Glossary

All | # A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
There are currently 33 names in this directory beginning with the letter D.
D
Dark Web
An encrypted network that is not indexed by normal search engines. Can only be accessed using specialized software. Dark Web is a small part of the Deep Web. [Type: Terminology]
Data leakage
Confidential data being published anywhere on the internet inclusive of Email addresses. [Type: Attack]
DDoS
A denial-of-service (DoS) or distributed denial-of-service (DDoS) attack is an attempt to make a machine or network resource unavailable to its intended users. Distributed denial-of-service attacks are sent by two or more persons, or bots, whereas denial-of-service attacks are sent by one person or system. [Type: Attack]
De-indexing in search engines
Removing fradulent sites from search engine rankings. [Type: Response]
Dead Man's Switch
A system that requires often human interaction to prevent a process from being triggered. Extortionists use a Dead Man's Switch to force the victim to comply and not go to the authorities. In case the extortionist gets arrested, the process will be triggered and the information will be released to the public. [Type: Terminology]
Deep Web
Parts of the world wide web which have not been indexed by search engines as they are encrypted. [Type: Terminology]
Defacement
Website defacement is an attack on a website that changes the visual appearance of the site or a webpage. These are typically the work of system crackers, who break into a web server and replace the hosted website with one of their own. [Type: Attack]
Defang URL
The process of rewriting the URL into a form that cannot be clicked. [Type: Terminology]
Defensive (Domain) Registration
Buy more domain names, "just in case." [Type: Response]
Delist domains from RBLs
Removing links/emails from Blackhole list. [Type: Response]
Dilution
False data is submitted to phish sites to dilute the quality of information collected by the phisher. [Type: Response]
DMCA
Digital Millennium Copyright Act. [Type: Regulatory]
DNS poisoning
DNS spoofing (or DNS cache poisoning) is an attack whereby data is introduced into a Domain Name System (DNS) name server's cache database, causing the name server to return an incorrect IP address, diverting traffic to another computer. [Type: Attack]
DNS record
List of DNS record types is an overview of resource records (RRs) permissible in zone files of the Domain Name System (DNS). [Type: Data]
DNSSEC
The Domain Name System Security Extensions (DNSSEC). [Type: Terminology]
Dolphin Attack (Inaudible Voice Commands)
An attack where hackers use ultrasonic frequencies to launch a voice command to phones to unlock them and steal information. [Type: Terminology]
Domain expiry
The expiration of a domain (after which it will no longer be online). [Type: Terminology]
Domain Management
Domain portfolio management services are dedicated services offered to help companies to manage big portfolio of domain name. [Type: Service Suite]
Domain Registrar
A domain name registrar is an organization or commercial entity that manages the reservation of Internet domain names. [Type: Terminology]
Domain Registration Alerts
CTM360 Domain Registration Alerts to detect typosquatting, cybersquatted or potential phishing or cyber evil twin websites. [Type: Analysis]
Domain Squatting
Registering, selling or using a domain name with the intent of profiting from the goodwill of someone else's trademark. [Type: Attack]
Domain suspension
Going to a domain authority and requesting the suspension of a domain. [Type: Response]
Domain tasting
The practice of a domain name registrant using the five-day “grace period” (the Add Grace Period or AGP) at the beginning of the registration of an ICANN-regulated second-level domain to test the marketability of the domain. [Type: Terminology]
Domain Validation certificate
Is an X.509 digital certificate typically used for Transport Layer Security (TLS) where the identity of the applicant has been validated by proving some control over a DNS domain. [Type: Terminology]
Donuts.co
Diverse group of new, relevant and expressive Internet domain names. [Type: Registry]
Doppelganger domain
A doppelganger domain is similar to typosquatting domain. It is a domain which is missing "." (dot) in a domain name. For example, an instance of Doppelganger domain for mail.google.com is mailgoogle.com (notice the missing dot). When the content on these domain matches branding and content of the original website, users are not able to tell the difference and are more likely to be tricked by an attacker (e.g., for credential harvesting or financial fraud). [Type: Terminology]
DoS layer 3
A denial of service attack that targets the Network layer. This attack, similar to DoS Layer 4, depends on flooding the attacker with very high volume of data to reduce the system's perfomance and users from accessing the system. [Type: Attack]
DoS layer 4
A denial of service attack that targets the Transport layer. This attack depends on flooding the attacker with very high volume of data to reduce the system's perfomance and users from accessing the system. [Type: Attack]
DoS layer 7
A denial of service attack that targets the Application layer. This attack targets features such as HTTP, SNMP, FTP. Additionally, this type of attack is hard to detect as the traffic resembles real users. [Type: Attack]
DoS or DDoS
In computing, a denial-of-service (DoS) or distributed denial-of-service (DDoS) attack is an attempt to make a machine or network resource unavailable to its intended users. [Type: Attack]
Downgrade Attack
An attack in which the victim is negotiated into using older and more vulnerable security protocols, making it easier for the attacker to launch the attack. [Type: Attack]
Doxing
Doxing simply refers to the process of publishing other people’s information such as name, age, email, address, telephone number, photographs etc. using publicly available sources such as the Internet for malicious purposes. [Type: Terminology]
Drive by malware
Malware delivery technique that is triggered simply because the user visited a website. [Type: Attack]