Читаем CISSP Practice полностью

An Internet translation service that resolves domain names to IP addresses and vice versa. Each entity in a network, such as a computer, requires a uniquely identifiable network address for proper delivery of message information. DNS is a protocol used to manage name lookups for converting between decimal and domain name versions of an address. It uses a name-server (DNS server), which contains a universe of names called name-space. Each name-server is identified by one or more IP addresses. One can intercept and forge traffic for arbitrary name-nodes, thus impersonating IP addresses. Secure DNS can be accomplished with cryptographic protocols for message exchanges between name-servers. DNS transactions include DNS query/response, zone transfers, dynamic updates, and DNS NOTIFY.

Domain parameter seed

A string of bits that is used as input for a domain parameter generation or validation process.

Domain parameters

Parameters used with cryptographic algorithms that are usually common to a domain of users. A DSA or ECDSA cryptographic key pair is associated with a specific set of domain parameters.

Domain separation

It relates to the mechanisms that protect objects in a system. Domain consists of a set of objects that a subject can access.

Downgrade

The change of a classification label to a lower level without changing the contents of the data. Downgrading occurs only if the content of a file meets the requirements of the sensitivity level of the network for which the data is being delivered.

Dual backbones

If the primary network goes down, the secondary network will carry the traffic.

Dual cable

Two separate cables are used: one for transmission and one for reception.

Dual control

The process of utilizing two or more separate entities (usually persons) operating in concert to protect sensitive functions or information. All entities are equally responsible. This approach generally involves the split-knowledge of the physical or logical protection of security parameters. This is a management and preventive control.

Dual-homed gateway firewall

A firewall consisting of a bastion host with two network interfaces, one of which is connected to the protected network, the other of which is connected to the Internet. IP traffic forwarding is usually disabled, restricting all traffic between the two networks to whatever passes through some kind of application proxy.

Dual-use certificate

A certificate that is intended for use with both digital signature and data encryption services.

Due care

Means reasonable care, which promotes the common good. It is maintaining minimal and customary practices. It is the responsibility that managers and their organizations have a duty to provide for information security to ensure that the type of control, the cost of control, and the deployment of control are appropriate for the system being managed. Both due care and due diligence are similar to the “prudent man” concept.

Due diligence

Requires organizations to develop and implement an effective security program to prevent and detect violation of policies and law. It requires that the organization has taken minimum and necessary steps in its power and authority to prevent and detect violation of policies and law. Due diligence is another way of saying “due care.” Both due care and due diligence are similar to the “prudent man” concept.

Due process

Means following rules and principles so that an individual is treated fairly and uniformly at all times. It also means fair and equitable treatment to all concerned parties.

Due professional care

Individuals applying the care and skill expected of a reasonable prudent and competent professional during their work.

Dumpster diving

Going through a company’s or an individual’s waste containers to find some meaningful and useful documents and records (information) and then use that information against that company or individual to steal identity or to conduct espionage work.

Dynamic binding

Also known as run-time binding or late binding. Dynamic binding refers to the association of a message with a method during run time, as opposed to compile time. Dynamic binding means that a message can be sent to an object without prior knowledge of the object’s class.

Dynamic host configuration protocol (DHCP)

Перейти на страницу:

Похожие книги

100 абсолютных законов успеха в бизнесе
100 абсолютных законов успеха в бизнесе

Почему одни люди преуспевают в бизнесе больше других? Почему одни предприятия процветают, в то время как другие терпят крах? Известный лектор и писатель по вопросам бизнеса нашел ответы на эти очень трудные вопросы. В своей книге он представляет набор принципов, или `универсальных законов`, которые лежат в основе успеха деловых людей всего мира. Практические рекомендации Трейси имеют вид 100 доступных для понимания и простых в применении законов, относящихся к важнейшим сферам труда и бизнеса. Он также приводит примеры из реальной жизни, которые наглядно иллюстрируют, как работает каждый из законов, а также предлагает читателю упражнения по применению этих законов в работе и жизни.

Брайан Трейси

Деловая литература / Маркетинг, PR, реклама / О бизнесе популярно / Финансы и бизнес