All pages with prefix
Appearance
- D
- D/A
- D/RTBH
- D/S
- D2D
- DA
- DAA
- DAC
- DACL
- DACUM
- DAD
- DAG
- DAML
- DANE
- DAO
- DAPA
- DAR
- DARPA
- DARPA Agent Markup Language
- DAS
- DASH7
- DAST
- DATO
- DB
- DBA
- DBL
- DBMS
- DBm
- DC
- DC3
- DCCP
- DCE
- DCG
- DCID
- DCISE
- DCMA
- DCMS
- DCO
- DCO-RA
- DCRTM
- DCS
- DCS:SA
- DDIL
- DDMS
- DDNS
- DD VE
- DDoS
- DE
- DE.AE
- DEA
- DEP
- DER
- DES
- DET
- DEX
- DFA
- DFARS
- DFR
- DFW
- DG
- DH
- DHCP
- DHE
- DHHS
- DHK
- DHS
- DHkey
- DI
- DIA
- DIACAP
- DIAS
- DIB
- DIB CS
- DICE
- DICOM
- DICWG
- DID
- DIMA
- DIMM
- DIS
- DISA
- DISN
- DIT
- DITSCAP
- DIV
- DKEYx(Y)
- DKIM
- DLC
- DLL
- DLO
- DLP
- DLR
- DLT
- DMA
- DMARC
- DMZ
- DN
- DNA
- DNAT
- DNI
- DNP3
- DNS
- DNS-Based Authentication of Named Entities
- DNS-SD
- DNSBL
- DNSSEC
- DNSSEC-Aware Name Server
- DNSSEC-Aware Recursive Name Server
- DNSSEC-Aware Resolver
- DNSSEC-Aware Stub Resolver
- DNS Administrator
- DNS Full Zone Transfer Query Type
- DNS Security Extensions
- DOB
- DOC
- DODCAR
- DOE
- DOI
- DOJ
- DP
- DP-SGD
- DPA
- DPC
- DPCI
- DPD
- DPI
- DPM
- DQ
- DQPSK
- DR
- DRAM
- DRB
- DRBG
- DRBG Mechanism Boundary
- DRBG mechanism
- DRM
- DRP
- DS
- DSA
- DSB
- DSCP
- DSIG
- DSL
- DSN
- DSOC
- DSP
- DSRM
- DSS
- DSS PCI
- DSbD
- DT
- DTC
- DTD
- DTLS
- DTR
- DTS
- DUA
- DVD
- DVD-R
- DVD-ROM
- DVD-RW
- DVD-Recordable
- DVD-Rewritable
- DVD–Read Only Memory
- DVR
- DXE
- Damage
- Damage-limiting operations
- Dashboard
- Data-at-Rest
- Data-encryption key
- Data Access
- Data Access Object
- Data Actions
- Data Block (Block)
- Data Center Group
- Data Center Security: Server Advanced
- Data Collector
- Data Domain Virtual Edition
- Data Encryption Algorithm
- Data Encryption Standard
- Data Execution Prevention
- Data Group
- Data Historian
- Data Link Layer
- Data Management Officer
- Data Processing
- Data Processing Ecosystem
- Data Radio Bearer
- Data Security Standard
- Data Security Standard Payment Card Industry
- Data Segment (Segment)
- Data Transfer Device
- Data action
- Data aggregation
- Data and Information Reference Model
- Data asset
- Data consumer
- Data curator
- Data element
- Data flow control
- Data governance
- Data in Transit
- Data integrity
- Data integrity authentication
- Data intruder
- Data linking
- Data loss
- Data loss prevention
- Data mining
- Data origin authentication
- Data poisoning
- Data privacy
- Data privacy attacks
- Data provenance
- Data reconstruction
- Data science
- Data spillage
- Data tag
- Data transfer solution
- Data universe
- Data use agreement
- Data validation
- Database Administrator
- Database Management System
- Database of Genotypes and Phenotypes
- Datagram Congestion Control Protocol
- Datagram Transport Layer Security
- Dataset
- Dataset with identifiers
- Dataset without identifiers
- DbGaP
- Dd
- De-registration (of a key)
- DeFi
- DeNB
- Deactivated state
- Dead Peer Detection
- Decapsulation
- Decapsulation key
- Decentralized Autonomic Data
- Decentralized Autonomous Organization
- Decentralized Exchange
- Decentralized Identifier
- Decentralized finance
- Decentralized network
- Decertification
- Decibels referenced to one milliwatt
- Decipher
- Decision or branch coverage
- Decision tree
- Decode
- Decrypt
- Decryption
- Decryption-Verification
- Decryption Failure Rate
- Decryption key
- Dedicated Proxy Server
- Deep Packet Inspection
- Default classification
- Defect
- Defect Check
- Defect Type
- Defense-in-depth
- Defense Contract Management Agency
- Defense Courier Service
- Defense Cyber Crime Center
- Defense Discovery Metadata Standard (DDMS)
- Defense Federal Acquisition Regulations Supplement
- Defense Industrial Base
- Defense Industrial Base Cybersecurity Sharing
- Defense Information System Network
- Defense Information Systems Agency
- Defense Intelligence Agency
- Defense Science Board
- Defensive Design
- Defensive cyberspace operation response action (DCO-RA)
- Defensive cyberspace operations (DCO)
- Degauss
- Degraded Cybersecurity State
- Delay (path delay)
- Delegation Signer
- Deleted file
- Delivery-only client (DOC)
- Delivery Status Notification
- Dell Remote Access Controller
- Dell Trusted Device
- Demilitarize
- Denial of service (DoS)
- Denied, Disrupted, Intermittent, and Limited Impact
- Deny by Default
- Deoxyribonucleic acid
- Department/Agency
- Department of Commerce
- Department of Defense
- Department of Defense Directive
- Department of Defense Instruction
- Department of Defense Manual
- Department of Defense information network operations
- Department of Defense information networks (DODIN)
- Department of Education Disclosure Review Board
- Department of Energy
- Department of Health and Human Services
- Department of Homeland Security
- Department of Justice
- Department of Transportation
- Department of Veterans Affairs
- Deployment stage
- Deprecated
- Deprecated Identifier Name
- Depth
- Derived PIV Application
- Derived PIV Credential
- Derived PIV Credential Management System
- Derived PIV Credentials
- Derived Personal Identity Verification (PIV)
- Derived Personal Identity Verification Credential
- Derived Relationship Mapping
- Derived Test Requirement
- Derived attribute value
- Derived credential
- Derived requirement
- Descriptive label
- Design
- Design characteristics
- Design margin
- Design principle
- Designated Accrediting Authority
- Designated approval authority (DAA)
- Designated cipher function
- Designing for cyber resiliency and survivability
- Desired State
- Desired State Specification
- Destination-based Remotely Triggered Black-Holing
- Destination Address
- Destination Network Address Translation
- Destroy
- Destroyed state
- Destruction
- Detailed assessment
- Detect
- Detect, Anomalies and Events
- Detect (CSF function)
- Deterministic Algorithm
- Deterministic Random Bit Generator