AWS Amazon Web Services Network Partner: Pioneering Network-Centric AI-ML-Quant-Cyber-Crypto-Quantum Cloud Computing AIMLExchange: We Create the Digital Future™: Beyond Artificial Intelligent Systems: Self-Adaptive Complex Systems Pioneer  BRINT: From Future of Finance™ to Future of FinTech™  C4I-Cyber: Beyond AI C4I-Cyber and Quantum Supremacy: Adversarial and Counter-Adversarial C4I-Cyber-Crypto Command and Control Premium Domains For Sale: FundRaiser

We Create the Digital Future™...And You Can Too. It's As Easy as A, B, C. Come. Join Us. Build the Future.
AWS Amazon Web Services  MIT Computer Science & AI Lab  Princeton University  Goldman Sachs  JP Morgan Asset Management

Silicon Valley-Wall Street-Pentagon-Global Digital Pioneer: Below: Historical Archive: World's Top Digital Site.
IT Security and Information Assurance Glossary of 4,000 Terms: A, B, C, D, E, F, G, H, I, J, K, L, M, N, O, P, Q, R, S, T, U, V, W, X, Y, Z
*
@brint.com
Interactive Research Portals-Glossary of 4,000 IT Security, Information Assurance, Controls, Compliance Terms: D
"Best web site for keeping up with hi-tech industry developments..." - InfoWorld
*

Research Analyst Wizard: Click on a term to create most-updated research microsite on that topic.


D
DAC: Discretionary Access Control · DACL: Discretionary access control list · Daemon · daisy chain · Damage Evaluation · Dashboard · DAT USB drive · DAT USB tape drive · Data / Information · Data Aggregation · Data Analysis · data availability · Data Capture · Data Classification · Data Classification Scheme · Data Communications · Data Custodian · data decryption · data decryption IC · Data Decryption Integrated Circuits · Data Dictionary · Data Diddling · data encryption · data encryption IC · Data Encryption Standard (DES) · Data Flow · Data Flow Control · data integrity · data key · Data Leakage · Data Mart · data masking · Data Mining · Data Normalization · Data Origin Authentication · Data Owner · Data Privacy · Data Protection Act 1984/1998 · Data Retention · Data Safe · Data Security · data splitting · Data Structure · Data Transfer Device · Data Warehouse · Data Warehousing · Data Oriented Systems Development · Database · Database Administrator (DBA) · Database Management System (DBMS) · Database Replication · Database Specifications · Datagram · Datascope · DCS 1000 · DDoS · DDoS attack · DDoS: Distributed Denial of Service Attack · de perimeterisation · de perimeterization · DEA: Data Encryption Algorithm · Dead Tree Edition · Debug · Decapsulation · Decentralization · Decertification · decipher · Deciplegic · Decision Support Systems (DSS) · decode · decoding · decrypt · decryption · Decryption Key · DED · Dedicated Mode · Deep Packet Inspection · Defacement · Defamation Act 1997 (UK) · Default · Default Classification · Default Deny Policy · Default ID or Default Password · Default Password · Defcon · Defense Acquisition Regulatory Council (DARC) · defense in depth · Defense In Depth · Defense Message System · Defense In Depth · Degauss · Degaussing · Degaussing Media · DEK: Data Encryption Key · Delegated Development Program · demilitarized zone · Demodulation · Demographic · deniable encryption · Denial of Service · Denial of Service (DoS) attack · Denial of Service Attack (DOS) · Deny · deperimeterisation · deperimeterization · depository · Depreciation · DERA: Defence Evaluation and Research Agency · DES · DES / AES · DES: Data Encryption Standard · Descriptive Top Level Specification · Designated Approval Authority · Desktop · desktop administration · desktop management · desktop security · DESX or DES X · Detailed IS Controls · Detective Controls · Development Library · Development Machine · Device · DH: Diffie Hellman · DHA · DHA (Directory Harvest Attack) · DHA: Directory Harvest Attack · DHCP spoofing · DHCP Starvation · DHTML · Dial Back · Dial back · Dial in Access Controls · Dial up · Dial up connection · dictionary attack · Differential Cryptanalysis · Diffie Hellman · Diffie Hellman Key Agreement Standard · Diffie Hellman key exchange · Diffing · digest authentication · DigiCrime · Digital · Digital Certificate · Digital Certification · Digital Code Signing · Digital Discovery · Digital Envelope · Digital Evidence · Digital Evidence Discovery · Digital Fingerprint · Digital forensics · Digital Signature · Digital Signature Algorithm · Digital Signature Standard · Digital Silhouettes · Digital Versatile Disk DVD · digital watermark · Digital watermarking · Direct Reporting Engagement · Direct Shipment · Directive 95/46/EC · directory climbing · Directory Harvest Attack (DHA) · directory traversal · DISA: Defense Information Systems Agency · Disassembler · Disassembly · Disaster · Disaster Declaration · Disaster Notification Fee · disaster recovery · disaster recovery plan · Disaster Recovery Plan Desk Checking · Disaster Recovery Plan DRP · Disaster Recovery Plan Walk through · disaster recovery planning · Disaster Tolerance · Disclosure Controls and Procedures · Discount Rate · Discovery Sampling · Discretionary Access Control · Discretionary Access Control (DAC) · Disk Mirroring · Disk sector · Diskless Workstations · disposable email · Disruption · Distinguished Name · Distributed Data Processing Network · distributed denial of service attack · Distributed Denial of Service Attack (DDoS) · distributed DoS attack · Distributed Processing · Distributed Scans · DITSCAP: Department of Defense Information Technology Security · Diverse Routing · DLL: Dynamic Link Library · DMCA: Digital Millennium Copyright Act · DMS · DMS: Defense Message System · DMZ · DMZ: DeMilitarized Zone · DNS · DNS (Domain Name System) server · DNS Attack · DNS cache poisoning · DNS cache poisoning Pharming · DNS poisoning · DNS Poisoning or DNS Cache Poisoning · DNS Spoofing · DNS: Domain Name System · DOI: Domain of Interpretation · Domain · Domain Hijacking · Domain name · Domain Name Server (DNS) · Domain Name System (DNS) · Domain Name System (DNS) Poisoning · Domain Name System Block Lists (DNSBL) · domain name system poisoning · DomainKeys · dongle · DoS (Denial of Service) attack · DoS Attack: Denial of Service Attack · DOS prompt · DoS: Denial of Service · Dot bug vulnerability · Double loop Step · Down · Download · download · Downloading · Downtime · Downtime Report · DPAPI: Data Protection API · DPI · Drill Down · Drive by Hacking · drive by pharming · drive by spamming · Driver · Driver (Value and Risk) · DRM: Digital Rights Management · Drop Accountability · DRP · DRP: Disaster Recovery Plan · Dry pipe Fire Extinguisher System · DSA: Digital Signature Algorithm · DSL · dsl modem · DSniff · DSO exploit · DSO Exploit: Data Source Object Exploit · DSS · DSS: Digital Signature Standard · Dual Control · Dual International Mobile Subscriber Identity · Dual Homed Gateway · Due Care · due diligence · Due Professional Care · dumb · dumb network · Dumb Terminal · Dumb Terminal · dump site · DumpSec · Dumpster Diving · Duplex Routing · Duress Feature · Dynamic Analysis · Dynamic Host Configuration Protocol (DHCP) · Dynamic Key Derivation · dynamic packet filter · Dynamic proxy · Dynamic Routing Protocol

Research Portals and Glossary of 4,000 IT Security and Information Assurance Terms
A, B, C, D, E, F, G, H, I, J, K, L, M, N, O, P, Q, R, S, T, U, V, W, X, Y, Z


Top of Page

AIMLExchange

'Your Survival Network for The Brave New World Of Business'tm

About AIMLExchange | News About AIMLExchange

Terms of Use | Privacy Notice | © Copyright 1994-2019, Global Risk Management Network, New York, USA