Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Glossary

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z  |  Symbols
d
D/M/E
D/S
DA
DAA
DAC
DAD
Daily Use Account
DAML
DAO
DARPA
DARPA Agent Markup Language
Data
Data Access Object
Data Aggregation
Data And Information Reference Model
Data Asset
Data Blockblock
Data Collector
Data Diode
Data Element
Data Encryption Algorithm
Data Encryption Security Association Type Indicator
Data Encryption Standard
Data Encryption Standard Electronic Code Book
Data Execution Prevention
Data Flow Control
Data Frame
Data Governance
Data Group
Data Historian
Data Integrity
Data Key, Data Encrypting Key
Data Link Layer
Data Loss
Data Loss Prevention
Data Mining
Data Mining/Harvesting
Data Modification
Data Object
Data Origin Authentication
Data Path
Data Protection Key
Data Provenance
Data Recovery Agent
Data Segmentsegment
Data Spillage
Data Tag
Data Transfer Device (COMSEC)
Data Transfer Solution
Database
Database Examine/Modify Utility ((PBX))
Database Management System
Database Server
Database Upload/ Download Utility ((PBX))
Date Of Birth
DATO
dBm
DBMS
DC Servo Drive
DCE
DCO
DCOM
DCO-RA
DCS
DDMS
DDOS
DEA
Deactivated State
Deauthentication
Decapsulation
Decertification
Decibels Referenced To One Milliwatt
Decipher
Decision Or Branch Coverage
decision trigger
Decode
Decrypt
Decryption
Decryption-Verification
Decyphering
Dedicated Line
Dedicated Proxy Server
Deep Packet Inspection
Default Classification
Defense Advanced Research Projects Agency
Defense Discovery Metadata Standard
Defense Information Systems Agency
Defense-In-Breadth
Defense-In-Depth
Defensive Cyberspace Operation Response Action
Defensive Cyberspace Operations
Degauss
Degradation
De-Identified Information
Delegated Accrediting Authority
Delegation Point
Delegation Signer
Deleted File
Deliverable
Delivery-Only Client (C.F.D.)
Delta-Crl
Demilitarize
Demilitarized Zone
Denial Of Authorization To Operate
Denial Of Service
Denial Of Service (WLAN attack)
Deny By Default
DEP
Department Of Defense
Department Of Defense Information Network Operations
Department Of Defense Information Networks
Department Of Energy
Department Of Health And Human Services
Department Of Homeland Security
Department Of Justice
Deprecated
Deprecated Address
Depth
DER
Derived Credential
Derived PIV Application
Derived PIV Credential
Derived PIV Credentialand Associated Token Issuer
Derived Test Requirement
Derived Test Requirements
DerivedKeyingMaterial
DES
DES MAC
DES-ECB
Designated Accrediting Authority
Designated Approval Authority
Designated Approval Authority (C.F.D.)
Designated Approving Authority
Designated Authorizing Official
Designated Cipher Function
Designer
Destination Address
Destination Address (IPv6 Field)
Destination Options Header (IPv6 extension header)
Destroy
Destroyed Compromised State
Destroyed State
Destruction
DESX
DET
Detection Error Tradeoff ((characteristic))
Deterministic Algorithm
Deterministic Random Bit Generator
deterministic random number generator
DETL
Developer
Development, Modernization, And/Or Enhancement
Device
Device Distribution Profile
Device Registration Manager
Device_ID
DFS
DG
DH
DHAAD
DHCP
DHCP Unique Identifier
DHCPv4
DHCPv6
DHE
DHHS
DHK
DHS
Diagnostics
Diameter
Dictionary Attack Resistance
Differential Power Analysis
Differential Quaternary Phase Shift Keying
Differentiated Services
Diffie-Hellman
Diffie-Hellman Group
Diffie-Hellman Key Exchange
Diffie-Hellmana Key Establishment Algorithm
Digest
Digest Size
Digital
Digital Encryption Standard
Digital Evidence
Digital Forensics
Digital Identity Management Service
Digital Media
Digital Policy
Digital Policy Management
Digital Rights Management
Digital Signature
Digital Signature Algorithm
Digital Signature Standard
Digital Signature Standard (implies DSA)
Digital Subscriber Line
Digital Versatile Disc
Digital Video Disc
DIMS
Direct Application Access
direct BLACK wireline
Direct Random String
Directory
Directory Service
Dirty Word List
DISA
Disallowed
Disassociation
Disaster Recovery
Disaster Recovery Plan
Disclosure Of Information
Disconnection
Discovery
Discovery Service
Discrete Logarithm Cryptography
Discrete Process
Discretionary Access Control
Disinfect
Disinfecting
Disintegration
Disk Image
Disk Imaging
Disk-To-Disk Copy
Disk-To-File Copy
Disposal
Disruption
Distinguishable Information
Distinguished Encoding Rules
Distinguished Name
Distinguishing Identifier
Distributed Component Object Model
Distributed Computing Environment
Distributed Control System
Distributed Control System(s)
Distributed Denial Of Service
Distributed denial-of-service attack
Distributed Energy Technology Laboratory
Distributed Intrusion Detection System
Distributed Network Protocol
Distributed Plant
Distributed Transaction Coordinator
Distribution
Distribution System
Disturbance
DIV
Diversifier
Diversifier Hiding Key
DLC
DLL
DLP
DMARC
DMZ
DN
DNP3
DNS
DNS Administrator
DNS Security Extensions
DNS-ALG
DNSKEY
DNSSEC
DNSSEC-Aware Name Server
DNSSEC-Aware Recursive Name Server
DNSSEC-Aware Resolver
DNSSEC-Aware Stub Resolver
DOB
DOC
Document Type Definition
DOD
DoD Discovery Metadata Standard
DoD Information
DODIN
DOE
DOI
DOJ
Domain
Domain Authority
Domain Controller
Domain Name Server
Domain Name System
Domain Name System Key
Domain Name System Security Extensions
Domain Name System-Application Layer Gateway
Domain Of Interpretation
Domain Parameter
Domain Parameter Seed
Domain Parameters
Domain Separation
domain_parameter_seed
Domain-Based Message Authentication, Reporting & Conformance
DoS
Dots Per Inch
Downgrading
dP
DPA
DPCI
DPI
DPK
DPM
dQ
DQPSK
DR
DRA
DRBG
DRBG Mechanism Boundary
Driver Execution Environment
DRM
DRP
DS
DSA
DShield
DSL
DSS
DSTM
DTC
DTD
DTR
Dual Control
Dual Stack Transition Mechanism
Dual Use Certificate
DUID
Duplicate Address Detection
Duplicate Digital Evidence
Duration
Duration/ID
Duty Cycle
DVD
DVD.Read Only Memory
DVD+R
DVD+RW
DVD-R
DVD-Rewritable
DVD-ROM
DVD-RW
DXE
Dynamic Analysis
Dynamic Authentication
Dynamic Frequency Selection
Dynamic Home Agent Address Discovery
Dynamic Host Configuration Protocol
Dynamic Host Configuration Protocol For Ipv4
Dynamic Host Configuration Protocol For Ipv6
Dynamic Link Library
Dynamic Subsystem