Data Dictionary

Data Dictionary: A centralized repository of information about data, such as its meaning, relationships to other data, origin, usage, and format. It serves as a guide for understanding the structure, content, and context of data sources, thereby helping ensure consistency across different parts of an organization and facilitating effective data management.

Data Diddling

Data Diddling: A fraudulent act involving the deliberate alteration of data before or during its entry into a computer system, typically for purposes like financial gain or malicious intent. This manipulation can cause incorrect results or outputs, making it a form of cybercrime. Organizations must implement security controls and auditing measures to protect against such […]

Cryptography

Cryptography: The science and practice of secure communication in the presence of third parties called adversaries. It involves creating written or generated codes that allow information to be kept secret. Cryptography encompasses various techniques such as encryption (scrambling data so it’s unreadable without a key), decryption (making the scrambled data readable again with the correct […]

Data Discovery Methods

Data Discovery Methods: Data Discovery Methods refer to a range of processes and tools used to identify, classify, and analyze an organization’s data assets. They are crucial for data governance, risk management, and compliance, ensuring that sensitive data is properly handled and protected. Techniques include automated discovery using software to scan storage systems and databases, […]

Cryptology

Cryptology: The study of codes and ciphers, which encompasses both cryptography (creating codes and ciphers to keep information secure) and cryptanalysis (breaking them to access the information). Cryptology is a branch of mathematics and computer science that deals with the principles and techniques of translating readable data into secure forms and vice versa. It’s fundamental […]

Data Emanation

Data Emanation: The unintentional radiation or transmission of electrical signals from electronic equipment, such as a computer or a network device, which can potentially disclose sensitive information. Adversaries can intercept and decode these signals, also known as compromising emanations, to gain unauthorized access to the information, making mitigation techniques such as shielding, signal jamming, or […]