Letter: D

data administration
Definition: In the NICE Framework, cybersecurity work where a person: Develops and administers databases and/or data management systems that allow for the storage, query, and utilization of data.

data aggregation
Definition: The process of gathering and combining data from different sources, so that the combined data reveals new information.
Extended Definition: The new information is more sensitive than the individual data elements themselves and the person who aggregates the data was not granted access to the totality of the information.
Related Term(s): data mining

data breach
Definition: The unauthorized movement or disclosure of sensitive information to a party, usually outside the organization, that is not authorized to have or see the information.
Related Term(s): data loss, data theft, exfiltration
data integrity
Definition: The property that data is complete, intact, and trusted and has not been modified or destroyed in an unauthorized or accidental manner.
Related Term(s): integrity, system integrity

data leakage
Synonym(s): data breach
data loss
Definition: The result of unintentionally or accidentally deleting data, forgetting where it is stored, or exposure to an unauthorized party.
Related Term(s): data leakage, data theft
data loss prevention
Definition: A set of procedures and mechanisms to stop sensitive data from leaving a security boundary.
Related Term(s): data loss, data theft, data leak

data mining
Definition: The process or techniques used to analyze large sets of existing information to discover previously unrevealed patterns or correlations.
Related Term(s): data aggregation

data spill
Synonym(s): data breach
data theft
Definition: The deliberate or intentional act of stealing of information.
Related Term(s): data aggregation, data leakage, data loss
decipher
Definition: To convert enciphered text to plain text by means of a cryptographic system.
Synonym(s): decode, decrypt

decode
Definition: To convert encoded text to plain text by means of a code.
Synonym(s): decipher, decrypt

decrypt
Definition: A generic term encompassing decode and decipher.
Synonym(s): decipher, decode

decryption
Definition: The process of transforming ciphertext into its original plaintext.
Extended Definition: The process of converting encrypted data back into its original form, so it can be understood.
Synonym(s): decode, decrypt, decipher

denial of service
Definition: An attack that prevents or impairs the authorized use of information system resources or services.

designed-in security
Synonym(s): Build Security In
digital forensics
Definition: The processes and specialized techniques for gathering, retaining, and analyzing system-related data (digital evidence) for investigative purposes.
Extended Definition: In the NICE Framework, cybersecurity work where a person: Collects, processes, preserves, analyzes, and presents computer-related evidence in support of network vulnerability, mitigation, and/or criminal, fraud, counterintelligence or law enforcement investigations.
Synonym(s): computer forensics, forensics

digital rights management
Definition: A form of access control technology to protect and manage use of digital content or devices in accordance with the content or device provider's intentions.
digital signature
Definition: A value computed with a cryptographic process using a private key and then appended to a data object, thereby digitally signing the data.
Related Term(s): electronic signature

disruption
Definition: An event which causes unplanned interruption in operations or functions for an unacceptable length of time.

distributed denial of service
Definition: A denial of service technique that uses numerous systems to perform the attack simultaneously.
Related Term(s): denial of service, botnet

dynamic attack surface
Definition: The automated, on-the-fly changes of an information system's characteristics to thwart actions of an adversary.