Acronyms
Alphabetical index of published acronym entries with tag filters and quick sort.
- ACRONYMDACUpdated Jan 06, 2026
See: Data Authentication Code, discretionary access control.
- ACRONYMDASSUpdated Jan 06, 2026
See: Distributed Authentication Security Service.
- ACRONYMDBaaSUpdated Jan 06, 2026
a cloud database offering that provides customers with access to a database without having to deploy and manage the underlying infrastructure
- ACRONYMDDoSUpdated Jan 06, 2026
DDoS stands for Distributed Denial of Service, a DoS attack carried out from many sources.
- ACRONYMDEAUpdated Jan 06, 2026
See: Data Encryption Algorithm.
- ACRONYMDEKUpdated Jan 06, 2026
See: data encryption key.
- ACRONYMDESUpdated Jan 06, 2026
See: Data Encryption Standard.
- ACRONYMDevSecOpsUpdated Jan 06, 2026
an approach to culture, automation, and platform design that integrates security as a shared responsibility throughout the entire IT lifecycle
- ACRONYMDIIUpdated Jan 06, 2026
See: Defense Information Infrastructure.
- ACRONYMDISNUpdated Jan 06, 2026
See: Defense Information Systems Network (DISN).
- ACRONYMDKIMUpdated Jan 06, 2026
See: Domain Keys Identified Mail.
- ACRONYMDMZUpdated Jan 06, 2026
See: demilitarized zone.
- ACRONYMDNUpdated Jan 06, 2026
See: distinguished name.
- ACRONYMDNSUpdated Jan 06, 2026
Adversaries may gather information about the victim's DNS that can be used during targeting. DNS information may include a variety of details, including registered name servers as well as records that outline addressing for a target’s subdomains, mail servers, and other hosts. DNS MX, TXT, and SPF records may also reveal the use of third party cloud and SaaS providers, such as Office 365, G Suite, Salesforce, or Zendesk.(Citation: Sean Metcalf Twitter DNS Records)
- ACRONYMDoDUpdated Jan 06, 2026
Department of Defense.
- ACRONYMDOIUpdated Jan 06, 2026
See: Domain of Interpretation.
- ACRONYMDoSUpdated Jan 06, 2026
DoS stands for Denial of Service, an attack targeting system availability.
- ACRONYMDPIAUpdated Jan 06, 2026
A Data Protection Impact Assessment (DPIA) describes a process designed to identify risks arising out of the processing of personal data and to minimize these risks as far and as early as possible
- ACRONYMDSAUpdated Jan 06, 2026
See: Digital Signature Algorithm.
- ACRONYMDSSUpdated Jan 06, 2026
See: Digital Signature Standard.