INVITATION TO CYBERSECURITY 298 Cerf, Vint: a pioneer of the Internet who along with Bob Kahn created the TCP/IP protocols (2) certificate authority (CA): a third party that is trusted to verify real-life identities (7) challenge coin: a custom coin presented by a leader as a commendation for a job well done (3) Chaos Computer Club: a pioneering European hacktivist group (3) checks and balances: the designed interdependencies between the executive, legislative, and judicial branches of the United States government to prevent the abuse of power (10) Chief Information Security Officer (CISO): the officer in charge of cybersecurity (5) Children’s Online Privacy Protection Act (COPPA): a United States data privacy law that protects the data of children under thirteen (5) chosen-plaintext attack: an attack on ciphertext where the adversary can generate messages using the same key and cryptosystem that produced the ciphertext (7) Chrome: Google’s web browser (2) CIA triad: the three goals of cyber defense: confidentiality, integrity, and availability (4) cipher: a cryptographic scheme that operates on the level of letters (7) ciphertext: the scrambled message (7) ciphertext block: a block of encrypted bits (7) ciphertext-only attack: an attack on ciphertext where the adversary starts only with the ciphertext (7) circuit: a path through which electricity flows (2) civil disobedience: refusing to obey a law, or actively disobeying a law, as an act of protest based on the belief that the law is unjust (10) classifications: in the United States Department of Defense MLS system the permission levels assigned to objects (8) clearances: in the United States Department of Defense MLS system the permission levels assigned to subjects (8) client program: a program that initiates connections to a server (2) client program: a program that initiates network connections to servers (2) closed-source software: software for which the source code is not published (9) cloud computing: the practice of using third-party servers over the Internet for business purposes (5) code cracking: an attack against ciphertext to reveal the encrypted message (7) codebook: a cryptographic scheme that operates on the level of words (7) collision resistance: a feature of hash functions that make hash collisions highly improbable (7)
RkJQdWJsaXNoZXIy MTM4ODY=