data administration
- In the NICE Framework, cybersecurity work where a person: Develops and administers databases and/or data management systems that allow for the storage, query, and utilization of data.data aggregation
- The process of gathering and combining data from different sources, so that the combined data reveals new information.data breach
- The unauthorized movement or disclosure of sensitive information to a party, usually outside the organization, that is not authorized to have or see the information.data integrity
- The property that data is complete, intact, and trusted and has not been modified or destroyed in an unauthorized or accidental manner.data loss
- The result of unintentionally or accidentally deleting data, forgetting where it is stored, or exposure to an unauthorized party.data loss prevention
- A set of procedures and mechanisms to stop sensitive data from leaving a security boundary.data mining
- The process or techniques used to analyze large sets of existing information to discover previously unrevealed patterns or correlations.data theft
- The deliberate or intentional act of stealing of information.DataOps
- a collaborative data management practice focused on improving the communication, integration and automation of data flows between data managers and data consumers across an organizationDBaaS (Database as a service)
- a cloud database offering that provides customers with access to a database without having to deploy and manage the underlying infrastructureDDoS (Distributed Denial-of-Service)
- a cybercrime in which the attacker floods a target with internet traffic to prevent users from accessing connected online services and sitesde-perimeterization
- an information security strategy to strengthens an organization's security posture by implementing multiple levels of protection, including inherently secure computer systems and protocols, high-level encryption, and authenticationdeauthentication
- To revoke the authentication of; to cause no longer to be authenticated.decipher
- To convert enciphered text to plain text by means of a cryptographic system.decode
- To convert encoded text to plain text by means of a code.decrypt
- A generic term encompassing decode and decipher.decryption
- The process of transforming ciphertext into its original plaintext.Decryptor
- A tool, or set of tools, used to decrypt encrypted files. Either for recovery or anti-ransomware purposes.deepfake
- synthetic media that have been digitally manipulated to replace one person's likeness convincingly with that of anotherdenial of service
- An attack that prevents or impairs the authorized use of information system resources or services.DevOps
- the combination of cultural philosophies, practices, and tools that increases an organization's ability to deliver applications and servicesDevSecOps (development, security, and operations)
- an approach to culture, automation, and platform design that integrates security as a shared responsibility throughout the entire IT lifecycledigital forensics
- The processes and specialized techniques for gathering, retaining, and analyzing system-related data (digital evidence) for investigative purposes.digital rights management
- A form of access control technology to protect and manage use of digital content or devices in accordance with the content or device provider's intentions.digital signature
- A value computed with a cryptographic process using a private key and then appended to a data object, thereby digitally signing the data.Disinformationists
- One who propagates disinformationdisruption
- An event which causes unplanned interruption in operations or functions for an unacceptable length of time.disruptionware
- a category of malware designed to suspend operations within a target through the compromise of the availability, integrity, and confidentiality of the systems, networks, and datadistributed denial of service
- A denial of service technique that uses numerous systems to perform the attack simultaneously.Distros
- A Linux distribution is an operating system made from a software collection that includes the Linux kernel and often a package management system.DNSTwist
- generates a list of similarly looking domain names for a given domain name and performs DNS queries for them (A, AAAA, NS and MX) which can be used to intercept misdirected traffic.Dorking
- using search techniques to hack into vulnerable sites or search for information that is not available in public search resultsDPIA
- A Data Protection Impact Assessment (DPIA) describes a process designed to identify risks arising out of the processing of personal data and to minimize these risks as far and as early as possibledynamic attack surface
- The automated, on-the-fly changes of an information system's characteristics to thwart actions of an adversary.