D


DAC (discretionary access control)

An access policy determined by the owner of a file or other resource. See also MAC.

Data dictionary

A database of databases.

Data warehouse

A special-purpose database used for decision support or research purposes.

DBMS (database management system)

Restricts access by different subjects to various objects in a database.

DCE

Data communications equipment. See also DTE.

Decryption

The process of transforming ciphertext into plaintext.

Defense in depth

The principle of protecting assets by using layers of dissimilar mechanisms.

Demonstrative evidence

Used to aid the court’s understanding of a legal case.

Denial of Service (DoS)

An attack on a system or network with the intention of making the system or network unavailable for use.

DES (Data Encryption Standard)

A commonly used symmetric key algorithm that uses a 56-bit key and operates on 64-bit blocks. See also AES.

Detective controls

Controls that identify violations and incidents.

Deterrent controls

Controls that discourage violations.

Diameter

The next-generation RADIUS protocol. See also RADIUS.

Dictionary attack

A more focused type of brute force attack in which a predefined word list is used. See also Brute force attack.

Diffie-Hellman

A key agreement algorithm based on discrete logarithms.

Digital certificate

A certificate that binds an identity with a public encryption key.

Direct evidence

Oral testimony or a written statement based on information gathered through the witness’s five senses that proves or disproves a specific fact or issue.

Disk Mirroring (RAID Level 1)

A duplicate copy of all data is written to another disk or set of disks.

Disk Striping (RAID Level 0)

Data is written across multiple disks but does-n’t provide redundancy or fault tolerance.

Disk Striping with Parity (RAID Level 5)

Data is written across multiple disks along with parity data that provides fault tolerance should one disk fail.

Distributed application

A software application in which its components reside in several systems or locations.

DITSCAP (Defense Information Technology Security Certification and Accreditation Process)

Formalizes the certification and accreditation process for U.S. Department of Defense information systems.

Documentary evidence

Includes originals and copies of business records, computer-generated and computer-stored records, manuals, policies, standards, procedures, and log files.

Domain

A collection of users, computers, and resources with a common security policy and single administration.

DSS (Digital Signature Standard)

Published by NIST (see also NIST) in Federal Information Processing Standard (FIPS) 186-1, specifies two acceptable algorithms in its standard: The RSA Digital Signature Algorithm and the Digital Signature Algorithm (DSA). See also RSA.

DTE

Data Terminal Equipment. See also DCE.

Due care

The steps that an organization takes to implement security best practices.

Due diligence

The prudent management and execution of due care.

Dumpster diving

The process of examining garbage with the intention of finding valuable goods or information.

Dynamic password

A password that changes at some regular interval or event.




CISSP For Dummies
CISSP For Dummies
ISBN: 0470537914
EAN: 2147483647
Year: 2004
Pages: 242

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net