(1) Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information. (2) It is the property that sensitive information is not disclosed to unauthorized individuals, entities, devices, or processes. (3) The secrecy of data that is transmitted in the clear. (4) Confidentiality covers data in storage, during processing, and in transit.

Confidentiality mode

A mode that is used to encipher plaintext and decipher ciphertext. The confidentiality modes include electronic codebook (ECB), cipher block chaining (CBC), cipher feedback (CFB), output feedback (OFB), and counter (CTR) modes.

Configuration

The relative or functional arrangement of components in a system.

Configuration accounting

The recording and reporting of configuration item descriptions and all departures from the baseline during design and production.

Configuration auditing

An independent review of computer software for the purpose of assessing compliance with established requirements, standards, and baseline.

Configuration control

The process for controlling modifications to hardware, firmware, software, and documentation to ensure that an information system is protected against improper modifications before, during, and after system implementation.

Configuration control board

An established committee that is the final authority on all proposed changes to the computer system.

Configuration identification

The identifying of the system configuration throughout the design, development, test, and production tasks.

Configuration item

(1) The smallest component of hardware, software, firmware, documentation, or any of its discrete portions, which is tracked by the configuration management system. (2) A collection of hardware or computer programs or any of its discrete portions that satisfies an end-user function.

Configuration management

(1) The management of security features and assurances through control of changes made to a system’s hardware, software, firmware, documentation, test cases, test fixtures, and test documentation throughout the development and operational life of the system. (2) The process of controlling the software and documentation so they remain consistent as they are developed or changed. (3) A procedure for applying technical and administrative direction and surveillance to (i) identify and document the functional and physical characteristics of an item or system, (ii) control any changes to such characteristics, and (iii) record and report the change, process, and implementation status. The configuration management process must be carefully tailored to the capacity, size, scope, phase of the life cycle, maturity, and complexity of the system involved. Compare with configuration control.

Conformance testing

Conformance testing is a testing to determine if a product satisfies the criteria specified in a controlling standard document (e.g., RFC and ISO).

Congestion

Occurs when an additional demand for service occurs in a network switch and when more subscribers attempt simultaneously to access the switch more than the switch can handle. Two types of congestion can take place: (1) network congestion, which is an undesirable overload condition caused by traffic in excess of its capacity to handle, and (2) reception congestion, which occurs at a data switching exchange place.

Connectionless mode

A service that has a single phase involving control mechanisms, such as addressing in addition to data transfer.

Connection-oriented mode

A service that has three distinct phases: establishment, in which two or more users are bound to a connection; data transfer, in which data are exchanged between the users; and release, in which binding is terminated.

Connectivity tree

Routers use the connectivity tree to track Internet group management protocol (IGMP) status and activity.

Connectors

A connector is an electro-mechanical device on the ends of cables that permit them to be connected with, and disconnected from, other cables.

Console

(1) A program that provides user and administrator interfaces to an intrusion detection and prevention system. (2) A terminal used by system and network administrators to issue system commands and to watch the operating system activities.

Consumer device

A small, usually mobile computer that does not run a standard PC-OS. Examples of consumer devices are networking-capable personal digital assistants (PDAs), cell phones, and video game systems.

Contamination

Перейти на страницу:

Поиск

Похожие книги