vocabularyD Flashcards
(36 cards)
D
The 3DES decryption algorithm.
DAC
Discretionary Access Control is an identity-based access control. This means that the user must be authenticated as a specific user, and, based on those privileges, can specify who else can access that object. DAC gives the owner the ability to specify access restrictions.
Data
Specially formatted, binary machine-readable information. Data can exist as numbers, text, bits, or bytes.
Data-link Layer
The layer of the ISO/OSI reference model that handles the actual data packet transfer and physically gives it to the interface. This layer handles physical addressing, error handling, and flow control.
Data Classification
The process of identifying data and putting it into a specific category to determine importance. It identifies the value of data, satisfies the legal or regulatory criteria, and aids in choosing appropriate controls.
Data Hiding
An object-oriented programming technique where the only access to data is through carefully designed methods.
Data Mining
The process of moving through different data repositories and fetching summary data.
Data Warehouse
A repository of information from multiple databases in which the schema or data layout is set up in a very generic way to provide easy access from data piece to data piece without going through a hierarchical structure.
Database
A collection of information organized in rows and columns. The information can be analyzed once it has been organized.
DBMS
Database management system is a class of software made up of different architectures that are dependent upon the required task. The DBMS acts as an interface between the database and the user.
DDoS
Distributed denial of service is many compromised systems attacking a single target causing DoS for other users.
DDoS Attack
Distributed denial of service is many compromised systems attacking a single target causing DoS for other users.
Decentralized Authentication
An authentication type in which administrative access is handled closer to the objects that are being controlled, such as multiple machines with information like a security domain.
DES
Data Encryption Standard is a symmetric cryptographic algorithm standard published in 1977 and adopted by the US Government as standard for all data communications. DES uses 64-bit blocks and a 56-bit key to test key validity.
Dial-up
A technology that uses a public telephone network to connect to a system rather than a dedicated private network.
Dictionary Attack
A selective attack where a dictionary of common words, identification credentials, or frequently used user IDs are submitted to the authentication device.
Differential Backup
A backup type similar to an incremental backup, but with a larger given time span every time a backup is cut.
Diffie-Hellman Exchange
A key distribution algorithm that is used to calculate and exchange values that result in each party possessing the same key that may be used for secret key encryption.
Digital Certificate
A copy of a persons public key that is endorsed by a trusted third party.
Digital Signature
A process used to verify the authenticity of a message or user by matching digests.
Distributed Environment
An environment in which application components execute on multiple machines.
DITSCAP
The Defense Information Technology Security Certification and Accreditation Process is a standard for certification and accreditation of computer systems generally pertaining to the US Department of Defense.
DMZ
A demilitarized zone is an area that exists between two networks that do not trust each other.
Domain
A group of computers on a network that share a Security Accounts Manager database and security policies.