Default Password

Default Password: A pre-set password provided by the manufacturer of a hardware device or software application that is intended to be used during the initial setup process. Default passwords are often common and well-known, which can pose a significant security risk if not changed after installation or setup. It is considered a critical security practice […]

Defense in Depth

Defense in Depth: A security strategy that employs multiple layers of defense measures across an organization’s technical and procedural boundaries. It is designed to slow down an attack’s progress and provide redundant protective measures in case one system fails or is compromised. This includes not just technical controls like firewalls, antivirus software, and intrusion detection […]

Degaussing

Degaussing: A process by which magnetic fields are used to neutralize or erase data from a magnetic storage medium, such as hard drives or tapes. The process renders the data unreadable, thus ensuring the secure disposal of sensitive information, though it should be noted that once a device has been degaussed, it is typically no […]

Demilitarized Zone (DMZ)

Demilitarized Zone (DMZ): A physical or logical subnetwork that separates an organization’s internal network from an untrusted network, usually the Internet. By placing servers that interact directly with the external environment, such as web servers or email servers, in the DMZ, an additional layer of security is established that helps protect the more sensitive internal […]

Demodulation

Demodulation: The process of extracting the original information-bearing signal from a carrier wave. A demodulator takes a modulated carrier signal, which has specific characteristics set by a modulating signal, and converts it back into its original form or something close to it. It is the reverse process of modulation, which is used to encode information […]

Denial of Service

Denial of Service: An attack on a network or service that aims to overwhelm its infrastructure and make it unavailable to its intended users. This can be achieved through various means, such as flooding the target with superfluous requests to overload the system or exploiting vulnerabilities that cause a crash. Common forms include Distributed Denial […]