Glossary
Term Description
Data Diddling
Changing data with malicious intent before or during input to the system. The act of making small changes to data, typically malicious in intent.
Data Encryption Standard (DES)
A private key cryptosystem published by the National Institutes of Standards and Technology (NIST). DES is a symmetric block cipher with a block length of 64 bits and an effective key length of 56 bits. DES has been used commonly for data encryption in the forms of software and hardware implementation. A standard cryptosystem proposed in 1977 for all government communications. DES and 3DES were superseded by Advanced Encryption Standard (AES) in December 2001. Cryptographic algorithm, designed for the protection of unclassified data and published by the National Institute of Standards and Technology (NIST) in Federal Information Processing Standard (FIPS) Publication 46. (FIPS 463 withdrawn 19 May 2005) (. See Triple DES) and CNSS Advisory IA/0204 Revised March 2005)
Data integrity
Condition existing when data is unchanged from its source and has not been accidentally or maliciously modified, altered, or destroyed. The state that exists when automated information or data is the same as that in the source documents and has not been exposed to accidental or malicious modification, alteration, or destruction.
Data Manipulation Language (DML)
A data manipulation language (DML) provides the necessary commands for all database operations, including storing, retrieving, updating, and deleting database records. The database programming language that allows users to interact with the data contained within the schema.
Data Mart
Subset of a data warehouse in which only a focused portion of the data warehouse is stored. The storage facility used to secure metadata.
Data Mining
A methodology used by organizations to better understand their customers, products, markets, or any other phase of the business. A technique or tool that allows analysts to comb through data warehouses and look for potential correlated information amid the historical data.
Data origin authentication
Corroborating the source of data is as claimed. The corroboration that the entity responsible for the creation of a set of data is the one claimed.
Data Owner
Information owner. The person responsible for classifying information for placement and protection within the security solution.
Data security
Protection of data from unauthorized (accidental or intentional) modification, destruction, or disclosure. The protection of data from accidental or malicious modification, destruction, or disclosure.
Data Warehouse
A collection of integrated subjectoriented databases designed to support the Decision Support function, where each unit of data is relevant to some moment in time. The data warehouse contains atomic data and summarized data. Large databases used to store large amounts of information from a variety of databases for use in specialized analysis techniques.