Damage evaluation
Dashboard
Data analysis
Data classification
Data classification scheme
Data communications
Data custodian
Data dictionary
Data diddling
Data Encryption Standard [DES]
Data flow
Data integrity
Data leakage
Data normalization
Data owner
Data retention
Data security
Data structure
Data warehouse
Database
Database administrator [DBA]
Database management system [DBMS]
Database replication
Database specifications
Datagram
Data-oriented systems development
Decentralization
Decision support systems [DSS]
Decryption
Decryption key
Default
Default deny policy
Default password
Defense in depth
Degauss
Demilitarized zone [DMZ]
Demodulation
Demographic
Denial-of-service attack [DoS]
Depreciation
Detailed IS controls
Detection risk
Detective application controls
Detective control
Device
Dial-back
Dial-in access control
Digital certificate
Digital certification
Digital code signing
Digital forensics
Digital signature
Direct reporting engagement
Disaster
Disaster declaration
Disaster notification fee
Disaster recovery
"Disaster recovery plan (DRP) desk
checking"
Disaster recovery plan [DRP]
Disaster recovery plan (DRP) walk-through
Disaster tolerance
Disclosure controls and procedures
Discount rate
Discovery sampling
Discretionary access control [DAC]
Disk mirroring
Diskless workstations
Distributed data processing network
Distributed denial-of-service attack [DDoS]
Diverse routing
Domain
Domain name system [DNS]
Domain name system (DNS) exfiltration
Domain name system (DNS) poisoning
Double-loop step
Downloading
Downtime report
Driver (value and risk)
Dry-pipe fire extinguisher system
Dual control
Due care
Due diligence
Due professional care
Dumb terminal
Duplex routing
Dynamic analysis
Dynamic Host Configuration Protocol [DHCP]
Dynamic partitioning
Dynamic ports