D - GLOSSARY Flashcards
Damage evaluation
The determination of the extent of damage that is necessary to provide for an estimation of the recovery time frame and the potential loss to the organization
Data classification
The assignment of a level of sensitivity to data (or information) that results in the specification of controls for each level of classification.
Levels of sensitivity of data are assigned according to predefined
categories as data are created, amended, enhanced, stored or transmitted.
The classification level is an indication of the value or importance of the
data to the organization.
Data custodian
The individual(s) and/or department(s) responsible for the storage and safeguarding of computerized data
Data Encryption Standard (DES)
An algorithm for encoding binary data. It is a secret key cryptosystem published by the National Bureau of Standards (NBS), the predecessor of the US National Institute of Standards and Technology (NIST). DES and
its variants have been replaced by the Advanced Encryption Standard (AES).
Data integrity
The property that data meet with a priority expectation of quality and that the data can be relied on
Data leakage
Siphoning out or leaking information by dumping computer files or stealing computer reports and tapes
Data leak protection (DLP)
A suite of technologies and associated processes that locate, monitor and protect sensitive information from unauthorized disclosure
Data mining
A technique used to analyze existing information, usually with the intention of pursuing new avenues to pursue business
Data normalization
A structured process for organizing data into tables in such a way that it preserves the relationships among the data
Data owner
The individual(s), normally a manager or director, who has responsibility for the integrity, accurate reporting and use of computerized data
Data warehouse
A generic term for a system that stores, retrieves and manages large volumes of data. Data warehouse software often includes sophisticated comparison and hashing techniques for fast searches, as well as advanced filtering.
Decentralization
The process of distributing computer processing to different locations within an organization
Decryption key
A digital piece of information used to recover plaintext from the corresponding ciphertext by decryption
Defense in depth
The practice of layering defenses to provide added protection. Defense in depth increases security by raising the effort needed in an attack. This
strategy places multiple barriers between an attacker and an organization’s computing and information resources.
Degauss
The application of variable levels of alternating current for the purpose of demagnetizing magnetic recording media. The process involves increasing the alternating current field gradually from zero to some maximum value and back to zero, leaving a very low residue of magnetic induction on the media. Degauss loosely means: to erase.