Dwell Time

This represents the amount of time that an attacker has access to an environment from the initial time they get in to...

January 11, 2023
Digital Footprint

The digital information that is left behind from a user’s online activity is their ‘footprint’.

January 11, 2023
Distributed Denial-of-Service (DDoS)

A DDoS attack goes further than a DoS attack as it uses multiple computers or machines to flood a targeted resource.

January 11, 2023
Disaster Recovery Plan (DRP)

In the event of a severe security attack or outage, your DRP will focus on the technical aspects of getting your systems...

January 11, 2023
Defence in Depth

In order to improve your chances of preventing an attack it is good practice to employ several layers of protection. This means...

January 11, 2023
Denial-of-Service (DoS)

This usually occurs when a service is overloaded with requests. As a result, legitimate users are denied access to resources or computer...

January 11, 2023
Deny list

A deny list is a mechanism that is used when looking at access controls and is used to block or ‘deny’ the...

January 11, 2023
Decryption Algorithm

Using a Decryption Algorithm will allow you to convert Cipher Text into Clear Text. It is the opposite of an Encryption Algorithm.

January 11, 2023
Decrypt

To decode a message into a form that can be read.

January 11, 2023
Data Leakage Prevention (DLP)

To ensure that sensitive information does not leave your systems, DLP software can be installed to prevent this. This can be done...

January 11, 2023
Data at Rest

Data that is in continual storage such as hard disks, removable media or backups is described as data at rest.

January 11, 2023