What is the most important goal of all security solutions?

clean 1 The act of removing a virus from a system and repairing the damage caused by the virus. 2 The act of removing data from a storage media for reuse in the same security environment. clean power Nonfluctuating pure power. clearing A method of sufficiently deleting media that will be reused in the same secured envi- ronment. Also known as overwriting. click-wrap license agreement A software agreement in which the contract terms are either written on the software box or included in the software documentation. During the installation process, you are required to click a button indicating that you have read the terms of the agree- ment and agree to abide by them. clipping level A threshold value used in violation analysis auditing. Crossing the clipping level triggers recording of relevant event data to an audit log. closed-circuit television CCTV A security system using video cameras and video recording devices. closed head system See wet pipe system. clustering or key clustering A weakness in cryptography where a plaintext message gener- ates identical ciphertext messages using the same algorithm but using different keys. coaxial cable A cable with a center core of copper wire surrounded by a layer of insulation and then by a conductive braided shielding and finally encased in an insulation sheath. Coaxial cable is fairly resistant to EMI, has a low cost, and is easy to install. code See cipher. cohesive or cohesiveness An object is highly cohesive if it can perform a task with little or no help from other objects. Highly cohesive objects are not as dependent upon other objects as objects with lower cohesion. Objects with higher cohesion are often better. Highly cohesive objects perform tasks alone and have low coupling. cognitive password A variant of the password authentication factor that asks a series of questions about facts or predefined responses that only the subject should know. cold sites Standby facilities large enough to handle the processing load of an organization and with appropriate electrical and environmental support systems. collision attack See birthday attack. collusion An agreement between multiple people to perform an unauthorized or illegal action. commercial businessprivate sector classification The security labels commonly employed on secure systems used by corporations. Common corporate or commercial security labels are confidential, proprietary, private, sensitive, and public. Committed Information Rate CIR A contracted minimum guaranteed bandwidth alloca- tion for a virtual circuit.