JavaScriptMessages
APEC
Asia Pacific Economic Cooperation
News
SiteMap
Login
Glossary
Filter:
#
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
All
Return to List
D
D&V
D. C. Power Lab
D-A
DAA
DAC
DAC/D1
DAC/D2
DAC/D3
Daemon
Daemon Book
DAMA
Dangling Pointer
Dangling Threat
Dangling Vulnerability
Dark-Side Hacker
Data
Data Abstraction
Data Access Control
Data Arrangement
Data Attribute
Data Authentication Algorithm
Data Bank
Data Base
Data Base Management System
Data Burst
Data Bus
Data Communication
Data Communication Control Character
Data Communication Control Procedure
Data Communications Equipment
Data Compaction
Data Compression
Data Concentrator
Data Contamination
Data Corruption
Data Dictionary
Data Diddling
Data Directory
Data Element
Data Encrypting Key
Data Encryption
Data Encryption Standard
Data Encryption Standard (DES)
Data Flow Control
Data Integrity
Data Intelligence
Data Interface Capability
Data Item
Data Level
Data Link
Data Link Control
Data Link Escape Character
Data Link Layer
Data Mode
Data Origin
Data Origin Authentication
Data Owner
Data Processing
Data Processing Center Security
Data Processing Fund
Data Protection Directive
Data Protection Engineering
Data Related Emanations
Data Scavenging
Data Scrambler
Data Security
Data Service Unit
Data Set
Data Sink
Data Source
Data Station
Data Stream
Data Terminal Equipment
Data Transfer Rate
Data Transfer Request Signal
Data Transfer Time
Data Transmission
Data Transmission Circuit
Data Volatility
Database
Database Integrity
Database Management System
Database replication
Data-Dependent Protection
Datagram
DATAINT
Datamation
Date And Time Of Event
Dating Format
DAU
Day Mode
DBMS
DC
DC Erasure
DCA
DCID
DCP
DCS
DCS1000
DCSP
Dd
DD:D1
DD:D2
DDD
DDN
DDoS (Distributed DoS)
DDS
DDT
Dead
Dead Code
DEADBEEF
Deadlock
Deadly Embrace
Deallocation
Death Code
Death Square
Death Star
Debug
DEC
DEC Wars
Decapsulation
Decay
Deception
Deception Means
Decertification
Decipher
Decipherment
Decision criterion
Deckle
Declassification
Declassification (of Magnetic Storage Media)
Declassification Of AIS Storage Media
Declassification Of Magnetic Storage Media
Declassification/Downgrade Of Media
Decode
Decrypt
Decryption
Decryption key
Decryption method
DED
Dedicated Line
Dedicated Mode
Dedicated Security Mode
Deep Hack Mode
Deep Magic
Deep Space
Default
Default Classification
Defence Industry Information
Defenestration
Defense Advanced Research Projects Agency (DARPA)
Defense Data Network
Defense in depth
Defined As
Definition
Definition Of Security Features
Degauss
Degausser
Degausser Products List (DPL)
Degree Of Trust
Dehose
Delegated Development
Delegated Development Program
Delegation Of Authority
Deleted Bit
Deleted Block
Deletion Of Accounts
Delint
Delivered Block
Delivered Overhead Bit
Delivered Overhead Block
Delivery Confirmation
Delta
Demarcation Point
Demented
Demigod
Demilitarized zone (DMZ)
Demo
Demo Mode
Demon
Demon Dialer
Denial Of Service
Denial Time
Denial-of-service (DoS)
Deny
Deny All
Department Of Commerce
Department Of Defence
Department Of State
Depeditate
Deployable Computer System
Deployment
Deprecated
De-Rezz
Derf
DES
Descriptive Top Level Specification
Descriptive Top-Level
Descriptive Top-Level Specification
Design Analysis Phase
Design Controlled
Design Controlled Spare Part
Design Controlled Spare Pary
Design Documentation
Design Flaws
Design Objective
Design Radius
Design Reviews
Design Verification
Designated Approving
Designated Approving Authority
Designated Development Activity
Desk Check
Destination unreachable
Destruction
Detectable Actions
Detection
Detection System
Detective Controls
Development (Life Cycle)
Development server
Devil Book
Devo
DF
Diagnostic Program
Dial Back
Dial Number Indicator
Dialog
Dial-Up
Dial-Up Diagnostic
Dial-Up Security
DIB
Dibit
Dictionary attacks
Dictionary Flame
DID
Diddle
Die
Die Horribly
Diff
Differential backup
Diffie-Hellman key agreement
Digit
Digit Time Slot
Digital
Digital Alphabet
Digital certificate
Digital Combining
Digital Computer
Digital Data
Digital Error
Digital Facsimile Equipment
Digital Filter
Digital Modulation
Digital Signal
Digital Signature
Digital watermarking
Digital/Analog Technology
Digital-To-Analog Converter
Digitize
Digitizer
Digraphic Processing
Dike
Ding
Dink
Dinosaur
Dinosaur Pen
Dinosaurs Mating
DIP
Direct Access
Direct Address
Direct Memory Access
Direct Memory Access Controllers
Direct Memory Access Devices
Direct Shipment
Direct Support
Direction Finding
Directionalization
Director Of The Office Of Management And Budget
Directory traversal attack
Dirtball
Dirty Power
Disaster
Disaster Plan
Disaster Recovery
Disaster Recovery Plan Testing
Disaster Recovery Planning
Disaster Recovery Plans
Disclaimer
Disclosure
Disclosure Of Sensitive Data
Disconnect
Disconnection
Discordianism
Discounted cash flow analysis
Discovery process
Discretionary Access
Discretionary Access Control
Discretionary Access Control Mechanism
Discretionary Protection
Discretionary Security Protection
Disengagement Attempt
Disgruntled Employees
DISJ
Disk Farm
Disk Pack
Disk Sectors
Diskette
Diskless Workstations
Display Device
Display Hack
Disposition Of Classified Information
Disposition Of Media And Data
Dissemination
Dissemination Control
Dissemination Controls
Dissemination Of Information
Dissociated Press
DIST
Distributed AIS
Distributed Computer System
Distributed DoS (DDoS)
Distributed firewall architecture
Distributed IDS
Distributed Processing
Distributed Systems Security
Distribution
Distribution Statement
Distribution System
Disusered
DLE
DLED
DMA
DMZ (demilitarized zone)
DO
Do Protocol
Doc
Doco
Document
Document format standards
Document Labeling
Document transfer standards
Documentation
Documentation Policies
DOD
DoD 5200. 28-M
DoD 5200. 28-STD
DoD 5200. 28-STD, 1985
DoD 5200. 28-STD.
DoD Directive 5200. 28
DoD Directive 5200. 28 Automated Information System Security.
DoD Directive 5215. 1
DoD Information Analysis Center
DoD TCSEC
DOD Technology Transfer
DoD Trusted Computer
DoD Trusted Computer System Evaluation Criteria
DoD Trusted Computer System Evaluation Criteria (TCSEC)
DODD
Dodgy
DOE
Dogcow
Dogpile
Dogwash
Domain
Domain controller
Domainist
Dominate
Dominate Security Level
Dominated By
Dominates
DON
Dongle
Dongle-Disk
Don't Do That, Then!
Donuts
Doorstop
DOS
DoS (denial-of-service)
Dot File
Double Bucky
Double DECkers
Doubled Sig
Down
Download
Downtime
DP
DPB
Dper
DPL
Dragon
Dragon Book
Drain
DRECNET
Drive-by hacking
Driver
Droid
Drool-Proof Paper
Drop
Drop Accountability
Drop And Insert
Drop On The Floor
Drop-Ins
Drop-Off/Add-On Protection
Drop-Outs
Drugged
Drum
Drunk Mouse Syndrome
Dry Line
DS
DSN
DSU
DSVT
DT&E
DTD
DTE
DTIRP
DTLS
DTS
DUA
Dual Control
Dual Homing
Dual In-Line Package Switch
Due Care
Due diligence
Duff's Device
Dumb Terminal
Dumbed Down
Dummy Group
Dump
Dumpster Diving
Dup Killer
Dup Loop
Dusty Deck
DWIM
Dynamic port numbers
Dynamic webpages
Dynamically Adaptive Routing
Dynner
Data Communication Control Character
See control character.