The glossary

Cybersecurity Glossary

Learn about Cybrary's impact initiatives where we focus on reducing industry-wide gatekeeping, improving security teams, and making a difference throughout the cybersecurity industry and beyond.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Letter for filtering (will be hidden in prod) :

D

Defense in Depth

Defense in depth is the process of creating multiple layers of security to protect electronics and information resources against attackers. Also called the castle approach, it is based on the principle that in the event of an attack, even if one layer fails to protect the information resource other layers can offer defense against the attack.

Letter for filtering (will be hidden in prod) :

D

Decryption Key

A decryption key is a piece of code that is required to decipher or convert encrypted text or information into plain text or information.

Letter for filtering (will be hidden in prod) :

D

Data Asset

A data asset is any entity that is composed of data; for example, a database is an example of a data asset. A system or application output file, database, document, or web page are also considered data assets. Data assets can also be a service that may be provided to access data from an application.

Letter for filtering (will be hidden in prod) :

D

Distributed Denial of Service (DDoS)

A distributed denial of service is a denial of service technique that uses numerous hosts to perform the attack.

Letter for filtering (will be hidden in prod) :

D

Denial of Service Attack

A denial of service attack is an attack on a network or a machine to make it unavailable to other or important users. Single users flood the network or server with the same requests keeping it busy, occupied, and unavailable for other users.

Letter for filtering (will be hidden in prod) :

D

Dynamic Ports

Dynamic ports are otherwise known as private ports, these ports ranging from port number 49,152 to 65, 535 do not need any registration; these ports help any computer application communicate with any other application or program that uses transmission control protocol (TCP) or the user datagram protocol (UDP).

Letter for filtering (will be hidden in prod) :

D

Demilitarized Zone (DMZ)

A demilitarized zone is a firewall setting that separates the LAN of an organization from the outside world or the internet. Demilitarized zone (DMZ) makes certain resources, servers, etc., available to everyone, yet keeping the internal LAN access private, safe and secure offers access only to authorized personnel.

Letter for filtering (will be hidden in prod) :

D

Disk Imaging

Disk imaging is the process of generating a bit-for-bit copy of the original media, including free space and slack space.

Letter for filtering (will be hidden in prod) :

D

Discretionary Access Control

Discretionary access control is a security measure, by which the owner can restrict the access of the resources such as files, devices, directories to specific subjects or users or user groups based on their identity. It is the discretion of the owner to grant permission or restrict users from accessing the resources completely or partially.

Letter for filtering (will be hidden in prod) :

D

Due Care

Due care is the degree of care a rational person would exercise in similar situations as the one at hand. Alternatively known as ordinary care or reasonable care is a test of a person’s preparedness to act, be responsible or neglectful of responsibility.