Glossary D Flashcards

1
Q

DAC (discretionary access control)

A

Access control model where each resource is protected by an Access Control List (ACL) managed by the resource’s owner (or owners).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

data at rest

A

Information that is primarily stored on specific media, rather than moving from one medium to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

data breach

A

When confidential or private data is read, copied, or changed without authorization. Data breach events may have notification and reporting requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

data controller

A

In privacy regulations, the entity that determines why and how personal data is collected, stored, and used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

data custodian

A

An individual who is responsible for managing the system on which data assets are stored, including being responsible for enforcing access control, encryption, and backup/recovery measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

data exfiltration

A

The process by which an attacker takes data that is stored inside of a private network and moves it to an external network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

data exposure

A

A software vulnerability where an attacker is able to circumvent access controls and retrieve confidential or sensitive data from the file system or database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

data governance

A

The overall management of the availability, usability, and security of the information used in an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

data in processing

A

Information that is present in the volatile memory of a host, such as system memory or cache.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

data in transit

A

Information that is being transmitted between two hosts, such as over a private network or the Internet. Also known as data in motion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

data masking

A

A deidentification method where generic or placeholder labels are substituted for real data while preserving the structure or format of the original data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

data minimization

A

In data protection, the principle that only necessary and sufficient personal information can be collected and processed for the stated purpose.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

data owner

A

A senior (executive) role with ultimate responsibility for maintaining the confidentiality, integrity, and availability of an information asset.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

data processor

A

In privacy regulations, an entity trusted with a copy of personal data to perform storage and/or analysis on behalf of the data collector.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

data remnant

A

Leftover information on a storage medium even after basic attempts have been made to remove that data. Also known as remnant.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

data sovereignty

A

In data protection, the principle that countries and states may impose individual requirements on data collected or stored within their jurisdiction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

data steward

A

An individual who is primarily responsible for data quality, ensuring data is labeled and identified with appropriate metadata and that data is collected and stored in a format and with values that comply with applicable laws and regulations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

DCHP snooping

A

A configuration option that enables a switch to inspect DHCP traffic to prevent MAC spoofing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

dd command

A

Linux command that makes a bit-by-bit copy of an input file, typically used for disk imaging.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

DDoS attack (distributed denial of service attack)

A

An attack that uses multiple compromised hosts (a botnet) to overwhelm a service with request or response traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

dead code

A

Code in an application that is redundant because it will never be called within the logic of the program flow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

deauthentication/disassociation

A

Spoofing frames to disconnect a wireless station to try to obtain authentication data to crack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

deception and disruption

A

Cybersecurity resilience tools and techniques to increase the cost of attack planning for the threat actor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

default account

A

Default administrative and guest accounts configured on servers and network devices are possible points of unauthorized access.

25
Q

defense in depth

A

A security strategy that positions the layers of network security as network traffic roadblocks; each layer is intended to slow an attack’s progress, rather than eliminating it outright

26
Q

degaussing

A

The process of rendering a storage drive inoperable and its data unrecoverable by eliminating the drive’s magnetic charge.

27
Q

deidentification

A

In data protection, methods and technologies that remove identifying information from data before it is distributed.

28
Q

deprovisioning

A

The process of removing an application from packages or instances.

29
Q

DER (distinguished encoding rules)

A

The binary format used to structure the information in a digital certificate.

30
Q

DER (distinguished encoding rules)

A

The binary format used to structure the information in a digital certificate.

31
Q

DER (distinguished encoding rules)

A

The binary format used to structure the information in a digital certificate.

31
Q

DER (distinguished encoding rules)

A

The binary format used to structure the information in a digital certificate.

32
Q

detective control

A

A type of security control that acts during an incident to identify or record that it is happening.

33
Q

deterrent control

A

A type of security control that discourages intrusion attempts.

34
Q

DH (Diffie-Hellman)

A

A cryptographic technique that provides secure key exchange

35
Q

DHCP spoofing (Dynamic Host Configuration Protocol spoofing)

A

An attack in which an attacker responds to a client requesting address assignment from a DHCP server.

36
Q

Diamond Model

A

A framework for analyzing cybersecurity incidents.

37
Q

dictionary attack

A

A type of password attack that compares encrypted passwords against a predetermined list of possible password values.

38
Q

differential backup

A

A backup type in which all selected files that have changed since the last full backup are backed up.

39
Q

DiffServ

A

The Differentiated Services Code Point (DSCP) field is used to indicate a priority value for a layer 3 (IP) packet to facilitate Quality of Service (QoS) or Class of Service (CoS) scheduling.

40
Q

digital signature

A

A message digest encrypted using the sender’s private key that is appended to a message to authenticate the sender and prove message integrity.

41
Q

directory service

A

A network service that stores identity information about all the objects in a particular network, including users, groups, servers, client computers, and printers.

42
Q

directory traversal

A

An application attack that allows access to commands, files, and directories that may or may not be connected to the web document root directory.

43
Q

diversity

A

Cybersecurity resilience strategy that increases attack costs by provisioning multiple types of controls, technologies, vendors, and crypto implementations.

44
Q

DLP (data loss/leak prevention)

A

A software solution that detects and prevents sensitive information from being stored on unauthorized systems or transmitted over unauthorized networks.

45
Q

DMZ (demilitarized zone)

A

A segment isolated from the rest of a private network by one or more firewalls that accepts connections from the Internet over designated ports.

46
Q

DNAT (destination network address translation)

A

NAT service where private internal addresses are mapped to one or more public addresses to facilitate Internet connectivity for hosts on a local network via a router.

47
Q

DNS hijacking (Domain Name System hijacking)

A

An attack in which an attacker modifies a computer’s DNS configurations to point to a malicious DNS server.

48
Q

DNS poisoning (Domain Name System poisoning)

A

A network-based attack where an attacker exploits the traditionally open nature of the DNS system to redirect a domain name to an IP address of the attacker’s choosing.

49
Q

DNSSEC (Domain Name System Security Extensions)

A

A security protocol that provides authentication of DNS data and upholds DNS data integrity.

50
Q

domain hijacking

A

A type of hijacking attack where the attacker steals a domain name by altering its registration information and then transferring the domain name to another entity. Sometimes referred to as brandjacking.

51
Q

DoS attack (denial of service attack)

A

Any type of physical, application, or network attack that affects the availability of a managed resource.

52
Q

downgrade attack

A

A cryptographic attack where the attacker exploits the need for backward compatibility to force a computer system to abandon the use of encrypted messages in favor of plaintext messages.

53
Q

DPO (data privacy officer)

A

Institutional data governance role with responsibility for compliant collection and processing of personal and sensitive data.

54
Q

DRP (disaster recovery plan)

A

A documented and resourced plan showing actions and responsibilities to be used in response to critical incidents.

55
Q

DSA (Digital Signature Algorithm)

A

public key encryption standard used for digital signatures that provides authentication and integrity verification for messages.

56
Q

dump file

A

File containing data captured from system memory.

57
Q

dumpster diving (Dumpster)

A

The social engineering technique of discovering things about an organization (or person) based on what it throws away.