The glossary

Cybersecurity Glossary

Learn about Cybrary's impact initiatives where we focus on reducing industry-wide gatekeeping, improving security teams, and making a difference throughout the cybersecurity industry and beyond.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Letter for filtering (will be hidden in prod) :

D

Disruption

A disruption is an unplanned event that causes the general system or major application to be inoperable for an unacceptable length of time (e.g., minor or extended power outage, extended unavailable network, or equipment or facility damage or destruction).

Letter for filtering (will be hidden in prod) :

D

Database

A database is a systematic collection and organization of data by individuals or organizations so that it can be easily stored, retrieved, and edited for future use.

Letter for filtering (will be hidden in prod) :

D

Digital Certificate

A digital certificate is a piece of information that guarantees that the sender is verified, genuine and that he is the person who he claims to be. Otherwise known as public key information, digital certificates issued by certificate authority, helps exchange information over the internet in a safe and secure manner.

Letter for filtering (will be hidden in prod) :

D

Disaster Recovery Plan

A disaster recovery plan (DRP) or a business continuity plan (BCP) prescribes steps required to carry on the business as usual in the event of a disaster. Disaster recovery plans aim to bring business activities back to normalcy in the shortest possible time; such efforts require an in-depth study and analysis of business critical processes and their continuity needs. Business continuity plans also prescribe preventive measures to avoid disasters in the first place.

Letter for filtering (will be hidden in prod) :

D

Digital Evidence

Digital evidence is electronic information stored or transferred in digital form.

Letter for filtering (will be hidden in prod) :

D

Data Flow Control

Data flow control is another term for information flow control.

Letter for filtering (will be hidden in prod) :

D

Data Leakage

Data leakage is the accidental or intentional transfer and distribution of private and confidential information of an organization without its knowledge or the permission.

Letter for filtering (will be hidden in prod) :

D

Duplicate Digital Evidence

Duplicate digital evidence is a duplicate that is an accurate digital reproduction of all data objects contained on the original physical item and associated media.

Letter for filtering (will be hidden in prod) :

D

Data Custodian

A data custodian is an executive of an organization entrusted with the responsibilities of data administration, as such protecting and safeguarding data is the primary responsibility of a data custodian.

Letter for filtering (will be hidden in prod) :

D

Data Classification

Data classification is a data management process that involves categorizing and organizing data into different classes based on their forms, types, importance, sensitivity, and usage in an organization.