АБВГДЕЖЗИКЛМНОПРСТУФХЦЧШЭЯ ABCDEFGHIKLMNOPQRSTUVWZ Damage, impact, harmDarkNetDataData access governance (DAG)Data access governance (DAG)Data annotationData augmentationData authenticationData blockData confidentiality serviceData decipheringData encryption keyData encryption standard (DES)Data integrityData integrity serviceData loss prevention (DLP), data leak prevention, content monitoring and filtering (CMF), information protection and control (IPC), extrusion prevention system (EPS)Data mediumData miningData origin authenticationData origin authentication serviceData privacyData protectionData protection Directive 95/46/ЕСData quality checkingData samplingData securityData transfer systemData transmission channelData-centric audit and protection (DCAP)Data-flow diagramDatabaseDatasetDecodingDecryption algorithm, decipheringDecryption functionDecryption keyDecryption, decipheringDeep learning, deep neural network learningDeep packet inspection (DPI), complete packet inspection, information eXtraction (IX)DeepfakeDefaceDefault accountDefault passwordDefence in depthDemilitarized territoryDenial of serviceDenial-of-service attack (DoS attack)Deposit transaction (protocol)Derivation keyDerivation key hierarchyDerived keyDestructionDetection error trade-offDevOpsDevSecOpsDevSecOps teamDialer (American English), dialler (British English)Dictionary attackDifferential attackDifferential attackDifferential cryptanalysisDifferential cryptanalysisDifferential fault attackDifferential-linear attackDifferential-linear attackDiffie–Hellman algorithmDiffusion propertyDiffusion transformDigital asset management (DAM)Digital currencyDigital fingerprintDigital forensicsDigital forensicsDigital forensics and incident response (DFIR)Digital informationDigital money, digiCash, e-cash, e-coinDigital signatureDigital signature cryptosystemDigital signature for multiply usageDigital signature for one-time usageDigital signature schemeDigital signature standard (DSS)Digital signature with appendixDigital signature with message recoveryDigramDirective 1999/93/ECDiscrete logarithm problemDiscretionary access controlDiscretionary access controlDishonest partyDishonest party, attackerDistributed denial-of-service attack (DDoS)Distribution of informationDocumentDocumented informationDomain parameterDongleDownstreamDrainerDropperDual controlDuration of management system certification auditDynamic application security testing (DAST)