Cybersecurity Glossary
1506 essential cybersecurity terms explained. Your reference guide from A to Z.
1506Terms
A–ZIndexed
D
DMZ
Demilitarized Zone. A physical or logical subnet that separates an internal network from untrusted external networks, typically hosting public-facing services like web servers.
DNS Spoofing
An attack that corrupts DNS cache data to redirect domain name queries to malicious IP addresses, sending users to fake websites.
DDoS
Distributed Denial of Service. An attack that overwhelms a target server or network with traffic from multiple compromised systems, rendering it unavailable to legitimate users.
DoS
Denial of Service. An attack designed to make a machine or network resource unavailable by flooding it with superfluous requests or exploiting vulnerabilities.
DNS
Domain Name System. The hierarchical distributed naming system that translates human-readable domain names into IP addresses that computers use to identify each other.
DHCP
Dynamic Host Configuration Protocol. A network management protocol that automatically assigns IP addresses and other network configuration parameters to devices on a network.
Deep Packet Inspection
A form of network packet filtering that examines the data payload of packets passing through a checkpoint, enabling more sophisticated traffic analysis and threat detection.
DOM-Based XSS
A type of XSS where the vulnerability exists in client-side JavaScript code that processes data from an untrusted source without proper sanitization.
Deserialization Attack
An attack that exploits vulnerabilities in how applications reconstruct objects from serialized data, potentially achieving remote code execution.
Decryption
The reverse process of encryption that converts ciphertext back into readable plaintext using the appropriate key and algorithm.
Digital Signature
A cryptographic mechanism that proves the authenticity and integrity of a digital message or document, created using the signer private key.
Digital Certificate
An electronic document issued by a Certificate Authority that binds a public key to an entity identity, enabling trust in encrypted communications.
Diffie-Hellman
A key exchange protocol that allows two parties to establish a shared secret over an insecure channel without prior shared secrets, foundational to modern cryptography.
Dropper
A type of malware designed to install other malware on a target system, often disguised as legitimate software to bypass initial security controls.
Drive-By Download
A malware delivery method where malicious software is automatically downloaded to a user device simply by visiting a compromised or malicious website.
Dictionary Attack
A password cracking technique that tries words from a predefined list of common passwords and dictionary words rather than trying every possible combination.
Dirb
A web content scanner that discovers hidden directories and files on web servers by dictionary-based brute-forcing of URL paths.
Digital Forensics
The application of scientific investigation techniques to digital evidence, recovering and analyzing data from electronic devices for legal proceedings.
Disk Imaging
The process of creating an exact bit-for-bit copy of a storage device for forensic analysis, preserving all data including deleted files and slack space.
DFIR
Digital Forensics and Incident Response. The combined discipline of investigating security incidents and collecting digital evidence for analysis and legal proceedings.
Docker Security
Security measures for Docker container environments, including image vulnerability scanning, runtime protection, and daemon configuration hardening.
Data Classification
The process of categorizing data based on its sensitivity level and the impact of unauthorized disclosure, guiding appropriate security controls.
Data Loss Prevention
Technologies and strategies used to prevent sensitive data from being lost, misused, or accessed by unauthorized users through monitoring and enforcement.
Disaster Recovery
The process, policies, and procedures for recovering critical technology infrastructure and systems following a natural or human-induced disaster.
Defense in Depth
A cybersecurity strategy that employs multiple layers of security controls throughout a system, so that if one layer fails, others continue to provide protection.
DevSecOps
An approach that integrates security practices into the DevOps pipeline, making security a shared responsibility throughout the software development and deployment process.
Data Breach
A security incident where sensitive, protected, or confidential data is accessed, disclosed, or stolen by an unauthorized individual or entity.
Data Exfiltration
The unauthorized transfer of data from within an organization to an external destination, often the final objective of a cyberattack.
Data Anonymization
The process of removing or modifying personally identifiable information from data sets so individuals cannot be readily identified.
Data Pseudonymization
Replacing directly identifying information with artificial identifiers while maintaining a separate mapping, allowing re-identification when necessary.
Data Masking
The process of obscuring sensitive data by replacing it with realistic but fictitious data, commonly used in non-production environments.
Data Sovereignty
The concept that data is subject to the laws and governance structures of the country where it is collected, stored, or processed.
De-identification
The process of removing or obscuring personal identifiers from data to prevent the identification of individuals while preserving data utility.
Digital Footprint
The trail of data created by a user online activities, including websites visited, emails sent, social media interactions, and online purchases.
Doxing
The malicious practice of researching and publicly broadcasting private or identifying information about an individual without their consent.
DKIM
DomainKeys Identified Mail. An email authentication method that allows the receiver to verify that an email was sent by the domain it claims and was not altered in transit.
DMARC
Domain-based Message Authentication, Reporting and Conformance. An email authentication protocol that builds on SPF and DKIM to prevent email spoofing and phishing.
Deauthentication Attack
A wireless denial-of-service attack that sends forged deauthentication frames to disconnect clients from their access point, often preceding other attacks.
DAST
Dynamic Application Security Testing. A method of testing running applications for security vulnerabilities by simulating attacks against the live application.
Dependency Scanning
The automated process of checking third-party libraries and frameworks used in an application for known vulnerabilities and outdated versions.
Deepfake
Synthetic media created using deep learning that convincingly replaces a person likeness in video or audio, used in social engineering and disinformation.
Data Poisoning
An attack that compromises the integrity of a machine learning model by injecting malicious or misleading data into its training dataset.
Data at Rest
Data stored on physical media such as hard drives, databases, or backup tapes, requiring encryption and access controls to protect against unauthorized access.
Data in Transit
Data actively moving between locations, such as across the internet or through a private network, protected by transport encryption like TLS.
Data in Use
Data currently being processed in memory or CPU, requiring protection through techniques like encrypted memory and trusted execution environments.
Data Retention Policy
A policy defining how long different types of data should be stored, when it should be deleted, and the procedures for secure data disposal.
Database Security
The measures and controls used to protect database management systems from attacks, unauthorized access, and data breaches.
Data Governance
The overall management of data availability, usability, integrity, and security within an organization, ensuring data is consistent and trustworthy.
Dumpster Diving
The practice of searching through discarded materials to find sensitive information like passwords, network diagrams, or financial data.
DLL Injection
A technique for running code within the address space of another process by forcing it to load a dynamic-link library containing malicious code.
DLL Hijacking
An attack where a malicious DLL is placed in a location where a legitimate application will load it instead of the intended library.
DNS Tunneling
A technique that encodes data within DNS queries and responses to establish a covert communication channel, often used to bypass firewalls.
DOM-based XSS
A type of cross-site scripting where the vulnerability exists in client-side code rather than server-side, with the payload executed by modifying the DOM environment.
Directory Listing
A web server misconfiguration that displays the contents of a directory when no index file is present, potentially exposing sensitive files.
DCSync
An attack that uses the Directory Replication Service protocol to request password hashes from a domain controller, simulating the behavior of a legitimate DC.
Deception Technology
Security tools that deploy decoy assets like fake credentials, files, and systems to detect, analyze, and defend against attacks.
Disk Forensics
The process of acquiring, examining, and analyzing data from storage devices to recover evidence, including deleted files and file system artifacts.
Dead Box Forensics
Forensic analysis performed on a powered-off system, typically involving disk imaging and offline analysis of persistent storage.
DORA
Digital Operational Resilience Act. An EU regulation that strengthens the IT security of financial entities and ensures operational resilience against cyber threats.
Data Minimization
The principle of collecting and retaining only the minimum amount of personal data necessary for a specific purpose.
DNS Hijacking
An attack that modifies DNS settings to redirect users to malicious websites, often targeting router DNS settings or DNS registrar accounts.
Drop Box
A small, concealed computing device planted in a target's physical environment to provide persistent remote access to their network.
Differential Privacy
A mathematical framework for sharing information about a dataset while limiting exposure of individual records, adding calibrated noise to query results.
Data Subject Rights
The legal rights of individuals regarding their personal data, including access, rectification, erasure, portability, and objection to processing.
Data Retention
Policies governing how long an organization stores data before it is deleted or archived, balancing business needs with privacy requirements and legal obligations.
Dependency Confusion
A supply chain attack that exploits how package managers resolve dependencies, tricking systems into downloading malicious packages from public repositories.
Deauthentication Attack
A wireless denial-of-service attack that sends forged deauthentication frames to disconnect clients from an access point.
Dragonblood
A set of vulnerabilities in the WPA3 Dragonfly handshake that allow password recovery through side-channel attacks and protocol downgrade attacks.
DANE
DNS-based Authentication of Named Entities. A protocol that uses DNSSEC to associate TLS certificates with domain names, enhancing email security.
Database Encryption
The process of encrypting data stored in databases using transparent data encryption, column-level encryption, or application-level encryption.
Data Lifecycle Management
The process of managing data from creation through storage, use, sharing, archiving, and eventual destruction.
Data Integrity
The maintenance and assurance of data accuracy and consistency throughout its lifecycle, ensuring it has not been altered by unauthorized parties.
Data Exfiltration Prevention
Security measures designed to detect and prevent unauthorized transfer of data outside an organization's network boundaries.
Database Activity Monitoring
A security technology that monitors and analyzes database activity in real time to detect unauthorized access, SQL injection, and policy violations.
Data Discovery
The process of identifying and classifying sensitive data across an organization's systems and storage to understand exposure and apply appropriate protections.
DNSSEC
Domain Name System Security Extensions. A suite of specifications that adds security to the DNS protocol by enabling DNS responses to be validated.
DoT
DNS over TLS. A protocol that encrypts DNS queries using TLS, preventing eavesdropping and manipulation of DNS traffic between clients and resolvers.
DoH
DNS over HTTPS. A protocol for performing DNS resolution via the HTTPS protocol, encrypting DNS queries and making them indistinguishable from regular web traffic.
DNS Amplification
A DDoS attack that exploits open DNS resolvers to flood a target with amplified DNS response traffic using spoofed source addresses.
Darknet Monitoring
The practice of monitoring dark address space for backscatter traffic, worm propagation, and misconfigured systems.
Downloader
A type of malware whose primary purpose is to download and install additional malicious payloads from remote servers after initial infection.
Double Extortion
A ransomware tactic where attackers both encrypt data and threaten to publish stolen information if the ransom is not paid.
DES
Data Encryption Standard. A formerly predominant symmetric-key algorithm for data encryption, now considered insecure due to its 56-bit key length.
DSA
Digital Signature Algorithm. A federal standard for digital signatures based on the mathematical concept of modular exponentiation and discrete logarithm.
Device Trust
A security framework that evaluates the security posture of a device before granting access to organizational resources.
Detection Engineering
The practice of designing, building, testing, and maintaining detection rules and analytics for identifying security threats.
Data Breach Response
The coordinated process of investigating, containing, and remediating a data breach while meeting notification requirements.
DLL Sideloading
An attack that exploits the Windows DLL search order to load a malicious DLL by placing it alongside a legitimate application.
Decentralized Identity
A digital identity model where individuals control their identity data without relying on centralized authorities, often using blockchain.
Dark Pattern
Deceptive user interface designs that trick users into making choices that benefit the company at the expense of user privacy.
Dependency Vulnerability
A security weakness in a third-party library or package that an application depends on, potentially introducing risk through the supply chain.
Data Classification Levels
Standardized categories for organizing data by sensitivity, typically including public, internal, confidential, and restricted levels.
Data Residency
Requirements specifying the physical or geographic location where data must be stored and processed, often driven by regulation.
Data Lineage
The tracking of data from its origin through its lifecycle, documenting transformations and movements for compliance and security.
Detective Control
A security control designed to identify and alert on security events that have already occurred, such as intrusion detection and log monitoring.
Diamond Model
A threat intelligence framework that describes intrusion events using four core features: adversary, capability, infrastructure, and victim.
Digital Forensics Certifications
Certifications for forensics professionals including GCFE, EnCE, CFCE, and AccessData Certified Examiner.
DNS Sinkhole
A DNS server that returns false results for specific domains, used to block access to known malicious sites and disrupt malware communications.
Domain Fronting
A technique that routes network traffic through a trusted domain to disguise the true destination, often used to evade censorship and security controls.
Data Fabric Security
Security architecture that provides consistent data protection across distributed environments including cloud, on-premises, and edge.
Data Clean Room
A secure environment where multiple parties can analyze combined datasets without exposing raw data to each other.
Data Mesh Security
Security practices for data mesh architectures where domain teams own their data products with federated governance.
Drone Security
Security measures for protecting against and using unmanned aerial vehicles, including counter-drone technology and surveillance capabilities.
DNS Firewall
A security service that filters DNS queries to block access to malicious domains, phishing sites, and command-and-control servers.
DDoS Mitigation
Technologies and services that detect and absorb volumetric denial-of-service attacks before they reach the target infrastructure.
DHCP Starvation
An attack that exhausts the DHCP server address pool by flooding it with requests using spoofed MAC addresses.
DHCP Spoofing
An attack where a rogue DHCP server provides false network configuration to clients, redirecting their traffic through attacker-controlled systems.
Deconfliction
The process of distinguishing penetration testing activities from real attacks during an engagement to prevent unnecessary incident responses.
Dilithium
A lattice-based digital signature scheme selected by NIST as a post-quantum cryptography standard.
Digital Risk Protection
Services that monitor the internet for threats targeting an organization including brand impersonation, data leaks, and phishing.
Detection as Code
An approach where security detection rules are managed like software code with version control, testing, and automated deployment.
Digital Services Act
EU regulation establishing obligations for online platforms regarding illegal content, transparency, and user protection.
Deepfake Detection
Technologies and methods for identifying AI-generated synthetic media including facial inconsistencies and artifact analysis.
Detection Gap Analysis
An assessment comparing current detection capabilities against known attack techniques to identify areas needing improvement.
Differential Privacy in ML
Applying differential privacy techniques to machine learning to prevent training data from being extracted from models.
Delegated Administration
The practice of distributing administrative responsibilities to specific individuals or teams for their areas of authority.
DREAD Risk Model
A risk assessment model rating threats on Damage, Reproducibility, Exploitability, Affected Users, and Discoverability.
Data Catalog
A comprehensive inventory of data assets that provides metadata about data location, ownership, sensitivity, and lineage.
Data Access Governance
Policies and processes controlling who can access specific data, under what conditions, and how access is monitored.
Database Firewall
A security tool that monitors database traffic and blocks unauthorized queries, SQL injection, and privilege escalation attempts.
Data Redaction
The process of obscuring sensitive data in documents or databases by replacing it with placeholders while preserving document structure.
Database Forensics
The forensic analysis of database contents, logs, and transactions to investigate unauthorized access and data manipulation.
Device Attestation
The process of verifying the identity and integrity of hardware devices before granting them access to resources.
Defensive Security Career Path
Career progression from SOC analyst through incident responder, threat hunter, and security architect roles.
Dynamic ARP Inspection
A switch security feature that validates ARP packets against a trusted binding table to prevent ARP spoofing attacks.
Dwell Time
The duration between an initial compromise and its detection, often measured in days, indicating detection capability effectiveness.
Deprovisioning
The process of revoking user access rights and disabling accounts when employees leave or change roles within an organization.
Data Sovereignty Compliance
Ensuring data storage and processing complies with the legal requirements of the jurisdictions where data subjects reside.
Data Sanitization
The process of deliberately and permanently removing data from storage media to prevent recovery using standard forensic techniques.
Data Tokenization Service
A service that replaces sensitive data with non-sensitive tokens for storage and processing while maintaining a secure token vault.
Data Privacy Officer
A designated individual responsible for overseeing data protection strategy and compliance with privacy regulations.