |
| 2. Controlled Cryptographic Item |
CCIP | Centre for Critical Infrastructure Protection |
CCITSE | Common Criteria for Information Technology Security Evaluation |
CCM | Counter Mode with Cipher Block Chaining Message Authenticity Check |
CCMP | Counter Mode–CBC MAC Protocol |
CCSE | Check Point Certified Security Engineer |
CCSP | Cisco Certified Security Professional |
CCTL | Common Criteria Testing Laboratory |
CCTP | Common Criteria Testing Program |
CDS | 1. Cryptographic Device Services |
| 2. Certificate Discovery Server |
CDSA | 1. Common Data Security Architecture |
| 2. Communication And Data Security Architecture |
CEM | Common Evaluation Methodology |
CER | 1. Crossover Error Rate |
| 2. Cryptographic Equipment room |
CERIAS | Center for Education and Research in Information Assurance and Security |
CERT/CC | CERT Coordination Center |
CERT-NL | Computer Emergency Response Team Netherlands |
CFB | Cipher Feedback |
CHAP | Challenge Handshake Authentication Protocol |
CI | Content Inspector |
CIAC | 1. Computer Incident Advisory Capability |
| 2. Computer Incident Assessment Capability |
CID | Common Intrusion Detection |
CIDDS | Common Intrusion Detection Director System |
CIDF | Common Intrusion Detection Framework |
CIK | Cryptographic Ignition Key |
CINC | Commander-in-Chief |
CIO | Chief Information Officer |
CIP | 1. Critical Infrastructure Protection |
| 2. Crypto-Ignition Plug |
CIPA | Children‘s Internet Protection Act |
CIPC | Content Inspection Protocol Client |
CIPSO | Common IP Security Option |
CIRK | Common Interswitch Rekeying Key |
CIRT | 1. Cyber-Incident Response Team |
| 2. Computer Incident Response Team |
CIS | Center for Internet Security |
CISA | Certified Information Systems Auditor |
CISF | Catalyst Integrated Security Framework |
CISL | Common Intrusion Specification Language |
CISO | Chief Information Security Officer |
CISSP | Certified Information Systems Security Professional |
CK | 1. Compartment Key |
| 2. Cipher Key |
CKG | Cooperative Key Generation |
CKL | Compromised Key List |
CM | Configuration Management |
CMC | Ciphering Mode Command |
CMCS | COMSEC Material Control System |
CMDS | Computer Misuse Detection System |
CMEA | Cellular Message Encryption Algorithm |
CMP | Certificate Management Protocol |
CMS | Cryptographic Message Syntax |
CMW | Compartmented Mode Workstation |
CNA | Computer Network Attack |
CNCS | Cryptonet Control Station |
CND | Computer Network Defense |
CNK | Cryptonet Key |
COAST | Computer Operations, Audit, and Security Technology |
COE | Common Operating Environment |
COMPUSEC | Computer Security |
COMPSEC | Computer Security |
COMSEC | Communications Security |
COO | Chief Operating Officer |
COOP | Continuity of Operations Plan |
COPPA | Children‘s Online Privacy Protection Act |
COPS | 1. Computer Oracle and Password System |
| 2. Common Open Policy Service |
CORES | Computer Response Squad |
COTS | Commercial Off-The-Shelf |
CP | Certification Policy |
CPRM | Content Protection for Removable Media |
CPS | 1. Certificate Practices Statement |
| 2. COMSEC Parent Switch |
CRAM | Challenge-Response Authentication Mechanism |
CRC | Cyclic Redundancy Check |
CRL | Certificate Revocation List |
CRP | COMSEC Resources Program |
CS | Classified Sensitive |
CSA | Cisco Security Agent |
CSC | Computer Security Center |
CSE | 1. Communications Security Element |
| 2. Content Security Element |
CSI | Computer Security Institute |
CSIR | Computer Security Incident Response |
CSIRC | Computer Security Incident Response Capability |
CSIRT | Computer Security Incident Response Team |
CSO | Chief Security Officer |
CSOR | Computer Security Objects Register |
CSP | 1. Cryptographic Service Provider |
| 2. Critical Security Parameters |
CSR | Certificate Signing Request |
CSRC | Computer Security Response Center |
CSRT | Content Security Response Team |
CSS | 1. Comsec Subordinate Switch |
| 2. Continuous Signature Service |
CSSM | Common Security Services Manager |
CSSO | Contractor Special Security Officer |
CSTC | Computer Security Technology Center |
CSTVRP | Computer Security Technical Vulnerability Reporting Program |
CT&E | Certification Test And Evaluation |
CTAK | Cipher Text Auto-Key |
CTCPEC | Canadian Trusted Computer Product Evaluation Criteria |
CT-KIP | Cryptographic Token Key Initialization Protocol |
CTR | Counter Mode |
CUP | COMSEC Utility Program |
CVE | 1. Common Vulnerabilities and Exposures |
| 2. Common Vulnerability Enumeration |
CVP | Content Vectoring Protocol |
CVSS | Common Vulnerability Scoring System |
 |  |