Skip to content
SynAc
Browse

Acronyms

Alphabetical index of published acronym entries. Acronym slugs are lowercase in URLs.

  1. DACUpdated Jan 06, 2026

    See: Data Authentication Code, discretionary access control.

  2. DASSUpdated Jan 06, 2026

    See: Distributed Authentication Security Service.

  3. DBaaSUpdated Jan 06, 2026

    a cloud database offering that provides customers with access to a database without having to deploy and manage the underlying infrastructure

  4. DDoSUpdated Jan 06, 2026

    DDoS stands for Distributed Denial of Service, a DoS attack carried out from many sources.

  5. DEAUpdated Jan 06, 2026

    See: Data Encryption Algorithm.

  6. DEKUpdated Jan 06, 2026

    See: data encryption key.

  7. DESUpdated Jan 06, 2026

    See: Data Encryption Standard.

  8. DevSecOpsUpdated Jan 06, 2026

    an approach to culture, automation, and platform design that integrates security as a shared responsibility throughout the entire IT lifecycle

  9. DIIUpdated Jan 06, 2026

    See: Defense Information Infrastructure.

  10. DISNUpdated Jan 06, 2026

    See: Defense Information Systems Network (DISN).

  11. DKIMUpdated Jan 06, 2026

    See: Domain Keys Identified Mail.

  12. DMZUpdated Jan 06, 2026

    See: demilitarized zone.

  13. DNUpdated Jan 06, 2026

    See: distinguished name.

  14. DNSUpdated Jan 06, 2026

    Adversaries may gather information about the victim's DNS that can be used during targeting. DNS information may include a variety of details, including registered name servers as well as records that outline addressing for a target’s subdomains, mail servers, and other hosts. DNS MX, TXT, and SPF records may also reveal the use of third party cloud and SaaS providers, such as Office 365, G Suite, Salesforce, or Zendesk.(Citation: Sean Metcalf Twitter DNS Records)

  15. DoDUpdated Jan 06, 2026

    Department of Defense.

  16. DOIUpdated Jan 06, 2026

    See: Domain of Interpretation.

  17. DoSUpdated Jan 06, 2026

    DoS stands for Denial of Service, an attack targeting system availability.

  18. DPIAUpdated Jan 06, 2026

    A Data Protection Impact Assessment (DPIA) describes a process designed to identify risks arising out of the processing of personal data and to minimize these risks as far and as early as possible

  19. DSAUpdated Jan 06, 2026

    See: Digital Signature Algorithm.

  20. DSSUpdated Jan 06, 2026

    See: Digital Signature Standard.