Archives: Glossary Terms

Digital transformation

The use of technology to radically improve the performance or reach of the business.

Read More

Directory traversal attack

A type of attack that exploits a weakness in an application to enable a user to access data at a directory location that should be inaccessible to that user.

Read More

DLP Software

Data Loss Prevention Software. Detects and prevents data loss exfiltration by monitoring endpoints, storage, and network traffic

Read More

DNS amplification

A reflection-based distributed denial-of-service (DDos) attack in which look-up requests to domain name system servers are spoofed to hide the exploit’s source and redirect the response toward the target. DNS...

Read More

DNS cache poisoning

A cyberattack in which data introduced into a Domain Name System (DNS) name server’s cache database cause the name server to return an incorrect IP address, diverting traffic to another...

Read More

DNS hijacking 

Subverting the resolution of Domain Name System (DNS) queries, typically by overriding a computer’s TCP/IP configuration to point at a rogue DNS server under the attacker’s control, or by modifying...

Read More

DNS redirection

Subverting the resolution of Domain Name System (DNS) queries, typically by overriding a computer’s TCP/IP configuration to point at a rogue DNS server under the attacker’s control, or by modifying...

Read More

Domain fluxing

A technique for keeping a malicious botnet in operation by constantly changing the botnet command-and-control server’s domain name using a domain-generation algorithm. Domain fluxing makes it difficult for network administrators...

Read More

Domain spoofing

An attack technique in which the attacker impersonates a trusted domain to lure a victim. Compare phishing, homographic attack.

Read More

Dox

To publish information, usually sensitive or discreditable, about and belonging to a person or organization, that has been obtained from a non-cooperating system. Sometimes spelled “doxx.”

Read More