Cybersecurity Terminology

ResourcesTerms & Definitions

data administration
- In the NICE Framework, cybersecurity work where a person: Develops and administers databases and/or data management systems that allow for the storage, query, and utilization of data.
data aggregation
- The process of gathering and combining data from different sources, so that the combined data reveals new information.
data breach
- The unauthorized movement or disclosure of sensitive information to a party, usually outside the organization, that is not authorized to have or see the information.
data integrity
- The property that data is complete, intact, and trusted and has not been modified or destroyed in an unauthorized or accidental manner.
data loss
- The result of unintentionally or accidentally deleting data, forgetting where it is stored, or exposure to an unauthorized party.
data loss prevention
- A set of procedures and mechanisms to stop sensitive data from leaving a security boundary.
data mining
- The process or techniques used to analyze large sets of existing information to discover previously unrevealed patterns or correlations.
data theft
- The deliberate or intentional act of stealing of information.
DataOps
- a collaborative data management practice focused on improving the communication, integration and automation of data flows between data managers and data consumers across an organization
DBaaS (Database as a service)
- a cloud database offering that provides customers with access to a database without having to deploy and manage the underlying infrastructure
DDoS (Distributed Denial-of-Service)
- a cybercrime in which the attacker floods a target with internet traffic to prevent users from accessing connected online services and sites
de-perimeterization
- an information security strategy to strengthens an organization's security posture by implementing multiple levels of protection, including inherently secure computer systems and protocols, high-level encryption, and authentication
deauthentication
- To revoke the authentication of; to cause no longer to be authenticated.
decipher
- To convert enciphered text to plain text by means of a cryptographic system.
decode
- To convert encoded text to plain text by means of a code.
decrypt
- A generic term encompassing decode and decipher.
decryption
- The process of transforming ciphertext into its original plaintext.
Decryptor
- A tool, or set of tools, used to decrypt encrypted files. Either for recovery or anti-ransomware purposes.
deepfake
- synthetic media that have been digitally manipulated to replace one person's likeness convincingly with that of another
denial of service
- An attack that prevents or impairs the authorized use of information system resources or services.
DevOps
- the combination of cultural philosophies, practices, and tools that increases an organization's ability to deliver applications and services
DevSecOps (development, security, and operations)
- an approach to culture, automation, and platform design that integrates security as a shared responsibility throughout the entire IT lifecycle
digital forensics
- The processes and specialized techniques for gathering, retaining, and analyzing system-related data (digital evidence) for investigative purposes.
digital rights management
- A form of access control technology to protect and manage use of digital content or devices in accordance with the content or device provider's intentions.
digital signature
- A value computed with a cryptographic process using a private key and then appended to a data object, thereby digitally signing the data.
Disinformationists
- One who propagates disinformation
disruption
- An event which causes unplanned interruption in operations or functions for an unacceptable length of time.
disruptionware
- a category of malware designed to suspend operations within a target through the compromise of the availability, integrity, and confidentiality of the systems, networks, and data
distributed denial of service
- A denial of service technique that uses numerous systems to perform the attack simultaneously.
Distros
- A Linux distribution is an operating system made from a software collection that includes the Linux kernel and often a package management system.
DNSTwist
- generates a list of similarly looking domain names for a given domain name and performs DNS queries for them (A, AAAA, NS and MX) which can be used to intercept misdirected traffic.
Dorking
- using search techniques to hack into vulnerable sites or search for information that is not available in public search results
DPIA
- A Data Protection Impact Assessment (DPIA) describes a process designed to identify risks arising out of the processing of personal data and to minimize these risks as far and as early as possible
dynamic attack surface
- The automated, on-the-fly changes of an information system's characteristics to thwart actions of an adversary.
microsoft-logo
ibm-logo
dell-logo
hp-logo
sentinel-logo
vmware-logo
Skip to content