D Flashcards
DAC
Discretionary Access Control
The creator has all control over an asset and access to it.
The default form of access for Windows.
Data
custodian
Facilitates use
Exemplified by data center personnel who manage and
maintain systems.
Data owner
Responsible for use
Determines logical controls, authorizes use and defines
required security.
DBA
Database Administrator
This role is filled by personnel capable of managing
automated and large information repositories.
DDoS
Distributed Denial of Service
This attack methodology involves a multitude of
remotely controlled devices focusing upon a single
target.
DEP
Data Execution Prevention
And operating system memory management technique
that prevents user data from overlapping into computer
instructions.
DER
Distinguished Encoding Rules
A commonly used method of encoding the data that
makes up the certificate using ASN.1.
DES
Digital Encryption Standard
The first US government standard for symmetric
encryption. It has a 56 bit key.
DHCP
Dynamic Host Configuration Protocol
This is an extension of BOOTP and is used to
dynamically allocate IPs.
DHE
Diffie-Hellman Ephemeral
This is a key exchange algorithm that enhances
confidentiality by discarding the session keys after use.
Dictionary
Dictionary attack
Performs hashing or encryption on an array of
predetermined candidate phrases, and compares it to the
secret.
Differential
BU
Differential backup
-It backups files to alternative media that have the archive
bit set, and then it does not clear it.
DKIM
Domain Keys Identified Mail
A messaging security standard designed to facilitate
non-repudiation between sender and receiver.
DLL
Dynamic Link Library
These files are not directly executed, but are called up
by an application when certain additional functions or
libraries are needed.
DLP
Data Loss Prevention
Strategies and applications that prevent data theft or
illicit access.
DMARC
Domain Message Authentication Reporting
and Conformance
This is an email security standard designed to allow
domains to protect themselves from unauthorized use
and spoofing.
DNAT
Destination Network Address Translation
The initial destination of a packet as it enters a NAT
system to be redirected to another destination.
DMZ
Demilitarized Zone
The perimeter area where the outside world may access
certain services.
DNS
Domain Name Service
An application that handles symbolic name to address
mappings, as well as the reverse.
DNSSEC
Domain Name System
Security Extensions
An array of tools devised by the IETF to secure DNS
transactions.
DoS
Denial of Service
A one on one attack that causes access or utility to
cease.
DPO
Data Protection Officer
A senior officer responsible for an organization’s data
protection strategies and compliance.
DRP
Disaster Recovery Plan
The immediate plans for recovery of operations or
services in the event of a catastrophic incident.
DSA
Digital Signature Algorithm
An algorithm created by the NSA to implement non-
repudiation.
DSL
Digital Subscriber Line
High-speed Internet conductivity based upon existing
infrastructure for telephones.