 |
Letter: D - data administration
- Definition: In the NICE Framework, cybersecurity work where a person: Develops and administers databases and/or data management systems that allow for the storage, query, and utilization of data.
- data aggregation
- Definition: The process of gathering and combining data from different sources, so that the combined data reveals new information.
- Extended Definition: The new information is more sensitive than the individual data elements themselves and the person who aggregates the data was not granted access to the totality of the information.
- Related Term(s): data mining
- data breach
- Definition: The unauthorized movement or disclosure of sensitive information to a party, usually outside the organization, that is not authorized to have or see the information.
- Related Term(s): data loss, data theft, exfiltration
- data integrity
- Definition: The property that data is complete, intact, and trusted and has not been modified or destroyed in an unauthorized or accidental manner.
- Related Term(s): integrity, system integrity
- data leakage
- Synonym(s): data breach
- data loss
- Definition: The result of unintentionally or accidentally deleting data, forgetting where it is stored, or exposure to an unauthorized party.
- Related Term(s): data leakage, data theft
- data loss prevention
- Definition: A set of procedures and mechanisms to stop sensitive data from leaving a security boundary.
- Related Term(s): data loss, data theft, data leak
- data mining
- Definition: The process or techniques used to analyze large sets of existing information to discover previously unrevealed patterns or correlations.
- Related Term(s): data aggregation
- data spill
- Synonym(s): data breach
- data theft
- Definition: The deliberate or intentional act of stealing of information.
- Related Term(s): data aggregation, data leakage, data loss
- decipher
- Definition: To convert enciphered text to plain text by means of a cryptographic system.
- Synonym(s): decode, decrypt
- decode
- Definition: To convert encoded text to plain text by means of a code.
- Synonym(s): decipher, decrypt
- decrypt
- Definition: A generic term encompassing decode and decipher.
- Synonym(s): decipher, decode
- decryption
- Definition: The process of transforming ciphertext into its original plaintext.
- Extended Definition: The process of converting encrypted data back into its original form, so it can be understood.
- Synonym(s): decode, decrypt, decipher
- denial of service
- Definition: An attack that prevents or impairs the authorized use of information system resources or services.
- designed-in security
- Synonym(s): Build Security In
- digital forensics
- Definition: The processes and specialized techniques for gathering, retaining, and analyzing system-related data (digital evidence) for investigative purposes.
- Extended Definition: In the NICE Framework, cybersecurity work where a person: Collects, processes, preserves, analyzes, and presents computer-related evidence in support of network vulnerability, mitigation, and/or criminal, fraud, counterintelligence or law enforcement investigations.
- Synonym(s): computer forensics, forensics
- digital rights management
- Definition: A form of access control technology to protect and manage use of digital content or devices in accordance with the content or device provider's intentions.
- digital signature
- Definition: A value computed with a cryptographic process using a private key and then appended to a data object, thereby digitally signing the data.
- Related Term(s): electronic signature
- disruption
- Definition: An event which causes unplanned interruption in operations or functions for an unacceptable length of time.
- distributed denial of service
- Definition: A denial of service technique that uses numerous systems to perform the attack simultaneously.
- Related Term(s): denial of service, botnet
- dynamic attack surface
- Definition: The automated, on-the-fly changes of an information system's characteristics to thwart actions of an adversary.
|
 |
|