Data Loss Prevention (DLP)

Data Loss Prevention (DLP) refers to a set of tools and strategies used to identify, monitor, and protect sensitive data across an...

3365 July 16, 2024
DNS Filtering

DNS filtering is a network security mechanism that controls and blocks access to websites or services based on their domain names. It...

3362 July 16, 2024
Dwell Time

This represents the amount of time that an attacker has access to an environment from the initial time they get in to...

603 January 11, 2023
Digital Footprint

The digital information that is left behind from a user’s online activity is their ‘footprint’.

601 January 11, 2023
Distributed Denial-of-Service (DDoS)

A DDoS attack goes further than a DoS attack as it uses multiple computers or machines to flood a targeted resource.

600 January 11, 2023
Disaster Recovery Plan (DRP)

In the event of a severe security attack or outage, your DRP will focus on the technical aspects of getting your systems...

599 January 11, 2023
Defence in Depth

In order to improve your chances of preventing an attack it is good practice to employ several layers of protection. This means...

598 January 11, 2023
Denial-of-Service (DoS)

This usually occurs when a service is overloaded with requests. As a result, legitimate users are denied access to resources or computer...

597 January 11, 2023
Deny list

A deny list is a mechanism that is used when looking at access controls and is used to block or ‘deny’ the...

596 January 11, 2023
Decryption Algorithm

Using a Decryption Algorithm will allow you to convert Cipher Text into Clear Text. It is the opposite of an Encryption Algorithm.

595 January 11, 2023
Decrypt

To decode a message into a form that can be read.

594 January 11, 2023
Data Leakage Prevention (DLP)

To ensure that sensitive information does not leave your systems, DLP software can be installed to prevent this. This can be done...

593 January 11, 2023