Archives: Glossary Terms

Data exfiltration

Removal of data, especially the unauthorized removal of data, from a system or a network.

Read More

Data leak

The unauthorized transmission of information from an organization to some external recipient. The recipients are normally unauthorized to receive the data leaked to them.

Read More

Data loss prevention

Measures taken to prevent loss or compromise of data. Commonly used to describe software designed to accomplish such prevention.

Read More

Data remanence

Residual representation of data that remains even after attempts have been made to remove or erase the data.

Read More

Data segregation

Division of data into various categories for purposes of dividing or restricting access to different classes of data.

Read More

Data-at-rest

Inactive data stored in any digital form.

Read More

Data-in-motion

Data crossing or temporarily resident in a network.

Read More

Data-in-use 

Active data undergoing analysis, change, or other manipulation.

Read More

Dead-box forensics

A forensic technique where practitioners capture an entire image of a system and analyze the contents offline.

Read More

Decryption

The process of converting encrypted data into something that a human or computer can understand. Taking ciphertext and converting it into plaintext.

Read More