Archives: Glossary Terms

Data-in-motion

Data crossing or temporarily resident in a network.

Read More

Data-in-use 

Active data undergoing analysis, change, or other manipulation.

Read More

Data-in-use

Active data undergoing analysis, change, or other manipulation.

Read More

Dead-box forensics

A forensic technique where practitioners capture an entire image of a system and analyze the contents offline.

Read More

Decryption

The process of converting encrypted data into something that a human or computer can understand. Taking ciphertext and converting it into plaintext.

Read More

Deep web

Those portions of the Internet not indexed by standard search engines. Contrast darknet and dark internet

Read More

Deepfake 

A technique in which images or videos are altered by sophisticated deep-learning artificially intelligent systems to produce convincing but fraudulent content. Deepfakes would have significant use in information operations.

Read More

Denial-of-service attack

A cyber attack that renders a network or other computing resource unavailable to its users. Compare distributed denial-of-service attack.

Read More

Device Trust

The process of verifying that a device is known, secure, and uncompromised before allowing it to connect to a network or access resources.

Read More

DevOps

The set of people, processes, technologies, and cultural norms that integrates software development and IT operations into a system-of-systems. Compare DevSecOps.

Read More