D - GLOSSARY Flashcards

1
Q

Damage evaluation

A

The determination of the extent of damage that is necessary to provide for an estimation of the recovery time frame and the potential loss to the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data classification

A

The assignment of a level of sensitivity to data (or information) that results in the specification of controls for each level of classification.
Levels of sensitivity of data are assigned according to predefined
categories as data are created, amended, enhanced, stored or transmitted.
The classification level is an indication of the value or importance of the
data to the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data custodian

A

The individual(s) and/or department(s) responsible for the storage and safeguarding of computerized data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data Encryption Standard (DES)

A

An algorithm for encoding binary data. It is a secret key cryptosystem published by the National Bureau of Standards (NBS), the predecessor of the US National Institute of Standards and Technology (NIST). DES and
its variants have been replaced by the Advanced Encryption Standard (AES).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data integrity

A

The property that data meet with a priority expectation of quality and that the data can be relied on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data leakage

A

Siphoning out or leaking information by dumping computer files or stealing computer reports and tapes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data leak protection (DLP)

A

A suite of technologies and associated processes that locate, monitor and protect sensitive information from unauthorized disclosure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data mining

A

A technique used to analyze existing information, usually with the intention of pursuing new avenues to pursue business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data normalization

A

A structured process for organizing data into tables in such a way that it preserves the relationships among the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data owner

A

The individual(s), normally a manager or director, who has responsibility for the integrity, accurate reporting and use of computerized data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data warehouse

A

A generic term for a system that stores, retrieves and manages large volumes of data. Data warehouse software often includes sophisticated comparison and hashing techniques for fast searches, as well as advanced filtering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Decentralization

A

The process of distributing computer processing to different locations within an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Decryption key

A

A digital piece of information used to recover plaintext from the corresponding ciphertext by decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Defense in depth

A

The practice of layering defenses to provide added protection. Defense in depth increases security by raising the effort needed in an attack. This
strategy places multiple barriers between an attacker and an organization’s computing and information resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Degauss

A

The application of variable levels of alternating current for the purpose of demagnetizing magnetic recording media. The process involves increasing the alternating current field gradually from zero to some maximum value and back to zero, leaving a very low residue of magnetic induction on the media. Degauss loosely means: to erase.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Demilitarized zone (DMZ)

A

A screened (firewalled) network segment that acts as a buffer zone between a trusted and untrusted network. A DMZ is typically used to house systems such as web servers that must be accessible from both internal networks and the Internet.

17
Q

Denial-of-service (DoS) attack

A

An assault on a service from a single source that floods it with so many requests that it becomes overwhelmed and is either stopped completely or operates at a significantly reduced rate

18
Q

Digital certificate

A

A process to authenticate (or certify) a party’s digital signature; carried out by trusted third parties

19
Q

Digital code signing

A

The process of digitally signing computer code to ensure its integrity

20
Q

Disaster declaration

A

The communication to appropriate internal and external parties that the disaster recovery plan is being put into operation

21
Q

Disaster notification fee

A

The fee the recovery site vendor charges when the customer notifies them that a disaster has occurred and the recovery site is required.
The fee is implemented to discourage false disaster notifications.

22
Q

Disaster recovery plan (DRP)

A

A set of human, physical, technical and procedural resources to recover, within a defined time and cost, an activity interrupted by an emergency or disaster

23
Q

Disaster recovery plan desk checking

A

Typically a read-through of a disaster recovery plan without any real actions taking place. Generally involves a reading of the plan, discussion of the action items and definition of any gaps that might be identified.

24
Q

Disaster recovery plan walk-through

A

Generally a robust test of the recovery plan requiring that some recovery activities take place and are tested. A disaster scenario is often given and
the recovery teams talk through the steps they would need to take to recover. As many aspects of the plan should be tested as possible.

25
Q

Discretionary access control (DAC)

A

A means of restricting access to objects based on the identity of subjects and/or groups to which they belong. The controls are discretionary in the
sense that a subject with a certain access permission is capable of passing that permission (perhaps indirectly) on to any other subject.

26
Q

Disk mirroring

A

The practice of duplicating data in separate volumes on two hard disks to make storage more fault tolerant. Mirroring provides data protection in the case of disk failure because data are constantly updated to both disks.

27
Q

Distributed denial-of-service (DDoS) attack

A

A denial-of-service (DoS) assault from multiple sources

28
Q

Domain name system (DNS)

A

A hierarchical database that is distributed across the Internet that allows names to be resolved into IP addresses (and vice versa) to locate services
such as web and email servers

29
Q

Dual control

A

A procedure that uses two or more entities (usually persons) operating in concert to protect a system resource so that no single entity acting alone
can access that resource

30
Q

Due care

A

The level of care expected from a reasonable person of similar competency under similar conditions

31
Q

Due diligence

A

The performance of those actions that are generally regarded as prudent, responsible and necessary to conduct a thorough and objective investigation, review and/or analysis

32
Q

Dynamic Host Configuration Protocol (DHCP)

A

A protocol used by networked computers (clients) to obtain IP addresses and other parameters such as the default gateway, subnet mask and IP addresses of domain name system (DNS) servers from a DHCP server. The DHCP server ensures that all IP addresses are unique (e.g., no IP address is assigned to a second client while the first client’s assignment is valid [its
lease has not expired]). Thus, IP address pool management is done by the server and not by a human network administrator.