vocabularyD Flashcards
D
The 3DES decryption algorithm.
DAC
Discretionary Access Control is an identity-based access control. This means that the user must be authenticated as a specific user, and, based on those privileges, can specify who else can access that object. DAC gives the owner the ability to specify access restrictions.
Data
Specially formatted, binary machine-readable information. Data can exist as numbers, text, bits, or bytes.
Data-link Layer
The layer of the ISO/OSI reference model that handles the actual data packet transfer and physically gives it to the interface. This layer handles physical addressing, error handling, and flow control.
Data Classification
The process of identifying data and putting it into a specific category to determine importance. It identifies the value of data, satisfies the legal or regulatory criteria, and aids in choosing appropriate controls.
Data Hiding
An object-oriented programming technique where the only access to data is through carefully designed methods.
Data Mining
The process of moving through different data repositories and fetching summary data.
Data Warehouse
A repository of information from multiple databases in which the schema or data layout is set up in a very generic way to provide easy access from data piece to data piece without going through a hierarchical structure.
Database
A collection of information organized in rows and columns. The information can be analyzed once it has been organized.
DBMS
Database management system is a class of software made up of different architectures that are dependent upon the required task. The DBMS acts as an interface between the database and the user.
DDoS
Distributed denial of service is many compromised systems attacking a single target causing DoS for other users.
DDoS Attack
Distributed denial of service is many compromised systems attacking a single target causing DoS for other users.
Decentralized Authentication
An authentication type in which administrative access is handled closer to the objects that are being controlled, such as multiple machines with information like a security domain.
DES
Data Encryption Standard is a symmetric cryptographic algorithm standard published in 1977 and adopted by the US Government as standard for all data communications. DES uses 64-bit blocks and a 56-bit key to test key validity.
Dial-up
A technology that uses a public telephone network to connect to a system rather than a dedicated private network.