Browse CYB - DRH
-
- Cyber Intelligence Act - The Cyber Intelligence Sharing an...
- Cyber Intelligence Sharing and Protection Act o...
- Cyber Intelligence Sharing and Protection Act o...
- Cyber Security Challenge UK - Cyber Security Challeng...
- Cyber Storm - Cyber Storm is the name of a simulated attack exercise ...
- cybercrime - Cybercrime is a term for any illegal activity that uses a...
- cybersecurity - Cybersecurity is the body of technologies, processe...
- Cybersecurity Act - The Cybersecurity Enhancement Act of 2009 (...
- Cybersecurity Enhancement Act of 2009 - The...
- Cybersecurity Enhancement Act of 2009 (S.773)
- cyberwarfare - Cyberwarfare is Internet-based conflict involving pol...
- cyborg insect - The Hybrid Insect Micro-Electro-Mechanical Systems ...
- daisy chain - A daisy chain is an interconnection of computer devices...
- DAM - Database activity monitoring (DAM) systems monitor and record activity ...
- DAT USB drive - A DAT USB drive is a tape drive with digital audio ...
- DAT USB tape drive - A DAT USB drive is a tape drive with digi...
- data availability - Data availability is a term used by some co...
- data breach - A data breach is an incident in which sensitive, protec...
- data breach response plan - A data breach response plan...
- data decryption IC - A data encryption/decryption IC is a spec...
- Data Decryption Integrated Circuits - A data ...
- data encryption IC - A data encryption/decryption IC is a spec...
- Data Encryption Standard - Data Encryption Standard (DES...
- Data Encryption Standard (DES) - Data Encryption S...
- data encryption/decryption IC - A data encryption/d...
- data integrity - Integrity, in terms of data and network security,...
- data key - In cryptography, a data key is a key (a variable value that i...
- Data Privacy - Consumer privacy, also known as customer privacy, inv...
- Data Security Council of India - The Data Security...
- Data Security Council of India (DSCI) - The...
- data source object exploit - A data source object (DSO...
- data splitting - Data splitting is an approach to protecting sensi...
- database activity monitoring - Database activity mon...
- database activity monitoring (DAM) - Database ...
- DDoS - On the Internet, a distributed denial-of-service (DDoS) attack is one...
- DDoS attack - On the Internet, a distributed denial-of-service (DDoS)...
- de-perimeterisation - In network security, deperimeterization...
- de-perimeterization - In network security, deperimeterization...
- decipher - All three terms - decipher, decrypt, and decode - mean to con...
- decode - All three terms - decipher, decrypt, and decode - mean to convert...
- decoding - Encoding is the process of putting a sequence of characters (...
- decrypt - All three terms - decipher, decrypt, and decode - mean to conve...
- decryption - Encryption is the conversion of data into a form, called ...
- defense in depth - Defense in depth is the coordinated use of mu...
- Defense Message System - The Defense Message System (DMS) ...
- Defense Message System (DMS) - The Defense Message S...
- demilitarized zone - In computer networks, a DMZ (demilitarize...
- deniable encryption - Deniable encryption is a type of crypto...
- deperimeterisation - In network security, deperimeterization i...
- deperimeterization - In network security, deperimeterization i...
- depository - A depository is a file or set of files in which data is s...
- DES - Data Encryption Standard (DES) is a widely-used method of data encrypti...
- desktop administration - Desktop management is a comprehen...
- desktop firewall - A personal firewall (sometimes called a deskt...
- desktop security - Desktop management is a comprehensive approac...
- device attack - A device attack is an exploit in which the attacker...
- DHA - A directory harvest attack (DHA) is an attempt to determine the valid e...
- dictionary attack - A dictionary attack is a method of breaking...
- differential power analysis - A differential power an...
- differential power analysis (DPA) - A different...
- differential power analysis (DPA)2 - A differe...
- differential power analysis2 - A differential power ...
- Diffie Hellman key exchange - Diffie-Hellman key exch...
- Diffie-Hellman key exchange - Diffie-Hellman key exch...
- Diffie-Hellman key exchange (exponential key ex...
- digest authentication - Digest authentication is a method o...
- Digital Discovery - Electronic discovery (also called e-discove...
- Digital Evidence - Electronic discovery (also called e-discovery...
- Digital Evidence Discovery - Electronic discovery (als...
- Digital Signature Standard - Digital Signature Standar...
- Digital Signature Standard (DSS) - Digital Signa...
- Digital Silhouettes - Digital Silhouettes is the trademarked ...
- digital watermark - A forensic watermark, also called a digital...
- directory climbing - Directory traversal is a form of HTTP exp...
- directory harvest attack - A directory harvest attack (D...
- directory harvest attack (DHA) - A directory harve...
- directory traversal - Directory traversal is a form of HTTP e...
- disaster recovery - A disaster recovery plan (DRP) -- sometimes...
- disaster recovery plan - A disaster recovery plan (DRP) --...
- disaster recovery plan (DRP) - A disaster recovery p...
- disaster recovery planning - A disaster recovery plan ...
- distributed denial of service attack - On th...
- distributed denial-of-service attack - On th...
- distributed denial-of-service attack (DDoS)
- distributed DoS attack - On the Internet, a distributed de...
- DMS - The Defense Message System (DMS) is a secure X.400-based e-mail system ...
- DMZ - In computer networks, a DMZ (demilitarized zone) is a computer host or ...
- DMZ (demilitarized zone) - In computer networks, a DMZ (...
- DNS cache poisoning - Cache poisoning, also called domain nam...
- DNS poisoning - Cache poisoning, also called domain name system (DN...
- DNS rebinding attack - DNS rebinding is an exploit in which ...
- DNS Security Extensions - DNS Security Extensions (DNSSEC...
- DNS Security Extensions (DNSSEC) - DNS Security ...
- DNSSEC - DNS Security Extensions (DNSSEC) are a set of Internet Engineerin...
- domain name system poisoning - Cache poisoning, also...
- DomainKeys - DomainKeys is an anti-spam software application in develo...
- dongle - A dongle (pronounced DONG-uhl) is a mechanism for ensuring that o...
- DPA - A differential power analysis (DPA) attack is an exploit based on analy...
- DPA2 - A differential power analysis (DPA) attack is an exploit based on ana...