Information Security Glossary - D - G

Glossary – D

Data Breach – When information or assets have been accessed, moved or changed without permission. Also referred to as a data spill or data leak. 

DDoS – Distributed Denial of Service (attack). An attempt to make a machine or network resource unavailable to its intended users.

Decode – To convert encoded information into plain text using code. 

Denial of Service (Dos) – A type of cyber attack that involves sending a large amount of fake traffic to a website in order to impair the system or service. 

Deny-By-Default-Principle – The principle by which users and other entities are denied access unless specifically authorised. 

Disaster Recovery (DR) – That part of Business Continuity Management (BCM) concerned with the recovery of IT systems & networks.

 

Glossary – E

Encryption – The process of encoding messages (or information) in such a way that unauthorised parties cannot read it, but that authorised parties can. 

End-user License Agreement (EULA) – In the proprietary software industry, and end-user license agreement or software license agreement is the contract between the licensor and purchaser. establishing the purchaser’s right to use the software. 

End-user device (EUD) – The term used to describe devices like mobile phones and laptops that connect to an organisation’s network. 

Exfiltration – When information is transferred from an information system without consent.

Exploit – To breach a secure network in order to gain data or other assets. 

Glossary – F

Forensics – In the world of cyber security, digital forensics involves retrieving information from a mobile phone, computer or server. This could be to look for evidence of a data breach or find deleted messages detailing criminal activity. 

Firewall – A firewall can either be software-based or hardware-based and is used to help keep a network or computer secure. 

Glossary – G

Gap Analysis – To compare actual performance against what is expected, leaving a gap. 

GCHQ – The Government Communications Headquarters works to combat terrorism, cybercrime and child pornography using foreign intelligence. 

GDPR (General Data Protection Regulation) – EU Regulation that came into force in May 2018 relating to organisational handling and protection of EU citizens personal data.

Glossary Index:

 A - C,    D - G,    H - L,    M - P,    Q - R,    S - Z.

ISMS.online is the fast and simple way to ISO 27001 certification

ISMS Online Rating: 5 out of 5
Share This