Glossary
Term Description
Degaussing
Procedure that reduces the magnetic flux to virtual zero by applying a reverse magnetizing field. Also called demagnetizing. The act of using a magnet to return media to its original pristine unused state.
Delegation
In the context of object-oriented programming, the forwarding of a request by an object to another object or delegate. An object delegates if it does not have a method to handle the message. The notation that an object can issue a request to another object in response to a request. The first object therefore delegates the responsibility to the second object. Delegation can be used as an alternative to inheritance.
Denial of service (DoS)
A type of attack that prevents a system from processing or responding to legitimate traffic or requests for resources and objects. The unauthorized prevention of authorized access to resources or the delaying of timecritical operations.
DES
Data Encryption StandardData Encryption Standard.
Digital Signature
A method for ensuring a recipient that a message truly came from the claimed sender and that the message was not altered while in transit between the sender and recipient. Cryptographic process used to assure message originator authenticity, integrity, and nonrepudiation. Synonymous with electronic signature. The act of electronically affixing an encrypted message digest to a computer file or message in which the originator is then authenticated to the recipient.
Digital Signature Standard (DSS)
A standard that specifies that all federally approved digital signature algorithms must use a secure hashing function. The National Security Administration’s standard for verifying an electronic message.
Directory Service
A centralized database of resources available to the network, much like a telephone directory for network services and assets. Users, clients, and processes consult the directory service to learn where a desired system or resource resides. A service provided on a computer network that allows one to look up addresses (and perhaps other information such as public key certificates) based upon usernames.
Disaster Recovery Plan
A detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood. A document that guides the recovery efforts necessary to restore your business to normal operations as quickly as possible. Provides for the continuity of system operations after a disaster.
Discretionary access control (DAC)
A means of restricting access to objects based on the identity of subjects and groups to which they belong. The controls are discretionary in the sense that a subject with certain access permission is capable of passing that permission on to another subject. Means of restricting access to objects based on the (DAC) identity and needtoknow of users and/or groups to which the object belongs. Controls are discretionary in the sense that a subject with a certain access permission is capable of passing that permission (directly or indirectly) to any other subject. (. See mandatory access control. )
Distributed Component Object Model (DCOM)
A protocol that enables software components to communicate directly over a network. Developed by Microsoft and previously called “Network OLE,” DCOM is designed for use across multiple network transports, including Internet Protocols such as HTTP. An extension of COM to support distributed computing. This is Microsoft’s answer to CORBA.