Glossary D Flashcards
DAC (discretionary access control)
Access control model where each resource is protected by an Access Control List (ACL) managed by the resource’s owner (or owners).
data at rest
Information that is primarily stored on specific media, rather than moving from one medium to another.
data breach
When confidential or private data is read, copied, or changed without authorization. Data breach events may have notification and reporting requirements.
data controller
In privacy regulations, the entity that determines why and how personal data is collected, stored, and used.
data custodian
An individual who is responsible for managing the system on which data assets are stored, including being responsible for enforcing access control, encryption, and backup/recovery measures.
data exfiltration
The process by which an attacker takes data that is stored inside of a private network and moves it to an external network.
data exposure
A software vulnerability where an attacker is able to circumvent access controls and retrieve confidential or sensitive data from the file system or database.
data governance
The overall management of the availability, usability, and security of the information used in an organization.
data in processing
Information that is present in the volatile memory of a host, such as system memory or cache.
data in transit
Information that is being transmitted between two hosts, such as over a private network or the Internet. Also known as data in motion.
data masking
A deidentification method where generic or placeholder labels are substituted for real data while preserving the structure or format of the original data.
data minimization
In data protection, the principle that only necessary and sufficient personal information can be collected and processed for the stated purpose.
data owner
A senior (executive) role with ultimate responsibility for maintaining the confidentiality, integrity, and availability of an information asset.
data processor
In privacy regulations, an entity trusted with a copy of personal data to perform storage and/or analysis on behalf of the data collector.
data remnant
Leftover information on a storage medium even after basic attempts have been made to remove that data. Also known as remnant.
data sovereignty
In data protection, the principle that countries and states may impose individual requirements on data collected or stored within their jurisdiction.
data steward
An individual who is primarily responsible for data quality, ensuring data is labeled and identified with appropriate metadata and that data is collected and stored in a format and with values that comply with applicable laws and regulations.
DCHP snooping
A configuration option that enables a switch to inspect DHCP traffic to prevent MAC spoofing.
dd command
Linux command that makes a bit-by-bit copy of an input file, typically used for disk imaging.
DDoS attack (distributed denial of service attack)
An attack that uses multiple compromised hosts (a botnet) to overwhelm a service with request or response traffic.
dead code
Code in an application that is redundant because it will never be called within the logic of the program flow.
deauthentication/disassociation
Spoofing frames to disconnect a wireless station to try to obtain authentication data to crack.
deception and disruption
Cybersecurity resilience tools and techniques to increase the cost of attack planning for the threat actor.