Glossary D
DAC

DAC

Discretionary Access ControlAn access control policy that is enforced over all subjects and objects in an information system where the policy specifies that a subject ...

Read More

Data Aggregation

Data Aggregation

Compilation of individual data systems and data that could result in the totality of the information being classified, or classified at a higher level, ...

Read More

Data-confidentiality

Data Confidentiality

Data Confidentiality deals with protecting against the disclosure of information by ensuring that the data is limited to those authorized or by representing the data in such ...

Read More

Data-Encryption-and-Symmetric-Block-Ciphers

Data Encryption Standard

The symmetric encryption algorithm defined by the Data Encryption Standard (FIPS 46-2).  See NIST SP 800-15 under DES for more information. Data Encryption Standard specified in FIPS 46-3. See NIST ...

Read More

Data-Governance

Data Governance

A set of processes that ensures that data assets are formally managed throughout the enterprise. A data governance model establishes authority and management and decision making parameters ...

Read More

Data-Integrity

Data Integrity

A property whereby data has not been altered in an unauthorized manner since it was created, transmitted or stored. In this Recommendation, the statement ...

Read More

Data-link-layer

Data Link Layer

Layer of the TCP/IP protocol stack that handles communications on the physical network components such as Ethernet. See NIST SP 800-113 for more information 

Read More

Data-Loss

Data Loss

The exposure of proprietary, sensitive, or classified information through either data theft or data leakage. See CNSSI 4009-2015 (NIST SP 800-137) and NIST SP 800-137 under Data Loss for more information. 

Read More

Data-Loss-Prevention

Data Loss Prevention

A systems ability to identify, monitor, and protect data in use (e.g. endpoint actions), data in motion (e.g. network actions), and data at rest (e.g. ...

Read More

Database

Database

A repository of information that usually holds plant-wide information including process data, recipes, personnel data, and financial data. See NIST SP 800-82 Rev. 2 and (NISTIR 6859) for more information. A ...

Read More

Dedicated Proxy Server

Dedicated Proxy Server

A form of proxy server that has much more limited firewalling capabilities than an application-proxy gateway.See NIST SP 800-41 Rev. 1  for more information.

Read More

Defense-in-Breadth

Defense-in-Breadth

A planned, systematicset of multidisciplinary activities that seek to identify, manage, and reducerisk of exploitable vulnerabilities at every stage of the system, network, orsub-component life ...

Read More

Defense-in-Depth

Defense-in-Depth

The application of multiple countermeasures in a layered or stepwise manner to achieve security objectives. The methodology involves layering heterogeneous security technologies in the common ...

Read More

DNS

DNS

Domain Name System (DNS) provides a method of resolving host names to IP addresses on the Internet.DNS servers host data in zones. You can think ...

Read More

DNSSEC

DNSSEC

Domain Name System Security Extensions (DNSSEC) adds security to Domain Name Server (DNS) systems. More specifically, it can help prevent DNS poisoning attacks.DNSDNS servers host ...

Read More