АБВГДЕЖЗИКЛМНОПРСТУФХЦЧШЭЯ ABCDEFGHIKLMNOPQRSTUVWZ Damage, impactDataData blockData confidentiality serviceData decipheringData encryption keyData encryption standard (DES)Data integrityData integrity serviceData loss prevention (DLP), data leak prevention, content monitoring and filtering (CMF), information protection and control (IPC), extrusion prevention system (EPS)Data mediumData origin authenticationData origin authentication serviceData privacyData protectionData protection Directive 95/46/ЕСData securityData transfer systemData transmission channelData-flow diagramDatabaseDecryption algorithm, decipheringDecryption functionDecryption keyDecryption, breaking of cryptosystemDecryption, decipheringDefacementDefault accountDefault passwordDefence in depthDemilitarized territoryDenial of serviceDenial-of-Service attack (DoS attack)Deposit transaction (protocol)DestructionDialer (American English), dialler (British English)Dictionary attackDifferential attackDifferential attackDifferential cryptanalysisDifferential cryptanalysisDifferential fault attackDifferential-linear attackDifferential-linear attackDiffie–Hellman algorithmDiffusion propertyDiffusion transformDigital asset management (DAM)Digital currencyDigital fingerprintDigital informationDigital money, digiCash, e-cash, e-coinDigital signatureDigital signature cryptosystemDigital signature schemeDigital signature standard (DSS)Digital signature with message recoveryDigramDirective 1999/93/ECDiscrete logarithm problemDiscretionary access controlDiscretionary access controlDishonest partyDishonest party, attackerDistributed denial-of-service attack (DDoS)Distribution of informationDocumentDPI (deep packet inspection), complete packet inspection, information eXtraction (IX)DropperDual control