Technology, Science and Universe
Results for {phrase} ({results_count} of {results_count_total})
Displaying {results_count} results of {results_count_total}
d
- DenyRule Description: The 'Denial Rule' in application security frameworks is a directive used to restrict a program's access to certain system(...) Read more
- DenyAccess Description: Denying access refers to the action of restricting a user or process from accessing a specific resource within a computer system.(...) Read more
- Dossier Description: A dossier is a collection of documents that gathers information about a specific person, event, organization, or topic. This term(...) Read more
- Discovery Description: Discovery in the context of AppArmor, Nomad, and Monitoring refers to the process of identifying and locating resources or services(...) Read more
- Discretion Description: Discretion is the quality of behaving or speaking in such a way as to avoid causing offense or revealing private information. It(...) Read more
- Defender Antivirus Description: Antivirus Defender is the antivirus software integrated into Windows Defender, designed to provide robust protection against(...) Read more
- Device Guard Description: Device Guard is a feature integrated into Windows security systems, designed to protect devices from untrusted and potentially(...) Read more
- Defender Firewall Description: Defender Firewall is a network security system integrated into various operating systems, designed to monitor and control incoming(...) Read more
- Dynamic Protection Description: Dynamic Protection is an advanced cybersecurity feature that provides real-time defense against emerging threats and malware. This(...) Read more
- Detection Description: Detection is the process of identifying potential threats or vulnerabilities in a system. This process is fundamental in the field(...) Read more
- Domain Protection Description: Domain Protection is a set of security measures implemented to safeguard domain-based resources from various cyber threats. This(...) Read more
- Data Breach Description: Data breach refers to an incident where unauthorized access to confidential data occurs, which may include personal, financial, or(...) Read more
- DLP (Data Loss Prevention) Description: Data Loss Prevention (DLP) refers to a set of tools and processes designed to ensure that sensitive data is not lost or misused. In(...) Read more
- Domain Name System Security Description: DNS security refers to the protection of the DNS infrastructure against attacks that can compromise the integrity and availability(...) Read more
- DDoS (Distributed Denial of Service) Description: DDoS (Distributed Denial of Service) is a cyber attack that aims to disrupt the normal functioning of a target server, service, or(...) Read more