Archives: Glossary Terms

DHS

Department of Homeland Security [USA]

Read More

Diamond model definition

A cyber threat intelligence analysis model that defines relationship pairs among four core components, visualized in the shape of a diamond, of adversary playbook activity across the intrusion kill chain:...

Read More

Dictionary attack

A way of searching for an encryption key or a password by working through a list of likely candidates. Less resource-intensive and usually faster than a brute force attack, but...

Read More

Differential fault analysis attack 

A side-channel attack that induces unexpected environmental conditions—temperature, voltage, current, overclocking, electromagnetic fields, etc.—into a cryptographic implementation in order to reveal its internal state.

Read More

Digital certificate

An attachment to an electronic message used to verify the sender’s identity and to enable to recipient to return an encrypted response. Commonly called simply a “certificate.”

Read More

Digital transformation

The use of technology to radically improve the performance or reach of the business.

Read More

Directory traversal attack

A type of attack that exploits a weakness in an application to enable a user to access data at a directory location that should be inaccessible to that user.

Read More

DLP Software

Data Loss Prevention Software. Detects and prevents data loss exfiltration by monitoring endpoints, storage, and network traffic

Read More

DNS amplification

A reflection-based distributed denial-of-service (DDos) attack in which look-up requests to domain name system servers are spoofed to hide the exploit’s source and redirect the response toward the target. DNS...

Read More

DNS cache poisoning

A cyberattack in which data introduced into a Domain Name System (DNS) name server’s cache database cause the name server to return an incorrect IP address, diverting traffic to another...

Read More