Dense-Wave Division Multiplexer (DWDM)

Dense-Wave Division Multiplexer (DWDM): An optical technology utilized in communications to multiply the number of wavelengths that can be sent over a single optical fiber, thereby increasing the overall data transmission capacity. DWDM systems have the potential to transmit up to 80 wavelengths on a single fiber, providing a high-bandwidth solution for networks and reducing […]

Deny List

Deny List: A security measure that specifies certain entities — such as software applications, email addresses, users, or IP addresses — that are blocked or denied access to a system. It’s a form of access control used to improve system security by explicitly refusing entry to potential threats and is the opposite of an allow […]

Deployment control

Deployment control: A critical phase in change management where changes are integrated into the live environment following rigorous testing and approval. This involves ensuring that changes are deployed accurately, efficiently, and safely and that they do not disrupt operations. Effective deployment control is essential to ensuring that vulnerabilities are not introduced during the deployment of […]

Deprovisioning

Deprovisioning: The process of removing an individual’s access rights or permissions from an organization’s systems and networks, often as a result of the individual leaving the company or changing roles. It is a critical part of identity and access management (IAM) to ensure security and compliance by preventing unauthorized access to sensitive information.

Decryption Key

Decryption Key: A type of cryptographic key used to reverse the encryption process, converting encrypted data (ciphertext) back into its original form (plaintext). In symmetric-key algorithms, the same key is used for both encryption and decryption, while in asymmetric-key algorithms, a paired private key is used for decryption that is different from the public key […]

Detective Controls

Detective Controls: Security measures that are designed to identify and detect unwanted or unauthorized activity within systems and networks. Examples include intrusion detection systems (IDS), log monitoring, security audits, and surveillance cameras. These controls serve to alert an organization to security incidents as they occur or shortly thereafter, enabling a timely response to potential threats.