The glossary
Cybersecurity Glossary
Learn about Cybrary's impact initiatives where we focus on reducing industry-wide gatekeeping, improving security teams, and making a difference throughout the cybersecurity industry and beyond.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Letter for filtering (will be hidden in prod) :
D
Disaster Recovery Plan
A disaster recovery plan (DRP) or a business continuity plan (BCP) prescribes steps required to carry on the business as usual in the event of a disaster. Disaster recovery plans aim to bring business activities back to normalcy in the shortest possible time; such efforts require an in-depth study and analysis of business critical processes and their continuity needs. Business continuity plans also prescribe preventive measures to avoid disasters in the first place.
Letter for filtering (will be hidden in prod) :
D
Digital Evidence
Digital evidence is electronic information stored or transferred in digital form.
Letter for filtering (will be hidden in prod) :
D
Data Flow Control
Data flow control is another term for information flow control.
Letter for filtering (will be hidden in prod) :
D
Data Leakage
Data leakage is the accidental or intentional transfer and distribution of private and confidential information of an organization without its knowledge or the permission.
Letter for filtering (will be hidden in prod) :
D
Duplicate Digital Evidence
Duplicate digital evidence is a duplicate that is an accurate digital reproduction of all data objects contained on the original physical item and associated media.
Letter for filtering (will be hidden in prod) :
D
Data Custodian
A data custodian is an executive of an organization entrusted with the responsibilities of data administration, as such protecting and safeguarding data is the primary responsibility of a data custodian.
Letter for filtering (will be hidden in prod) :
D
Data Classification
Data classification is a data management process that involves categorizing and organizing data into different classes based on their forms, types, importance, sensitivity, and usage in an organization.
Letter for filtering (will be hidden in prod) :
D
Digital Signature
A digital signature is an electronic code that guarantees the authenticity of the sender of information as who he claims to be, and that the information he sent out is first- hand, without any alterations. Digital signatures use the private key information of the sender and cannot be imitated or forged, easily.
Letter for filtering (will be hidden in prod) :
D
Disaster
A sudden event, catastrophe caused by the forces of nature or by a human error that results in serious damages to nature, society, human life, and property. Disaster in a business or commercial sense disables an enterprise from delivering the essential tasks for a specified period; for organizations disasters may result in loss of resources, assets, including data.
Letter for filtering (will be hidden in prod) :
D
Data Owner
A data owner is an executive of an organization entrusted with the administrative control of the data. Such an individual or executive has complete control over data, and he can control or limit the access of such data to people, assign permissions, etc., also he is accountable for such data accuracy and integrity.