-
-
- DAT USB drive
- A DAT USB drive is a tape drive with digital audio ...
- DAT USB tape drive
- A DAT USB drive is a tape drive with digi...
- data availability
- Data availability is a term used by some co...
- Data Encryption Standard
- Data Encryption Standard (DES...
- Data Encryption Standard (DES)
- Data Encryption S...
- data integrity
- Integrity, in terms of data and network security,...
- data key
- In cryptography, a data key is a key (a variable value that i...
- data protection management
- Data protection managemen...
- data protection management (DPM)
- Data protecti...
- data recovery agent
- A data recovery agent (DRA) is a Micros...
- data recovery agent (DRA)
- A data recovery agent (DRA)...
- Data Security Council of India
- The Data Security...
- Data Security Council of India (DSCI)
- The...
- data source object exploit
- A data source object (DSO...
- data splitting
- Data splitting is an approach to protecting sensi...
- data transfer throttling
- Throttled data transfer, also...
- database activity monitoring
- Database activity mon...
- database activity monitoring (DAM)
- Database ...
- DDoS
- On the Internet, a distributed denial-of-service (DDoS) attack is one...
- DDoS attack
- On the Internet, a distributed denial-of-service (DDoS)...
- de-perimeterisation
- In network security, deperimeterization...
- de-perimeterization
- In network security, deperimeterization...
- decipher
- All three terms - decipher, decrypt, and decode - mean to con...
- decode
- All three terms - decipher, decrypt, and decode - mean to convert...
- decoding
- Encoding is the process of putting a sequence of characters (...
- decrypt
- All three terms - decipher, decrypt, and decode - mean to conve...
- decryption
- Encryption is the conversion of data into a form, called ...
- deep packet inspection
- Deep packet inspection (DPI) is a...
- deep packet inspection (DPI)
- Deep packet inspectio...
- Defense Message System
- The Defense Message System (DMS) ...
- Defense Message System (DMS)
- The Defense Message S...
- demilitarized zone
- In computer networks, a DMZ (demilitarize...
- deniable encryption
- Deniable encryption is a type of crypto...
- denial of service
- A denial of service (DoS) attack is an inci...
- denial of service (DoS)
- A denial of service (DoS) attac...
- denial of service attack
- A denial of service (DoS) att...
- denial-of-service
- A denial of service (DoS) attack is an inci...
- denial-of-service attack
- A denial of service (DoS) att...
- deperimeterisation
- In network security, deperimeterization i...
- deperimeterization
- In network security, deperimeterization i...
- depository
- A depository is a file or set of files in which data is s...
- DES
- Data Encryption Standard (DES) is a widely-used method of data encrypti...
- desktop administration
- Desktop management is a comprehen...
- desktop firewall
- A personal firewall (sometimes called a deskt...
- desktop security
- Desktop management is a comprehensive approac...
- device attack
- A device attack is an exploit in which the attacker...
- DHA
- A directory harvest attack (DHA) is an attempt to determine the valid e...
- dictionary attack
- A dictionary attack is a method of breaking...
- differential power analysis (DPA)2
- A differe...
- differential power analysis2
- A differential power ...
- Diffie Hellman key exchange
- Diffie-Hellman key exch...
- Diffie-Hellman key exchange
- Diffie-Hellman key exch...
- Diffie-Hellman key exchange (exponential key ex...
- digital certificate
- A digital certificate is an electronic ...
- digital signature
- A digital signature (not to be confused wit...
- digital signature (electronic signature)
- Digital Signature Standard
- Digital Signature Standar...
- Digital Signature Standard (DSS)
- Digital Signa...
- Digital Silhouettes
- Digital Silhouettes is the trademarked ...
- DirectAccess
- DirectAccess is a feature introduced in Windows Serve...
- directory climbing
- Directory traversal is a form of HTTP exp...
- directory harvest attack
- A directory harvest attack (D...
- directory harvest attack (DHA)
- A directory harve...
- directory traversal
- Directory traversal is a form of HTTP e...
- disaster recovery
- A disaster recovery plan (DRP) -- sometimes...
- disaster recovery plan
- A disaster recovery plan (DRP) --...
- disaster recovery plan (DRP)
- A disaster recovery p...
- disaster recovery planning
- A disaster recovery plan ...
- discoverability
- Discoverability is the capacity of something to...
- disruption tolerant network
- A disruption-tolerant n...
- disruption-tolerant network
- A disruption-tolerant n...
- disruption-tolerant network (DTN)
- A disruptio...
- distributed denial of service attack
- On th...
- distributed denial-of-service attack
- On th...
- distributed denial-of-service attack (DDoS)
- distributed DoS attack
- On the Internet, a distributed de...
- DMS
- The Defense Message System (DMS) is a secure X.400-based e-mail system ...
- DMZ
- In computer networks, a DMZ (demilitarized zone) is a computer host or ...
- DMZ (demilitarized zone)
- In computer networks, a DMZ (...
- DNS cache poisoning
- Cache poisoning, also called domain nam...
- DNS poisoning
- Cache poisoning, also called domain name system (DN...
- DNS rebinding attack
- DNS rebinding is an exploit in which ...
- DNS redirection
- DNS redirection is the controversial practice o...
- DNS Security Extensions
- DNS Security Extensions (DNSSEC...
- DNS Security Extensions (DNSSEC)
- DNS Security ...
- DNSSEC
- DNS Security Extensions (DNSSEC) are a set of Internet Engineerin...
- domain name system poisoning
- Cache poisoning, also...
- domain rotation
- Domain rotation is a technique use by malware d...
- DomainKeys
- DomainKeys is an anti-spam software application in develo...
- dongle
- A dongle (pronounced DONG-uhl) is a mechanism for ensuring that o...
- DoS
- A denial of service (DoS) attack is an incident in which a user or orga...
- DPA2
- A differential power analysis (DPA) attack is an exploit based on ana...
- DPI
- Deep packet inspection (DPI) is an advanced method of packet filtering ...
- DPM
- Data protection management (DPM) is the administration of backup proces...
- DRA
- A data recovery agent (DRA) is a Microsoft Windows user who has been gr...
- drive-by pharming
- Drive-by pharming is a vulnerability exploi...
- drive-by spamming
- Drive-by spamming is a variation of drive-b...
- DRP
- A disaster recovery plan (DRP) -- sometimes referred to as a business c...
- DSCI
- The Data Security Council of India (DSCI) is a not-for-profit organiz...
- DSO exploit
- A data source object (DSO) exploit is a form of spyware...
- DSO exploit (data source object exploit)