Glossary- D Flashcards

1
Q

damage assessment

A

The process of examining assets after a disaster to determine the extent of damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

data acquisition

A

The act of obtaining data for later use in a forensic investigation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

data classification policy

A

Policy that defines sensitivity levels and handling proce-

dures for information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

data control language

A

A procedural language used to control access to a database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

data definition language (DDL)

A

A procedural language used to describe the struc- ture of data contained in a database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

data dictionary (DD)

A

A set of data in a database management system that describes the structure of databases stored there.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

data file controls

A

Controls that ensure the security and integrity of data files and their contents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

data flow architecture

A

The part of network architecture that is closely related to ap- plication and data architecture. See also data flow diagram.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

data flow diagram

A

A diagram that illustrates the flow of data within and between systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

data link

A

Layer 2 of the OSI network model. See also OSI network model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

data management utility

A

A type of utility software used to manipulate, list, trans-

form, query, compare, encrypt, decrypt, import, or export data. See also utility software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

data manipulation language (DML)

A

A procedural language used to insert, delete,

and modify data in a database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

data-oriented system development (DOSD)

A

A software development life cycle pro- cess that starts with a design of data and interfaces to databases and then moves on to program design.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

data restore

A

The process of copying data from backup media to a target system for the purpose of restoring lost or damaged data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

database management system (DBMS)

A

A software program that facilitates the storage and retrieval of potentially large amounts of structured or unstructured information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

database

A

A collection of structured or unstructured information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

database server

A

A server that contains and facilitates access to one or more databases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

debugging

A

The activity of searching for the cause of malfunctions in programs or systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

decryption

A

The process of transforming ciphertext into plaintext so that a recipient can read it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

default gateway

A

A station on a network (usually a router) that is used to forward mes- sages to stations on distant networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

default password

A

A password associated with a user account or system account that retains its factory default setting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

deluge

A

A fire sprinkler system that has dry pipes and all of the sprinkler heads are open. When the system is operated (for instance, when an alarm is triggered), water flows into the pipes and out of all of the sprinkler heads. See also fire sprinkler system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

denial of service (DoS)

A

An attack on a computer or network with the intention of causing disruption or malfunction of the target.

24
Q

desktop computer

A

A computer used by an individual end user and located at the user’s workspace.

25
Q

detection risk

A

The risk that an IS auditor will overlook errors or exceptions during an audit.

26
Q

detective control

A

A control that is used to detect events.

27
Q

deterrent control

A

A control that is designed to deter people from performing un-
wanted activities.

28
Q

development

A

The process where software code is created.

29
Q

diameter

A

An authentication standard that is the successor to RADIUS. See also RADIUS.

30
Q

Diffie-Hellman

A

A popular key exchange algorithm. See also key exchange.

31
Q

digital certificate

A

An electronic document that contains an identity that is signed with the public key of a certificate authority (CA).

32
Q

digital envelope

A

A method that uses two layers of encryption. A symmetric key is used to encrypt a message; then a public or private key is used to encrypt the sym- metric key.

33
Q

digital private branch exchange (DPBX)

A

A private branch exchange (PBX) that sup- ports digital technologies such as Voice over IP (VoIP) and Session Initiation Protocol (SIP). See also private branch exchange (PBX), Voice over IP (VoIP), and Session Initiation Protocol (SIP).

34
Q

digital rights management (DRM)

A

Any technology used to control the distribution and use of electronic content.

35
Q

digital signature

A

The result of encrypting the hash of a message with the originator’s private encryption key, used to prove the authenticity and integrity of a message.

36
Q

digital subscriber line (DSL)

A

A common carrier standard for transporting data from the Internet to homes and businesses.

37
Q

directory

A

A structure in a file system that is used to store files and, optionally, other directories. See also file system.

38
Q

directory system (DS)

A

See data dictionary.

39
Q

disaster

A

An unexpected and unplanned event that results in the disruption of busi-
ness operations.

40
Q

disaster declaration criteria

A

The conditions that must be present to declare a disaster, triggering response and recovery operations.

41
Q

disaster declaration procedure

A

Instructions to determine whether to declare a disas- ter and trigger response and recovery operations. See also disaster declaration criteria.

42
Q

disaster recovery and business continuity requirements

A

Formal statements that de- scribe required recoverability and continuity characteristics that a system must support.

43
Q

disaster recovery plan

A

The activities required to restore critical IT systems and other critical assets, whether in alternate or primary locations. See also response document.

44
Q

disaster recovery planning (DRP)

A

Activities related to the assessment, salvage, repair, and restoration of facilities and assets.

45
Q

discovery sampling

A

A sampling technique where at least one exception is sought in a population. See also sampling.

46
Q

discretionary access control (DAC)

A

An access model where the owner of an object is able to determine how and by whom the object may be accessed. The discretion of the owner determines permitted accesses by subjects.

47
Q

disk array

A

A chassis in which several hard disks can be installed and connected to a server. The individual disk drives can be “hot swapped” in the chassis while the array is still operating.

48
Q

disk management system (DMS)

A

An information system that is used to manage disk media, usually for the purpose of performing information backup. See also backup.

49
Q

distributed denial of service (DDoS)

A

A denial of service (DoS) attack that originates from many computers. See also denial of service (DoS).

50
Q

document review

A

A review of some or all disaster recovery and business continuity plans, procedures, and other documentation. Individuals typically review these docu- ments on their own, at their own pace, but within whatever time constraints or dead- lines that may have been established.

51
Q

documentation

A

The inclusive term that describes charters, processes, procedures, standards, requirements, and other written documents.

52
Q

domain name service (DNS)

A

A TCP/IP application layer protocol used to translate domain names (such as www.isecbooks.com) into IP addresses.

53
Q

dropout

A

A momentary loss of power that lasts from a few milliseconds to a few seconds.

54
Q

dry pipe

A

A fire sprinkler system used where ambient temperatures often drop below freezing. In this type of system, pipes are filled with compressed air. When sufficient heat causes one of the sprinkler head fuses to break, a control valve releases water into the piping. See also fire sprinkler system.

55
Q

dual power feeds

A

The use of two physically separate electric power feeds into a facility.

56
Q

dynamic host configuration protocol (DHCP)

A

A TCP/IP application layer protocol used to assign an IP address, subnet mask, default gateway, IP address of DNS servers, and other information to a workstation that has joined the network.

57
Q

dynamic random access memory (DRAM)

A

The most common form of semiconduc- tor memory, where data is stored in capacitors that require periodic refreshing.