Encyclopedia of Cybersecurity

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Certificate Authority

A Certificate Authority (CA) is a trusted entity responsible for issuing, validating, and managing digital certificates used to establish secure communication, authentication, and trust between parties in a networked environment, such as the internet or an internal corporate network. Digital certificates serve as electronic credentials that verify the identity of entities, such as websites, servers,

Certificate Authority Read More »

Certificate Pinning

Certificate pinning, also known as SSL pinning or public key pinning, is a security mechanism used in web and mobile applications to prevent man-in-the-middle (MITM) attacks by ensuring that only specific digital certificates or public keys are trusted when establishing secure connections over HTTPS. Traditionally, when a client (such as a web browser or a

Certificate Pinning Read More »

Certificate Revocation List

A Certificate Revocation List (CRL) is a list of digital certificates that have been revoked by the issuing Certificate Authority (CA) before their scheduled expiration date. CRLs are used in Public Key Infrastructure (PKI) systems to maintain the security and integrity of digital certificates by providing a mechanism for entities to verify the validity and

Certificate Revocation List Read More »

Children’s Internet Protection Act

The Children’s Internet Protection Act (CIPA) is a United States federal law enacted in 2000 to address concerns about children’s access to inappropriate material on the internet. CIPA mandates that schools and libraries that receive certain federal funding or discounts for internet access or internal connections through the E-rate program must implement measures to protect

Children’s Internet Protection Act Read More »

Clickjacking

Clickjacking, also known as UI redressing or user interface (UI) overlay attacks, is a malicious technique used to trick users into clicking on unintended or disguised elements on a webpage or application interface without their knowledge or consent. Clickjacking attacks involve embedding invisible or disguised elements, such as buttons, links, or interactive content, within a

Clickjacking Read More »

Cloud Access Security Broker

A Cloud Access Security Broker (CASB) is a security solution or service that acts as an intermediary between cloud service users and cloud service providers to enforce security policies, monitor activity, and protect data in cloud environments. CASBs help organizations extend their security controls and visibility to cloud applications and services, enabling them to manage

Cloud Access Security Broker Read More »

Cloud Controls Matrix

The Cloud Controls Matrix (CCM) is a cybersecurity framework developed by the Cloud Security Alliance (CSA) to help organizations assess the security risk of cloud computing. It provides a detailed set of control specifications designed to align cloud providers and users on common security and compliance practices. The CCM encompasses various security concepts and principles

Cloud Controls Matrix Read More »

Cloud Encryption

Cloud encryption refers to the process of encrypting data before it is stored or transmitted to cloud-based storage or applications, ensuring that the data remains protected from unauthorized access, interception, or disclosure while it resides in the cloud. Cloud encryption helps organizations maintain the confidentiality, integrity, and privacy of sensitive information stored or processed in

Cloud Encryption Read More »

Scroll to Top