D Flashcards
DAD Triad
The 3 key treats to cybersecurity efforts: disclosure, alteration, and denial.
Dark Web
An anonymous network created through encryption technology and often used for illicit activity. 14
Dashboard Reporting
Utilizes visual aids like graphs and charts to summarize risk data, usually in real time.
Data At Rest
Stored data that resides on hard drives, on tapes, in the cloud, or on other storage media.
Data Breach Notification Law
Laws requiring the notification of data subjects after a known or suspected breach.
Data Classification Policy
A document that describes the classification structure used by the organization and the process used to properly assign classification to data.
Data Controller
In the context of a data processor, as defined by the European Union data protection laws, the person or entity that controls processing of the data.
Data custodian
The user who is assigned the task of implementing the prescribed protection defined by the security policy and upper management. The data custodian preforms any and all activities necessary to provide adequate protection for data and to fulfill the requirements and responsibilities delegated to them from upper management.
Data Exfiltration Attack
An attack in which access to sensitive information is gained and then removed from an organization. 15
Data Exposure
The concept that sensitive personal information in databases exposes and organization to risk in the event that information is stolen by an attacker. 15
Data Governance Policy
A document that clearly states the owner of information created or used by the organization
Data In Transit
Data that is in transit over a network
Data In Use
Data that is actively in use by a computer system 15
Data Inventory
The first step in managing sensitive data is developing a data inventory of the types of information maintained by the organization and the places where that data is stored, processed, and transmitted. 15
Data Loss
The exposure of sensitive information to unauthorized individuals. 15
Data Loss Prevention (DLP)
Any systems that identify, monitor, and protect data to prevent it from unauthorized use, modification, destruction, egress, or exfiltration from a location.
Data Masking
A tool that redacts sensitive information by replacing some of or all sensitive fields with blank characters. 15
Data Minimization
The techniques seeking to reduce risk by reducing the amount of sensitive information maintained on a regular basis. 15
Data Obfuscation
The process that transforms data into a format where the original information can not be retrieved. 15
Data Owner
The person responsible for classifying information for placement and protection with the security solution. 15
Data Ownership
The organization designates specific senior executives as the data owners fo different data types. 16
Data Processor
An individual or entity who processes personal data solely on behalf of the data controller. 16
Data Protection Office (DPO)
Data Protection Officer - A specific individual who bears overall responsibility for carrying out the organization’s data privacy efforts.16
Data Retention Policy
A document that outlines what information the organization will maintain, and the length of time different categories of work product will be retained before destruction. 16
Data Sovereignty
A principle that states that data is subject to the legal restrictions of any jurisdiction where it is collected, stored or processed. 16
Data Steward
An individual who is responsible for carrying out an organizations data security policies and overseeing data usage based on those policies.
Data subject
Individual whose personal data is being processed.
Database Encryption
Targets data at the database level. It is a method used to protect sensitive policies and overseeing data usage based on those policies. 16
Database Normalization
The process of removing duplication in a relational database. 16
Dead Code
Code that is in use in an organization, but nobody is responsible for the maintenance of that code, and in fact, nobody even know where the original source file reside. 16
Debug Modes
The feature that gives developers crucial error information needed to troubleshoot applications in the development process. 16
Decentralized
An approach that reduces single points of failure by spreading technology components across multiple providers.
DDOS
One of the most common forms of the distributed denial of service attacks is a network based DDOS. Malicious actors commonly use large scale botnets to conduct network DDoS attacks, and commercial services exist that conduct DDOS attacks and DDoS like behavior for stress and load testing purposes. 16
Defensive Penetration Testing
Focuses on evaluating an organization’s ability to defend against cyberattacks, Unlike offensive penetration testing, which aims to exploit vulnerabilities, defensive penetration testing involves assessing the effectiveness of security policies, procedures, and technologies in detecting and mitigating threats. 16
Deidentification Process
Removes the ability to link data back to an individual, reducing its sensitivity. 16
Demilitarized Zone (DMZ)
A network zone that resides between an internal network and the internet used to host systems that require public access. 16
Digital Signatures
Message integrity is enforced using encrypted message digests, known as digital signatures, created upon transmission. 17
Denial
The unintended disruption of an authorized user’s legitimate access to information. 17
Deny Listing
Developers use this method to control user input by describing potentially malicious input that must be blocked during input validation. 17
Deprovisioned
When an account is terminated. 17
Detective Controls
A type of access control that is deployed to discover or detect unwanted or unauthorized activity. 17
Deterrent Controls
A type of access control that is deployed to discourage violation of security policies. 17
Development environment
Typically used for developers or other builders to do their work. 17
Device Driver
Software interface between hardware devices and the operating system. 17
DevOps
Software interface between hardware devices and the operating system. 17
DevSecOps
DevOps Model that includes securrity as a coe component.
Diamond Model of Intrusion Analysis
An intrusion analysis model that focuses on adversaries, infrastructure, victims, and capabilities using a diamond shape to guide analysis through the connected vertices. 17
Dictionary Attack
The act of attempting to crack passwords by testing them against a list of dictionary words. 17
Differential Backup
A type of backup that stores all files that have been modified since the time of the most recent full backup. 17
Dig
A tool that performs a lookup of an IP address to return a domain name, or a domain name to return an IP address, and looks up specific DNS information like MX (Mail server), A, and other DNS records. 17
Digital Certificates
An Electonic document used to securely share private key with third parties based on the assurance provided by a certificate authority (CA). 17
Digital Rights Management (DRM)
A type of protection software that uses encryption to enforce copyright restrictions on digital media. Over the past decade, publishers attempted to deploy DRM schemes across a variety of media types, including music, movies, and books. 17
Digital Signatures
Message integrity is enforced using encrypted message digests, known as digital signatures, created upon transmission of a message.
Directive Controls
Informed employees and others what they should do to achieve security objectives. 18
Directory Services
A centralized database of resources available to the network, much like a telephone directory for services and assets. Users, clients, and processes consult the directory service to learn where a desired system or resource resides. 18
Directory Traversal
An attack that allows an attacker to jump out of the web root directory structure and into any other part of the file system hosted by the web server’s host operating system. 18
Disassociation
An attack in which the intruder sends a frame to a wireless access point with a spoofed address to make it look as if it came from the victim and then disconnects them from the network. 18
Disaster Recovery Plan (DRP)
Disaster Recovery Plan -Term that describes the actions an organization takes to resume normal operations after a disaster interrupts normal activity. 18
Disclosure
The occurrence of violation of violation of confidentiality when resources are made accessible to unauthorize entities. 18
Discretionary Access Control
A mechanism used to control access to objects. The owner or creator of an object controls and defines the access other subjects have to it 18
Disposition
A software development phase that occurs when a product or system reaches the end of life. 18
Disruption/Chaos Attack
Attacks that are motivated by a desire to cause chaos and disrupt normal operations. 18
DLL Injection attack
A variant of SQL injection, where commands may attempt to load dynamic link libraries (DLL) containing malicious code. 18
DNS Filtering
Used by many organizations to block malicious domains.18
DNS Poisoning
Can be accomplished in multiple ways. One form is another form of the on-path attack where an attacker provides a DNS response while pretending to be an authoritative DNS server. Vulnerabilities in DNS protocols or implementations can also permit DNS poisoning, but they are rarer.
DNS sinkhole
A DNS server that is configured to provide incorrect answers to specific DNS queries. 19
Dnsenum
A DNS server that is configured to provide incorrect answers to specific DNS queries. 19
DNSENUM
a command line tool that is used to find DNS servers and entries for a domain. 19
Domain based message authentication reporting and conformance (DMARC)
Domain based message authentication reporting and conformance (DMARC)-A protocol that uses SPF and DKIM to determine if an email message is authentic. 19
Domain hijacking
Changes the registration of a domain. 19
Domain reputation
Services and tolls provide information about whether a domain is a trusted email sender or sends a lot of spam email. 19
Domain Name System (DNS)
Domain Name System (DNS)–The network service used in TCP/IP networks that translates hostnames to IP addresses. 19
Domain Name System Security Extensions (DNSSEC)
Domain Name System Security Extensions (DNSSEC)–Provide authentication of DNS data, allowing DNS queries to be validated even if they are not encrypted. 19
Domain Validation (DV) Certificates
Domain Validation (DV) Certificates The CA simply verifies that the certificate subject has control of the domain name. 19
DomainKeys Identified Mail (DKIM)
DomainKeys Identified Mail (DKIM)-Allows organizations to add content to messages to identify them as being from their domain. 19
Downgrade Attack
Sometimes used against secure communications such as TLS in an attempt to get the user or system to inadvertently shift to a less secure cryptographic modes. 19
Due Care
Refers to the ongoing efforts to ensure that the implemented policies and controls are effective and continuously maintained. 20
Due diligence
Involves thoroughly vetting potential vendors to ensure that they meet the organizations standards and requirements. 20
Dumpster diving
Looking through trash for clues to find users passwords and other pertinent information. 20
Dynamic Code Analysis
Analyzing the execution of code while providing it with input to test the software. 20
Dynamic Host Configuration Protocol (DHCP)
Dynamic Host Configuration Protocol (DHCP)– A protocol used to assign TCP/IP configuration settings to systems upon bootup. DHCP uses UDP