Day 4 Reversed Flashcards
CVSS
Common Vulnerability Scoring System
An empirical scheme for rating vulnerability severity based upon specific aspects of the vulnerability, environment, and nature of threats.
CYOD
Choose Your Own Device
In this mode of control and acquisition, an employee chooses a device from a company provided list. Ownership may be personal or organization.
DAC
Discretionary Access Control
The creator has all control over an asset and access to it. The default form of access for Windows.
Data Custodian
Facilitates Use
Exemplified by data center personnel who manage and maintain systems.
Data Owner
Responsible For Use
Determines logical controls, authorizes use and defines required security.
DBA
Database Administrator
This role is filled by personnel capable of managing automated and large information repositories.
DDoS
Distributed Denial of Service
This attack methodology involves a multitude of remotely controlled devices focusing upon a single target.
DEP
Data Execution Prevention
And operating system memory management technique that prevents user data from overlapping into computer instructions.
DER
Distinguished Encoding Rules
A commonly used method of encoding the data that makes up the certificate using ASN.1
DES
Digital Encryption Standard
The first US government standard for symmetric encryption. It has a 56 bit key.
DHCP
Dynamic Host Configuration Protocol
This is an extension of BOOTP and is used to dynamically allocate IPs.
DHE
Diffie-Hellman Ephemeral
This is a key exchange algorithm that enhances confidentiality by discarding the session keys after use.
DA
Dictionary Attack
Performs hashing or encryption on an array of predetermined candidate phrases, and compares it to the secret.
Differential BU
Differential Backup
It moves files to alternative media that have the archive bit set, and then it does not clear it.
DKIM
Domain Keys Identified Mail
A messaging security standard designed to facilitate non-repudiation between sender and receiver.
DLL
Dynamic Link Library
These files are not directly executed, but are called up by an application when certain additional functions or libraries are needed.
DLP
Data Loss Prevention
Strategies and applications that prevent data theft or illicit access.
DMARC
Domain Message Authentication Reporting and Conformance
This is an email security standard designed to allow domains to protect themselves from unauthorized use and spoofing.
DNAT
Destination Network Address Translation
The initial destination of a packet as it enters a NAT system to be redirected to another destination.
DMZ
Demilitarized Zone
The perimeter area where the outside world may access certain services.
DNS
Domain Name Service
An application that handles symbolic name to address mappings, as well as the reverse.
DNSSEC
Domain Name System Security Extensions
An array of tools devised by the IETF to secure DNS transactions.
DoS
Denial of Service
A one on one attack that causes access or utility to cease.
DPO
Data Protection Officer
A senior officer responsible for an organization’s data protection strategies and compliance.
DRP
Disaster Recovery Plan
The immediate plans for recovery of operations or services in the event of a catastrophic incident.