Archives: Glossary Terms

Deep web

Those portions of the Internet not indexed by standard search engines. Contrast darknet and dark internet

Read More

Deepfake 

A technique in which images or videos are altered by sophisticated deep-learning artificially intelligent systems to produce convincing but fraudulent content. Deepfakes would have significant use in information operations.

Read More

Denial-of-service attack

A cyber attack that renders a network or other computing resource unavailable to its users. Compare distributed denial-of-service attack.

Read More

Device Trust

The process of verifying that a device is known, secure, and uncompromised before allowing it to connect to a network or access resources.

Read More

DevOps

The set of people, processes, technologies, and cultural norms that integrates software development and IT operations into a system-of-systems. Compare DevSecOps.

Read More

DHS

Department of Homeland Security [USA]

Read More

Diamond model definition

A cyber threat intelligence analysis model that defines relationship pairs among four core components, visualized in the shape of a diamond, of adversary playbook activity across the intrusion kill chain:...

Read More

Dictionary attack

A way of searching for an encryption key or a password by working through a list of likely candidates. Less resource-intensive and usually faster than a brute force attack, but...

Read More

Differential fault analysis attack 

A side-channel attack that induces unexpected environmental conditions—temperature, voltage, current, overclocking, electromagnetic fields, etc.—into a cryptographic implementation in order to reveal its internal state.

Read More

Digital certificate

An attachment to an electronic message used to verify the sender’s identity and to enable to recipient to return an encrypted response. Commonly called simply a “certificate.”

Read More