The glossary

Cybersecurity Glossary

Learn about Cybrary's impact initiatives where we focus on reducing industry-wide gatekeeping, improving security teams, and making a difference throughout the cybersecurity industry and beyond.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Letter for filtering (will be hidden in prod) :

D

Digital Signature

A digital signature is an electronic code that guarantees the authenticity of the sender of information as who he claims to be, and that the information he sent out is first- hand, without any alterations. Digital signatures use the private key information of the sender and cannot be imitated or forged, easily.

Letter for filtering (will be hidden in prod) :

D

Disaster

A sudden event, catastrophe caused by the forces of nature or by a human error that results in serious damages to nature, society, human life, and property. Disaster in a business or commercial sense disables an enterprise from delivering the essential tasks for a specified period; for organizations disasters may result in loss of resources, assets, including data.

Letter for filtering (will be hidden in prod) :

D

Data Owner

A data owner is an executive of an organization entrusted with the administrative control of the data. Such an individual or executive has complete control over data, and he can control or limit the access of such data to people, assign permissions, etc., also he is accountable for such data accuracy and integrity.

Letter for filtering (will be hidden in prod) :

D

Digital Forensice

Digital forensics is the process of procuring, analyzing, interpreting electronic data for the purpose of presenting it as an acceptable evidence in a legal proceedings in a court of law.

Letter for filtering (will be hidden in prod) :

D

Data Transfer Device (DTD)

A data transfer device is a fill device designed to securely store, transport, and transfer electronically both ComSec and TranSec keys. A DTD is designed to be backward compatible with the previous generation of ComSec common fill devices, and programmable to support modern mission systems.

Letter for filtering (will be hidden in prod) :

D

Dual Use Certificate

A dual-use certificate is a certificate that is intended for use with both digital signature and data encryption services.

Letter for filtering (will be hidden in prod) :

D

Decryption

Decryption is the process of decoding cipher text to plain text, so it is readable by the user. It is the opposite of encryption, the process of converting plaintext to cipher text.

Letter for filtering (will be hidden in prod) :

D

Data Retention

Data retention is the process of storing and protecting data for historical reasons and for data back up when needed. Every organization has its own rules governing data retention within the organization.

Letter for filtering (will be hidden in prod) :

D

Data Element

A data element is a basic unit of information that has a unique meaning and subcategories (data items) of distinct value. Gender, race, and geographic location are all examples of data elements.

Letter for filtering (will be hidden in prod) :

D

Data Encryption Standard

A data encryption standard is a form of algorithm to convert plain text to a cipher text. Data encryption standard uses the same key to encrypt and decrypt the data, and hence it is a symmetric key algorithm.