Sect. D


Damage evaluation
Dashboard
Data analysis
Data classification
Data classification scheme
Data communications
Data custodian
Data dictionary

 

 

 

 

Data diddling
Data Encryption Standard [DES]
Data flow
Data integrity
Data leakage
Data normalization
Data owner
Data retention
Data security
Data structure
Data warehouse

 

Database
Database administrator [DBA]
Database management system [DBMS]
Database replication
Database specifications
Datagram
Data-oriented systems development
Decentralization
Decision support systems [DSS]

Decryption
Decryption key
Default
Default deny policy
Default password
Defense in depth
Degauss

 

 

 

 

 

 

Demilitarized zone [DMZ]
Demodulation
Demographic
Denial-of-service attack [DoS]
Depreciation
Detailed IS controls
Detection risk
Detective application controls
Detective control

 

 

Device
Dial-back
Dial-in access control
Digital certificate
Digital certification
Digital code signing
Digital forensics
Digital signature
Direct reporting engagement

 

 

 



Disaster
Disaster declaration
Disaster notification fee
Disaster recovery
"Disaster recovery plan (DRP) desk
checking"
Disaster recovery plan [DRP]
Disaster recovery plan (DRP) walk-through
Disaster tolerance

Disclosure controls and procedures
Discount rate
Discovery sampling
Discretionary access control [DAC]
Disk mirroring
Diskless workstations
Distributed data processing network
Distributed denial-of-service attack [DDoS]

Diverse routing
Domain
Domain name system [DNS]
Domain name system (DNS) exfiltration

 

 

 

 

 

 

Domain name system (DNS) poisoning
Double-loop step
Downloading
Downtime report
Driver (value and risk)
Dry-pipe fire extinguisher system
Dual control
Due care

 

 

Due diligence
Due professional care
Dumb terminal
Duplex routing
Dynamic analysis
Dynamic Host Configuration Protocol [DHCP]
Dynamic partitioning
Dynamic ports