top of page

Cyber Terminologies and Fundamentals

Definitions 

Data Breach

An incident where sensitive, confidential, or protected data is accessed or disclosed without authorization.

Digital Forensics

The investigation and analysis of digital devices to uncover cybercrimes and security incidents.

Denial of Service (DoS)

An attack that disrupts the availability of a network, system, or service by overwhelming it with traffic.

Data Loss Prevention (DLP)

A set of tools and processes designed to prevent unauthorized access, use, or transfer of sensitive data.

Domain Hijacking

An attack where an unauthorized entity takes control of a domain name.

Dark Web Monitoring

The process of tracking activities on the dark web to detect cyber threats and data leaks.

Deep Packet Inspection

An advanced network filtering technique that inspects packet contents for security threats.

Dynamic Malware Analysis

A method of analyzing malware behavior in a controlled environment.

Directory Traversal

A vulnerability that allows attackers to access restricted directories on a server.

Drive-By Download

An attack where malicious software is automatically downloaded onto a user's device without consent.

Digital Signature

A cryptographic mechanism used to verify the authenticity and integrity of digital data.

Data Encryption Standard (DES)

A symmetric encryption algorithm used to secure data, now considered outdated.

Discretionary Access Control (DAC)

An access control model where data owners define permissions for resources.

Defense-in-Depth

A cybersecurity strategy that employs multiple layers of security controls to protect systems.

Dwell Time

The amount of time an attacker remains undetected in a network after gaining access.

DNS Spoofing

An attack that alters DNS records to redirect users to malicious websites.

Data Exfiltration

The unauthorized transfer of sensitive data from a system or network.

Decoy Networks

A cybersecurity technique where fake networks are deployed to attract and study attackers.

Device Fingerprinting

Identifying a device based on unique hardware and software attributes.

Data Tampering

The unauthorized modification of data to manipulate or compromise its integrity.

bottom of page