Darknet
Darknets are an anonymous private file sharing networks between trusted peers using non-standard protocols. The anonymity means that there is little scope for authorities to intervene.
Dark Web
Content existing on Darknets that is only accessible by means of special software which allows users to remain anonymous or untraceable.
Database Encryption
Encrypting databases will stop cyber criminals being able to read sensitive data even if they are able to access the database.
Data Dump
A large amount of data transferred from one system or location to another.
Deep Web
The deep web is the part of the internet which is not discoverable by means of standard search engines. It includes password protected or dynamic pages and encrypted networks.
Denial of Service (DoS) and Distributed Denial of Service (DDoS)
This is a type of cyber attack that prevents the use of system services or resources, or impairs access, usually by overloading the service with requests. This can occur with many types of businesses who process transactions online including e-commerce.
Dictionary attack
This is a type of brute force attack. Words, phrases and common passwords are used to gain access to your system.
DMARC
An internet protocol to prevent spoofing
DNS Filtering
A technique to block known IP addresses.
Domain Hijacking
A cyber criminal hijacks a domain by first blocking access to the domain’s DNS server and then putting his own server up in its place.
Domain Name Server (DNS)
DNS translates alphabetical website addresses into numerical IP addresses which identify the location of the website.
Dwell time
The length of time an attacker is present on an IT system without being detected.