decoy server
=
honeypot
AKIT
Inglise
Eesti
#
a
b
c
d
e
f
g
h
i
j
k
l
m
n
o
p
q
r
s
t
u
v
w
x
y
z
D
da
DA (1)
DaaS
DAC
dactyloscopy
DADF
daemon
DAM
DAMA
damage (1)
damage (2)
damage (3)
damage threshold (1)
dancing pigs
dangerous goods
dangling pointer
dark fiber
dark launch
darknet
dark pattern
DarkSide
dark web (1)
dark web (2)
DARPA
d-ary tree
DAS
DASH
dashboard (1)
dashboard (2)
DAST
data (1)
data (2)
data access
data accuracy
data acquisition
data administration
data aggregation
data analysis
data analytics
data annotation *
data approximation
data asset
data at rest
data attribute
data augmentation *
data-aware storage
data bank
database (1)
database (2)
database administrator
database browser
database-driven
database driver
database engine
database hardening
database lifecycle management
database link
database management system
database marketer
Databases Act (Estonia)
database server
database shard
database standard (1)
database standard (2)
data binding
data breach (1)
data breach (2)
data broker
data cabinet*
data capacity (1)
data capture
data carrier
Data Catalog Vocabulary
data center
data center bridging
data circuit
data classification
data cleaning
data cleansing
data communication
data contamination
data content
data continuity
data controller
data corrosion
data corruption
data coupling
data crawling
data custodian
data degradation
data deluge
data developer
data dictionary
data diddling
data diode
data discovery
data-driven
data-driven attack
data element
data engineering
data entity
data entry
data exchange
data exhaust
data expansion technology
data extraction
data federation
data feed
datafication*
data file
data fitting
data flow (1)
data flow (2)
data flowchart
data flow diagram
data flow graph
data format
data frame
data frugality
data fusion
data generation (1)
data generation (2)
data governance
datagram
data grid
data handling
data in motion
data integrity
data in transit
data item
data items' representation
data key
data laundering (1)
data laundering (2)
data layer
data leakage
data leak prevention
data level parallelism
data linking
data link layer
data loader
datalogy (1)
datalogy (2)
data loss (1)
data loss (2)
data loss prevention
data management
data management platform
data mart
data massage
Data Matrix
data medium
data merging
data miner
data mining
data model*
data model*
data modeling
data munging
data network
data object
data obsolescence
data origin authentication
data owner
data pipeline
data plane
data platform as a service
data policy
data policy portability
data portability
data preparation
data principal
data privacy
data processing
data processing system
data processing unit
data processor (1)
data processor (2)
data product (1)
data product (2)
data proliferation
data protection (1)
data protection (2)
data protection as a service
data protection officer
data protection plan
data provider (1)
data provider (2)
data quality
data quality checking *
data rate
data reconstitution
data recovery
data reduction
data remanence (1)
data remanence (2)
data resource management
data retention
data sampling *
data science
data scraping
data scrubbing
data security
data security policy
data semantic portability
data-sending Trojan
data-sensitive fault
dataset *
data set (1)
data set (2)
data set (3)
data silo
data sink
data source
data sovereignty
data spill
data spillage
data splitting
data station
data steward
data storage (1)
data storage (2)
data storage as a service
data store
data structure
data structure diagram
data subject
data swapping
data syntactic portability
data tampering
data terminal equipment
data theft
data trail
data transfer between jurisdictions
data transfer object
data transformation
data transmission
data type
data validation
data value (1)
data value (2)
data value chain
data variety
data velocity
data veracity
data virtualization
data volatility
data volume (1)
data volume (2)
data warehouse
data warehouse as a service
data warehousing
data wipeout
data wrangling
date and time
date evaluation
dater
date stamp
Datex II
Davies-Meyer compression function
Daxin
DBA
DBIDS
DBMS
D-Bus
DCAT
DCB
DCMI
DCMS
DDI
DDNS
DDOC
DDOS attack
DDP
de-
deactivate
deadband
dead code *
dead drop
dead key
dead letterbox
deadline
dead link
deadlock
dead man's switch
dead man's switch
dead reckoning (1)
dead reckoning (2)
dead time (1)
dead time (2)
dead time (3)
deallocation
deanonymization
death certificate
deauthentication
Debian
debrief
debriefing
debug
debug bridge
debugger
debugging (1)
debugging (2)
deca-
decade (1)
decade (2)
decapsulation
deceit
decentralization
decentralized authority
deception
deceptive software
decertification
deci-
decimal *
decimal prefix
decimal system
decipherment
decision (1)
decision (2)
decisional Diffie-Hellman problem
decisional privacy
decision criteria
decision diagram
decision network
decision support system
decision table
decision theory
decision tree
declaration (1)
declaration (2)
declarative knowledge *
declarative language
declarative part
declarative programming
declassification
decoder
decoding
decommissioning
decompile
decomposition (1)
decomposition (2)
decompression
deconvolution
decoupling (1)
decoy server
decrease
decree
decryption
decryption algorithm
decryption identity
decryption key
decryptor
DECT
dedicated bandwidth connection
dedicated channel
deduplication
de-enrolment
deep copy
deep defence
deep fake
deep learning
deep link
deep linking
deepnet
DeepNude
deep packet injection
deep packet inspection
deep tech
deep web
defacement
defamatory (1)
defamatory (2)
default
default account
default credentials
default deny
default-deny rule
default gateway
default password
default permit
default shell
defect (1)
defect (2)
defect detection percentage *
defective
defect tracking
defence
defense
defense in breadth
defense in depth
Defense Information System Network
defensive computing
deferred event
deferred maintenance
definitive software library
Deflate
defocus
DEFR
defragmentation (1)
degaussing
degradation-of-service attack
degree (1)
degree (2)
degree (3)
degree (4)
degree of a polynomial
degree of a root
degree of differential equation
degree of extension field
degree of independence
degree of influence
de-identification
de-identified
de-indexing (1)
de-indexing (2)
deinstallation
delay (1)
delay (2)
delay statement
delegation (1)
delegation (2)
delegation name record
delete
deletion (1)
deletion (2)
deliberate error
delimiter (1)
delimiter (2)
delimiter collision
deliverability
deliverable
deliverable product
delivery (1)
delivery (2)
delivery authority
delivery notification service
delivery platform*
delivery report
delivery robot
delivery status (1)
delivery status (2)
Delphi technique
delta
delta export
delta feed
delta migration
delta-presence
demagnetizing
demand-side platform
demarcation
demarcation point
demilitarized zone
Deming wheel
demo (1)
demo (2)
demodulation
demographic differential
demonstrable conformance
demonstrate
demonstration and evaluation stage
demo version
deniability (1)
deniability (2)
deniable encryption
denial of service
denial-of-service attack
dense set
density function
deontic logic
department of motor vehicles
dependability
dependency
dependency injection
dependent component
deploy (1)
deployment (1)
deployment (2)
deployment (3)
deployment diagram
deployment management
deployment strategy
deployment testing
depository
deprecated
deprovisioning
depth of field
DeputyDog
DER (1)
DER (2)
dereference operator
derivation of classes
derivative
derive *
derive *
derived credential
derived key
derived measure
DES (1)
DES (2)
descendant
descending order
descending sort
descrambling
describe
description (1)
description (2)
descriptive statistics
descriptor
deselect
deserialization
desidentification
design (1)
design (2)
design (3)
design (4)
design (5)
designated verifier signature
designating authority
designation (1)
designation (2)
designed-in security
designer (1)
designer (2)
design of experiments
design scope*
desk checking
deskless worker
desktop application
desktop computer
desktop firewall
desktop publishing
desktop virtualization (1)
desktop virtualization (2)
destination
DES-token
destruct
destruction
destructive device
destructive option
destructive Trojan
detail
detailed design testing
detect (1)
detect (2)
detection and reaction
detection engine
detection rate
detection threshold
determinant
determine (1)
determine (2)
determined adversary
deterrent
detokenization (1)
detokenization (2)
developer (1)
developer (2)
developer guide
development (1)
development (2)
development (3)
development discussion
development environment
development manager
development platform as a service
development tool
deviation (1)
deviation (2)
device (1)
device (2)
device (3)
device as a service
device compromise
device confirmation (1)
device confirmation (2)
device control protocol
device coordinate
device driver
device fingerprint
device fingerprinting
device management
device mapper
device platform
device platform cloud service
device platform provider
device security
device signature (1)
device signature (2)
device space
DevOps
DevSecOps
DFBA
DFM
DGA
DHA
DHCP
DHCP lease time
DHCP snooping
DHE (1)
DH prime
DHT
diacritic
diagnostic
diagnostics
diagram (1)
diagram (2)
diagram interchange
diagram type
dialback
dialect
Dialer
dialer (1)
dialer (2)
dial-in
dialogue
dialogue management *
dial pad
dial plan
dialup
dial-up access
diceware
dictionary
dictionary attack
DID
diff
difference (1)
difference (2)
difference (3)
difference equation
difference operator
differentiable function
differential
differential backup
differential cryptanalysis
differential equation
differential operator
differential power analysis
differential privacy
Diffie-Hellman assumption
Diffie–Hellman key agreement
Diffie-Hellman key exchange
Diffie-Hellman problem
diffing
diffraction
diffractive optically variable image device
diffusion (1)
diffusion (2)
digest access authentication
digest authentication
digest size (1)
digest size (2)
digest type
digilantism
digit (1)
digit (2)
digital (1)
digital (2)
digital asset
digital asset management
digital billboard
digital carrier
digital cash
digital certificate
digital computer
digital content
digital currency
digital data
digital decay
digital demand
digital device
digital divide
digital dossier
digital enterprise
digital evidence
digital evidence copy
digital evidence first responder
digital evidence specialist
digital exhaust
digital fingerprint
digital firm
digital footprint
digital footprint management
digital forensics
digital gap
digital holographic microscopy
digital identity
digital imaging
digital investigation
digitalization (1)
digitalization (2)
digital manufacturing
digital medium (1)
digital medium (2)
digital migration
Digital Millennium Copyright Act
digital network intelligence
digital object identifier
digital overlay (1)
digital overlay (2)
digital passport
digital resource*
digital resource component *
digital resource delivery*
digital restriction measures
digital rights management
digital safety
digital seal
digital signal
digital signal processor
digital signature (1)
digital signature (2)
digital signature scheme
digital signature system
digital stamp
digital storage medium
digital subscriber line
digital switchover
digital threat
digital timestamp
digital trash
digital twin
digital video recorder
digital wallet
digital waste (1)*
digital waste (2)
digital waste (2)
digital watermark
digitization
digitized image
digitized signature
digraph
DIL
dimension (1)
dimension (2)
dimension of a vector space
DIMM
DIP
diplomatic authority (1)
diplomatic authority (2)
diplomatic document (1)
diplomatic document (2)
diplomatic passport
diplomatic visa
direct access attack
direct-action virus
direct attached storage
direct attack
direct dial-in
directed graph
directed relationship
direct exchange line
direct inward dialing
directive
directly recursive
direct marketing
direct marking
direct marking
direct measure
direct memory access
directory
directory climbing
directory harvest attack
directory maintenance authority
directory service
directory traversal
directory virus
direct product of algebras
direct product of sets
direct request
direct-sequence spread spectrum
direct URL
direct user
direct value
DISA
disability (1) *
disable
disaggregate
disaggregated
disaggregation
disallow statement
disappearing ink
disassembler (1)
disassembler (2)
disaster
disaster management
disaster planning
disaster recovery
disaster recovery plan
disaster risk reduction
disciplinary process
disclaimer
disclosure (1)
disclosure (2)
disclosure (3)
disclosure (4)
disconnect
disconnection
discontinue (1)
discontinue (2)
discontinue (3)
discontinuous
discover
discoverability
discovery (1)
discovery (2)
discovery (3)
discovery (4)
discovery probe
discrete
discrete effort
discrete Fourier transform
discrete logarithm
discrete mathematics
discrete set
discrete signal
discretionary access control
discretionary policy (1)
discretionary policy (2)
discriminability
discriminant
discrimination (1)
discrimination (2)
discrimination threshold
discriminative model
discriminator constraints
discriminatory (1)
discriminatory (2)
disguise
disinfect
disinfection
disinfestation
disinformation
disintegrate
disintermediation
disjoint
disjoint sets
disjoint substate
disjunction
disk array
disk clone (1)
disk clone (2)
disk cloning
disk cloning solution
diskette
diskette insert
disk image
disk imaging
disk mirroring
disk storage
dislike button
dismantle (1)
dismantle (2)
dismiss
dismissal
dismount (1)
dismount (2)
dismount (3)
dismount (4)
DISN
disorder
disparaging
dispatch (1)
dispatch (2)
dispatch (3)
dispatch (4)
dispatching
disperse
display (1)
display (2)
display (3)
display (4)
display (5)
display (6)
display (7)*
display adapter
display name (1)
display name (2)
display space
display surface
disposable personal income
disposable personal income
disposal
disposal record
disposition (1)
disposition (2)
disposition (3)
disposition (4)
disposition authority
disruption
disruption-tolerant
disruptive event
disruptive technology
dissemination
dissemination control marking
dissimilarity score
distance
distance score
distinguished name
distinguishing attack
distinguishing identifier
distortion
distraction attack
distress signal
distributed analytics
distributed attack
distributed computing
distributed control system
distributed database
distributed denial-of-service attack
distributed DoS attack
distributed file system
distributed guessing attack
distributed hash table
distributed information system
distributed key generation
distributed learning technology system*
distributed ledger
distributed processing
distributed setup
distributed system
distributed version control system
distribution (1)
distribution (1a)
distribution (2)
distribution (3)
distribution (4)
distribution board
distribution channel
distribution curve
distribution function
distributive (1)
distributive (2)
distributive lattice
distributive logic
distributivity
distributor (1)
distro
Disttrack
disturb
dithering
divergent sequence
diversion theft (1)
diversion theft (2)
diversity scheme (1)
divert
divide
division of responsibilities
division of standards
divorce certificate
DKIM
DLL
DLL hijacking
DLM (1)
DLM (2)
DLMS
DLP (1)
DLP (2)
DLP (3)
DLT (1)
DM (1)
DM (1)
DMA
DMA attack
DMA channel
DMARC
DMCA
dm-crypt
DMP
DMS
DMV
DMZ
DN (1)
DNA
DNA fingerprinting
DNA profiling
DNA testing
DNI
DNI-U
DNS (1)
DNS (2)
DNS (3)
DNS amplification attack
DNS-based blackhole list
DNSBL
DNS cache poisoning
DNS caching
DNSCrypt
DNS data exfiltration
DNS exfiltration
DNS host
DNS hosting service
DNS logging
DNS pinning
DNS protocol
DNS rebinding
DNS reflection
DNS resolver
DNS resolving
DNSSEC
DNS Security Extensions
DNS server
DNS sinkhole
DNS spoofing
DNS tunneling
DNS zone transfer
DNT (1)
DNT (2)
do-activity
dock (1)
dock (2)
Docker
Docker *
docking station
document
documentation
document body
document category
document.cookie
documented information
document management
document merge
document revision
document sanitization
document type
DoD
DoDD 8140
DOD printer
dogfood
dogfooding
DOI
DOI system
domain (1)
domain (2)
domain (3)
domain (4)
domain (5)
domain (6)
domain (8) *
domain fluxing
domain fronting
domain hijacking
domain hosting
domain name
domain name registrar
domain name server
domain name service
domain name system
domain parking
domain resolving
domain separation
dome camera
domestic
domestic robot
domotics
dongle (1)
dongle (2)
dongle (3)
do not track
doomscrolling
doorphone
doorway page
Doppler effect
Dorkbot
dormant
dormant company
DoS
DoS attack
DoS protection
dot1q
dot address
dot chart
DotCode
dot-decimal notation
dotplot
dot product
dotted decimal address
double (1a)
double (1b)
double (1c)
double (2a)
double (2b)
Double Dragon
double fast flux
double flux
double free
doubleint
double negation law
double pancake coil
double-precision
double spending (1)
double spending (2)
DOVD
DOVID
do while statement
downcast
downgrade (1)
downgrade (2)
downgrade (3)
downgrade attack
downgrade right
downgrading (1)
downgrading (2)
downlink
download
downloader (1)
downloader (2)
downloader (3)
download manager
download mirror
downsampling
downstream
downstream component
downtime (1)
downtime (2)
doxing
doxware
doxxing
DPA
DPaaS (1)
DPaaS (2)
DPaaS (3)
DPI (1)
DPI (2)
DPI (3)
DPO
DPU
DR (1)
DR (1)
DRaaS
draft (1)
draft (2)
draft (3)
draft (4)
draft (5)
draft (6)
drag (1)
drag (2)
drag (3)
Dragonfly
draw (1)
draw (2)
draw (3)
draw up
DRBL
drift
drill
drive (1)
drive (2)
drive (3)
drive bay
drive-by attack
drive-by download
drive map
driver (1)
driver (2)
driver (3)
driver (4)
driver (5)
driver circuit
driver's license
driving licence
DRM
drone (1)
drone (2)
dronejacking
dropdown
drop-on-demand printer
dropout (1)
dropout (2)
dropout (3)
dropout (4)
dropout ink
dropper
DRP
dry run (1)
dry run (2)
DSA
DSaaS
DSDM
DSL (1)
DSL (2)
DSP (1)
DSP (2)
DSS (1)
DSS (2)
DSSS
DTE
DTLS
DTW
dual-band
dual-boot computer
dual-booting
dual-channel
dual control (1)
dual control (2)
dual-control access
dual drive
dual-homed
dual homing
dual in-line package
dual SIM
dual space
dual use
Dublin Core
duck typing
due care
due date
due diligence
DUKPT
dummy (1)
dummy (2)
dummy (3)
dummy activity
dummy argument
dump (1)
dump (2)
dump (3)
dump (4)
dump site
dumpster diving (1)
dumpster diving (2)*
duplex
duplex communication
duplexing automatic document feeder
duplex print
duplex transmission
duplicate (1)
duplicate (2)
duplicate biometric enrolment check
durability (1)
durability (2)
durability (3)
duration
duress code
duty-bearer
duty of care
DVCS
DVR
DVWA
DWaaS
DWDM
dynamic
dynamical system
dynamic attack surface
dynamic authentication
dynamic backup
dynamic binary instrumentation
dynamic DNS
dynamic dump
dynamic IP address
dynamic line management
dynamic metadata
dynamic packet filter
dynamic port
dynamic programming
dynamics diagram
dynamic time warping
dynamic translation
dynamic update
Dynamite Panda
DynDNS
dyno (1)
dysfunction
Toimub laadimine
decoy server
=
honeypot
Palun oodake...
Katkesta
Tõrge
decoy server
=
honeypot
Andmete allalaadimisel või töötlemisel esines tehniline tõrge.
Vabandame!
Sulge