A B C D E F G H I J K L M N O P Q R S T U V W X Z
*

D

Dark web

Web sites that are not indexed by search engines and are only accessible through special networks such as The Onion Router (ToR). Often, the dark web is used by website operators who want to remain anonymous. The ‘dark web’ is a subset of the ‘deep web’.

Data

The basic element that can be processed or produced by a computer to convey information.

Data at rest

Data that resides on media or a system.

Data breach

The unauthorised movement or disclosure of sensitive private or business information.

Data dump

A large amount of data transferred from one system or location to another.

Data in transit

Data that is being communicated across a communication medium.

Data protection

Data protection is the process of safeguarding important information from corruption, compromise or loss.

Data repository

A location in which data is stored, managed and made available to users.

Data security

Measures used to protect the confidentiality, integrity and availability of data.

Data spill

The accidental or deliberate exposure of data into an uncontrolled or unauthorised environment, or to people without a need-to-know.

DBMS

Database management system

DCS

Distributed control system

Declassification

A process whereby requirements for the protection of data are removed and an administrative decision is made to formally authorise its release into the public domain.

Decryption

The decoding of encrypted messages.

Deep web

The part of the internet that is not indexed by search engines. Includes websites that are password-protected and paywalled, as well as encrypted networks, and databases.

Default passwords

Where a device needs a username and/or password to log in, a default password is usually provided that allows the device to be accessed during its initial setup, or after resetting it to factory defaults.

Defence in depth

The implementation of multiple layers of controls in a system to provide redundancy in the event a control fails or a vulnerability is exploited.

Degausser

An electrical device or permanent magnet assembly which generates a magnetic force for the purpose of degaussing magnetic storage devices.

Degaussing

A process for reducing the magnetisation of a magnetic storage device to zero by applying a reverse magnetic force, rendering any previously stored data unreadable.

Demilitarised zone (DMZ)

A small network with one or more servers that is kept separate from the core network, typically on the outside of the firewall or as a separate network protected by the firewall. Demilitarised zones usually provide data to less trusted networks, such as the internet.

Denial of service (DoS)

When legitimate users are denied access to computer services (or resources), usually by overloading the service with requests.

Denial-of-service (DoS) attack

An attempt by malicious actors to prevent legitimate access to online services (typically a website), for example, by consuming the amount of available bandwidth or the processing capacity of the server hosting the online service.

Device access control software

Software that can be used on a system to restrict access to communications ports. Device access control software can block all access to a communications port or allow access based on device types, manufacturer’s identification or even unique device identifiers.

DH

Diffie-Hellman

Dictionary attack

Where attackers use ‘password dictionaries’ or long lists of the most commonly-used passwords and character combinations against a password in order to guess it and break into a system.

Digital certificate

An electronic document used to identify an individual, a system, a server, a company, or some other entity, and to associate a public key with the entity. A digital certificate is issued by a certification authority and is digitally signed by that authority.

Digital footprint

The unique set of traceable activities, actions, contributions and communications that are manifested on the internet or on digital devices.

Digital preservation

The coordinated and ongoing set of processes and activities that ensure long-term, error-free storage of digital information, with means for retrieval and interpretation, for the entire time span the information is required.

Digital signature

A cryptographic process that allows the proof of the source (with non-repudiation) and the verification of the integrity of that data.

Diode

A device that allows data to flow in only one direction.

Disaster recovery

A set of policies, tools and procedures to enable the recovery or continuation of vital technology infrastructure and systems following a natural or human-induced disaster. Disaster recovery focuses on the IT or technology systems supporting critical business functions, as opposed to business continuity.

Distributed-denial-of-service (DDoS) attack

A distributed form of denial-of-service attack.

DMA

Direct Memory Access

Domain

In the internet, a part of a naming hierarchy which consists of a sequence of names (labels) separated by periods (dots).

Note: There are multiple other technical and communications-related definitions for ‘domain’.

Domain Name System (DNS)

The naming system that translates domain names into IP addresses.

Domain-based Message Authentication, Reporting and Conformance (DMARC)

An email authentication protocol designed to give email domain owners the ability to protect their domain from unauthorised use, commonly known as email spoofing.

DomainKeys Identified Mail (DKIM)

A system for authenticating emails that works with modern Message Transfer Agent systems. This resource was created to help fight spam, and uses a digital signature to help email recipients determine whether an email is legitimate.

Downloader

A type of Trojan that downloads other malware onto a computer. The downloader needs to connect to the internet to download the files.

Doxing

Obtaining and publishing private or personally identifiable information about an individual over the internet. Information can be obtained through a range of methods including network compromise, social engineering, data breaches, or research.

Drive-by download attacks

The unintentional download of malicious code to a computer or mobile device that leaves the user open to an attack. The user does not have to click on anything, download or open a malicious email attachment to have their computer or device infected.

Driver

Software that interfaces a hardware device with an operating system.

Dropper

A type of Trojan that installs other malware files onto a computer or device. The other malware is included within the Trojan file, and does not require connection to the internet.

DSA

Digital Signature Algorithm

Dual-stack network device

IT equipment that implements Internet Protocol version 4 and Internet Protocol version 6 protocol stacks.