Glossary 303 Diffie, Whitfield: a pioneering computer cryptographer who along with Martin Hellman discovered public key cryptography (7) dig: a Linux command line utility for using DNS to resolve domain names to IP addresses (2) digital: a feature of cyberspace where all data is composed of 1s and 0s (1) Digital Millennium Copyright Act (DMCA): a United States law that provides intellectual property protections for companies (3) directory (folder): a container for files (8) disassembler: a tool that helps convert machine code into a higher-level language so that it can be dissected (3) disaster recovery plan (DRP): a formal document that details an organization’s incident response process (5) disclosure: obtaining unauthorized access to data (4) discretionary access control (DAC): an access control model where users can assign permissions to other users (8) distanceless: a feature of cyberspace where all devices are within instant reach of every other device (1) distributed denial of service (DDoS) attack: a DoS attack where a deluge of network traffic is directed against a target from multiple sources (4) distributions (distros): Linux-based operating systems that are packaged with software, tools, and user interfaces (2) DMZ: a segmented portion of a computer network that contains Internet facing servers (9) DNS filtering: a service that provides firewall-like functionality by preventing access to blacklisted websites (9) domain controller (DC): the server used by Active Directory where user credentials are stored (8) domain name: the part of the URL that ties it to an IP address (2) Domain Name System (DNS): a public distributed database that maps domain names to IP addresses (2) dominated strategy: a strategy that will never be chosen (6) double ROT-13 cipher: a facetious cipher used to call attention to the fact that the communicating parties should have used cryptography but did not (7) double transposition cipher: a cipher that uses a two-dimensional table to transpose letters (7) doxxing attack: an attack where a hacker publishes private data to embarrass or otherwise harm the victim (4)
RkJQdWJsaXNoZXIy MTM4ODY=