D Flashcards
DAC
Discretionary Access Control
The creator has all control over an asset and access to it.
The default form of access for Windows.
Data
custodian
Facilitates use
Exemplified by data center personnel who manage and
maintain systems.
Data owner
Responsible for use
Determines logical controls, authorizes use and defines
required security.
DBA
Database Administrator
This role is filled by personnel capable of managing
automated and large information repositories.
DDoS
Distributed Denial of Service
This attack methodology involves a multitude of
remotely controlled devices focusing upon a single
target.
DEP
Data Execution Prevention
And operating system memory management technique
that prevents user data from overlapping into computer
instructions.
DER
Distinguished Encoding Rules
A commonly used method of encoding the data that
makes up the certificate using ASN.1.
DES
Digital Encryption Standard
The first US government standard for symmetric
encryption. It has a 56 bit key.
DHCP
Dynamic Host Configuration Protocol
This is an extension of BOOTP and is used to
dynamically allocate IPs.
DHE
Diffie-Hellman Ephemeral
This is a key exchange algorithm that enhances
confidentiality by discarding the session keys after use.
Dictionary
Dictionary attack
Performs hashing or encryption on an array of
predetermined candidate phrases, and compares it to the
secret.
Differential
BU
Differential backup
-It backups files to alternative media that have the archive
bit set, and then it does not clear it.
DKIM
Domain Keys Identified Mail
A messaging security standard designed to facilitate
non-repudiation between sender and receiver.
DLL
Dynamic Link Library
These files are not directly executed, but are called up
by an application when certain additional functions or
libraries are needed.
DLP
Data Loss Prevention
Strategies and applications that prevent data theft or
illicit access.