Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] Daemen, Joan data access controls data and voice communications, history of data authentication algorithm (DAA) Data Encryption Standard (DES) 2nd 3rd application of Cipher Block Chaining (CBC) Cipher Feedback (CFB) ECB (Electronic Codebook) Output Feedback (OFB) what is data import and export data modification data navigation protocols attacks data protection day-to-day system administration 2nd backups hints for hardware and software security tools security audit DEAL Richard Outerbridge, Lars Knudsen decibel (dB) deciphering decryption dedicated circuits Deep Crack default accounts Defense Advanced Research Projects Agency (DARPA) 2nd Defense Authorization Act denial of service 2nd denial of service attack (DoS) 2nd Department of Defense Department of Energy Department of Homeland Security 2nd Department of the Treasury design documentation DESX device labels Dewdney, A.K. DFC DIAMETER 2nd DIAMOND2 dictionary attack Diffie, Whitfield Diffie-Hellman public key system Digital Equipment Corporation's DECnet and Digital Network Architecture (DNA) Digital Signature Standard (DSS) digital signatures 2nd director directory services Active Directory Lightweight Directory Access Protocol (LDAP) X.500 disaster, planning for discretionary access control (DAC) 2nd 3rd ownership self/group/public controls dish antenna distributed denial of service distributed denial of service attack (DDoS) 2nd division multiplexing (TDM) Domain Name Service (DNS) vulnerabilities dormant accounts Dynamic Host Configuration Protocol (DHCP) 2nd |