Information Security Glossary - D - G
Glossary – D
Data Breach – When information or assets have been accessed, moved or changed without permission. Also referred to as a data spill or data leak.
DDoS – Distributed Denial of Service (attack). An attempt to make a machine or network resource unavailable to its intended users.
Decode – To convert encoded information into plain text using code.
Denial of Service (Dos) – A type of cyber attack that involves sending a large amount of fake traffic to a website in order to impair the system or service.
Deny-By-Default-Principle – The principle by which users and other entities are denied access unless specifically authorised.
Disaster Recovery (DR) – That part of Business Continuity Management (BCM) concerned with the recovery of IT systems & networks.
Glossary – E
Encryption – The process of encoding messages (or information) in such a way that unauthorised parties cannot read it, but that authorised parties can.
End-user License Agreement (EULA) – In the proprietary software industry, and end-user license agreement or software license agreement is the contract between the licensor and purchaser. establishing the purchaser’s right to use the software.
End-user device (EUD) – The term used to describe devices like mobile phones and laptops that connect to an organisation’s network.
Exfiltration – When information is transferred from an information system without consent.
Exploit – To breach a secure network in order to gain data or other assets.
Glossary – F
Forensics – In the world of cyber security, digital forensics involves retrieving information from a mobile phone, computer or server. This could be to look for evidence of a data breach or find deleted messages detailing criminal activity.
Firewall – A firewall can either be software-based or hardware-based and is used to help keep a network or computer secure.
Glossary – G
Gap Analysis – To compare actual performance against what is expected, leaving a gap.
GCHQ – The Government Communications Headquarters works to combat terrorism, cybercrime and child pornography using foreign intelligence.
GDPR (General Data Protection Regulation) – EU Regulation that came into force in May 2018 relating to organisational handling and protection of EU citizens personal data.