Glossary
CCC
Short for Clear Command Channel. The CCC command makes a secured control/command channel revert back to plaintext (unsecured). It helps to solve data connection problems.
CDN
A CDN, or Content Delivery Network, refers to a geographically distributed group of servers which work together to provide fast delivery of internet content.
CDR
Stands for Content Disarm and Reconstruction. CDR is an advanced threat prevention technology that does not rely on detection. Instead, it assumes all files are malicious, so it sanitizes and rebuilds each file ensuring full usability and safe content.
Certificate Authority
An entity that issues digital certificates, the highest level of trust.
Checksum
A checksum is a sequence of numbers and letters used to check for errors that may have been introduced during transmission or storage. By themselves, checksums are often used to verify data integrity, but are not relied upon to verify data authenticity.
CICA
Short for Context Inspired Component Architecture. It is ASC X12’s message-design methodology, created to help resolve costly, differing, and often incompatible XML messages used for B2B (Business-to-Business) data exchange.
CIFS
Stands for Common Internet File System. It is a dialect of SMB.
Ciphertext
The result of encryption performed on plaintext using an algorithm, known as a cipher.
Cloud Computing
This refers to applications and services offered over the internet. They are essentially data centers, collectively referred to as "the cloud." Cloud computing uses a network of remote servers hosted on the internet to store, manage, and process data, rather than a local server or a personal computer. Cloud Computing services falls into four categories: IaaS, FaaS, PaaS, and SaaS.
Cloud File Transfer
Transferring or syncing files securely from one cloud service directly to another.
Cloud Intergrations
Cloud integrations, or cloud connectors, are built-in web and cloud application integrations that connect to your GoAnywhere MFT projects and workflows.
Clustering
Using two or more computer systems that work together. Typically, this refers to multiple servers that are linked together in order to handle varying workloads or to provide continued operation in case one fails.
Compliance
This indicates that a vendor successfully recognizes a particular standard and encompass most, if not all, of that key standard.
Compression
A way to improve transmission time by shrinking the size of messages.
Cryptocurrency
Cryptocurrency is a digital currency that can be used to buy goods and services. It uses an online ledger with strong cryptography to secure online transactions.
Cryptography
The science of protecting information by transforming it into a secure format.
Cryptojacking
Cryptojacking is an online threat with the main purpose of stealing or \"mining\" cryptocurrencies.
CSE
Short for the Canadian Communication Security Establishment. It is one of Canada’s key security and intelligence organizations. They are responsible for protecting Canadian government electronic information and communication networks, among other duties.
CSR
Short for Certificate Signing Requests. It is a block of encoded text that is given to a Certificate Authority when applying for an SSL Certificate.
CSV (file)
Stands for Comma-Separated Values. A CSV file is a delimited text file that uses a literal comma to separate files.
Cybersecurity
Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks aiming to cause harm.