Glossary D Flashcards

(58 cards)

1
Q

DAC (discretionary access control)

A

Access control model where each resource is protected by an Access Control List (ACL) managed by the resource’s owner (or owners).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

data at rest

A

Information that is primarily stored on specific media, rather than moving from one medium to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

data breach

A

When confidential or private data is read, copied, or changed without authorization. Data breach events may have notification and reporting requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

data controller

A

In privacy regulations, the entity that determines why and how personal data is collected, stored, and used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

data custodian

A

An individual who is responsible for managing the system on which data assets are stored, including being responsible for enforcing access control, encryption, and backup/recovery measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

data exfiltration

A

The process by which an attacker takes data that is stored inside of a private network and moves it to an external network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

data exposure

A

A software vulnerability where an attacker is able to circumvent access controls and retrieve confidential or sensitive data from the file system or database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

data governance

A

The overall management of the availability, usability, and security of the information used in an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

data in processing

A

Information that is present in the volatile memory of a host, such as system memory or cache.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

data in transit

A

Information that is being transmitted between two hosts, such as over a private network or the Internet. Also known as data in motion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

data masking

A

A deidentification method where generic or placeholder labels are substituted for real data while preserving the structure or format of the original data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

data minimization

A

In data protection, the principle that only necessary and sufficient personal information can be collected and processed for the stated purpose.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

data owner

A

A senior (executive) role with ultimate responsibility for maintaining the confidentiality, integrity, and availability of an information asset.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

data processor

A

In privacy regulations, an entity trusted with a copy of personal data to perform storage and/or analysis on behalf of the data collector.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

data remnant

A

Leftover information on a storage medium even after basic attempts have been made to remove that data. Also known as remnant.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

data sovereignty

A

In data protection, the principle that countries and states may impose individual requirements on data collected or stored within their jurisdiction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

data steward

A

An individual who is primarily responsible for data quality, ensuring data is labeled and identified with appropriate metadata and that data is collected and stored in a format and with values that comply with applicable laws and regulations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

DCHP snooping

A

A configuration option that enables a switch to inspect DHCP traffic to prevent MAC spoofing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

dd command

A

Linux command that makes a bit-by-bit copy of an input file, typically used for disk imaging.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

DDoS attack (distributed denial of service attack)

A

An attack that uses multiple compromised hosts (a botnet) to overwhelm a service with request or response traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

dead code

A

Code in an application that is redundant because it will never be called within the logic of the program flow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

deauthentication/disassociation

A

Spoofing frames to disconnect a wireless station to try to obtain authentication data to crack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

deception and disruption

A

Cybersecurity resilience tools and techniques to increase the cost of attack planning for the threat actor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

default account

A

Default administrative and guest accounts configured on servers and network devices are possible points of unauthorized access.

25
defense in depth
A security strategy that positions the layers of network security as network traffic roadblocks; each layer is intended to slow an attack's progress, rather than eliminating it outright
26
degaussing
The process of rendering a storage drive inoperable and its data unrecoverable by eliminating the drive's magnetic charge.
27
deidentification
In data protection, methods and technologies that remove identifying information from data before it is distributed.
28
deprovisioning
The process of removing an application from packages or instances.
29
DER (distinguished encoding rules)
The binary format used to structure the information in a digital certificate.
30
DER (distinguished encoding rules)
The binary format used to structure the information in a digital certificate.
31
DER (distinguished encoding rules)
The binary format used to structure the information in a digital certificate.
31
DER (distinguished encoding rules)
The binary format used to structure the information in a digital certificate.
32
detective control
A type of security control that acts during an incident to identify or record that it is happening.
33
deterrent control
A type of security control that discourages intrusion attempts.
34
DH (Diffie-Hellman)
A cryptographic technique that provides secure key exchange
35
DHCP spoofing (Dynamic Host Configuration Protocol spoofing)
An attack in which an attacker responds to a client requesting address assignment from a DHCP server.
36
Diamond Model
A framework for analyzing cybersecurity incidents.
37
dictionary attack
A type of password attack that compares encrypted passwords against a predetermined list of possible password values.
38
differential backup
A backup type in which all selected files that have changed since the last full backup are backed up.
39
DiffServ
The Differentiated Services Code Point (DSCP) field is used to indicate a priority value for a layer 3 (IP) packet to facilitate Quality of Service (QoS) or Class of Service (CoS) scheduling.
40
digital signature
A message digest encrypted using the sender's private key that is appended to a message to authenticate the sender and prove message integrity.
41
directory service
A network service that stores identity information about all the objects in a particular network, including users, groups, servers, client computers, and printers.
42
directory traversal
An application attack that allows access to commands, files, and directories that may or may not be connected to the web document root directory.
43
diversity
Cybersecurity resilience strategy that increases attack costs by provisioning multiple types of controls, technologies, vendors, and crypto implementations.
44
DLP (data loss/leak prevention)
A software solution that detects and prevents sensitive information from being stored on unauthorized systems or transmitted over unauthorized networks.
45
DMZ (demilitarized zone)
A segment isolated from the rest of a private network by one or more firewalls that accepts connections from the Internet over designated ports.
46
DNAT (destination network address translation)
NAT service where private internal addresses are mapped to one or more public addresses to facilitate Internet connectivity for hosts on a local network via a router.
47
DNS hijacking (Domain Name System hijacking)
An attack in which an attacker modifies a computer's DNS configurations to point to a malicious DNS server.
48
DNS poisoning (Domain Name System poisoning)
A network-based attack where an attacker exploits the traditionally open nature of the DNS system to redirect a domain name to an IP address of the attacker's choosing.
49
DNSSEC (Domain Name System Security Extensions)
A security protocol that provides authentication of DNS data and upholds DNS data integrity.
50
domain hijacking
A type of hijacking attack where the attacker steals a domain name by altering its registration information and then transferring the domain name to another entity. Sometimes referred to as brandjacking.
51
DoS attack (denial of service attack)
Any type of physical, application, or network attack that affects the availability of a managed resource.
52
downgrade attack
A cryptographic attack where the attacker exploits the need for backward compatibility to force a computer system to abandon the use of encrypted messages in favor of plaintext messages.
53
DPO (data privacy officer)
Institutional data governance role with responsibility for compliant collection and processing of personal and sensitive data.
54
DRP (disaster recovery plan)
A documented and resourced plan showing actions and responsibilities to be used in response to critical incidents. 
55
DSA (Digital Signature Algorithm)
public key encryption standard used for digital signatures that provides authentication and integrity verification for messages.
56
dump file
File containing data captured from system memory.
57
dumpster diving (Dumpster)
The social engineering technique of discovering things about an organization (or person) based on what it throws away.