D Flashcards
DBA
Database Administrator
The individual responsible for maintaining and securing databases that store, protect, and allow users to query data. They also ensure that data is correctly stored and retrieved, and that users can easily access the information they need.
DAC
Discretionary Access Control
A cybersecurity system that allows the owner of a resource to control who can access it and what level of access they have
DDoS
Distributed Denial of Service
A cyberattack where the attacker attempts to disrupt a server, network, or service by flooding it with internet traffic from multiple sources.
DEP
Data Execution Prevention
A security feature that monitors and protects certain pages/regions of memory, preventing them from executing (usually malicious) code. This works by marking some data regions as non-executable by default, making it harder for attacks to use buffer overflows and other malware execution techniques.
DES
Digital Encryption Standard
A symmetric block cipher with a 56-bit key. This is a short key and too insecure for modern applications, but has been helpful for the advancement of cryptography.
DHCP
Dynamic Host Configuration Protocol
A networking protocol that automatically assigns private IP addresses and other network configurations to devices when they connect to a network. The address is assigned by a DHCP server.
DHE
Diffie-Hellman key Exchange
A key exchange protocol that enables two parties, who have had no prior knowledge of each other, securely establish a mutual secret over an insecure channel.
DKIM
DomainKeys Identified Mail
An email security standard that uses digital signatures to verify that an email was sent and an authorized email server.
Admins can use this to list email servers that are authorized to send mail on the organization’s behalf. Also, a mail server receiving mail will use it to check the aforementioned list to see if the message was indeed sent by an authorized server.
DLL
Dynamic Link Library
A library used by Microsoft OSs that allows multiple applications to share code and other resources simultaneously. These resources include images and executable functions that complete specific tasks.
DLP
Data Loss Prevention
A cybersecurity solution that helps organizations prevent and detect data breaches, leaks, and misuse. Includes a combination of people, processes, and technology to protect sensitive data and ensure compliance with regulations.
This software can send alerts when sensitive information is downloaded, and detects when that data is leaving the network (via an email, dropbox, etc).
DMARC
Domain Message Authentication, Reporting, and Conformance
An email security protocol that determined the disposition of emails that cannot be authenticated. It determines whether they’re reported, marked as spam, deleted, etc.
DNAT
Destination Network Address Translation
A NAT technique that changes the destination address of a routed packet and performs the reverse function for replies.
Typically used when connecting from a public network to a private network. (The opposite from how NAT is normally used)
DNS
Domain Name System
The phonebook of the internet. This system translates domain names into IP addresses.
DoS
Denial of Service
A cyberattack where the attacker attempts to disrupt a server, network, or service by flooding it with internet traffic from a single source.
DPO
Data Privacy Officer
An individual responsible for ensuring that an organization handles personal data in compliance with data protection laws. This includes the data of customers, staff, providers, and other individuals.
They are also responsible for training other employees on data privacy compliance and conducting regular security audits.