The glossary
Cybersecurity Glossary
Learn about Cybrary's impact initiatives where we focus on reducing industry-wide gatekeeping, improving security teams, and making a difference throughout the cybersecurity industry and beyond.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Letter for filtering (will be hidden in prod) :
D
Digital Forensice
Digital forensics is the process of procuring, analyzing, interpreting electronic data for the purpose of presenting it as an acceptable evidence in a legal proceedings in a court of law.
Letter for filtering (will be hidden in prod) :
D
Data Transfer Device (DTD)
A data transfer device is a fill device designed to securely store, transport, and transfer electronically both ComSec and TranSec keys. A DTD is designed to be backward compatible with the previous generation of ComSec common fill devices, and programmable to support modern mission systems.
Letter for filtering (will be hidden in prod) :
D
Dual Use Certificate
A dual-use certificate is a certificate that is intended for use with both digital signature and data encryption services.
Letter for filtering (will be hidden in prod) :
D
Decryption
Decryption is the process of decoding cipher text to plain text, so it is readable by the user. It is the opposite of encryption, the process of converting plaintext to cipher text.
Letter for filtering (will be hidden in prod) :
D
Data Retention
Data retention is the process of storing and protecting data for historical reasons and for data back up when needed. Every organization has its own rules governing data retention within the organization.
Letter for filtering (will be hidden in prod) :
D
Data Element
A data element is a basic unit of information that has a unique meaning and subcategories (data items) of distinct value. Gender, race, and geographic location are all examples of data elements.
Letter for filtering (will be hidden in prod) :
D
Data Encryption Standard
A data encryption standard is a form of algorithm to convert plain text to a cipher text. Data encryption standard uses the same key to encrypt and decrypt the data, and hence it is a symmetric key algorithm.
Letter for filtering (will be hidden in prod) :
D
Defense in Depth
Defense in depth is the process of creating multiple layers of security to protect electronics and information resources against attackers. Also called the castle approach, it is based on the principle that in the event of an attack, even if one layer fails to protect the information resource other layers can offer defense against the attack.
Letter for filtering (will be hidden in prod) :
D
Decryption Key
A decryption key is a piece of code that is required to decipher or convert encrypted text or information into plain text or information.
Letter for filtering (will be hidden in prod) :
D
Data Asset
A data asset is any entity that is composed of data; for example, a database is an example of a data asset. A system or application output file, database, document, or web page are also considered data assets. Data assets can also be a service that may be provided to access data from an application.