User guide

Odyssey Access Client User Guide
110
D
Data Encryption Standard (DES)—A cryptographic algorithm designed for
protection of unclassified data and published by the National Institute for Standards
and Technology in Federal Information Processing Standard (FIPS) Publication 46.
Data integrity—Condition existing when data is unchanged from its source and has
not been accidentally or maliciously modified, altered, or destroyed.
Demilitarized zone—An area in your network that enables a limited and controlled
amount of access from the public Internet. This network segment usually lies
between the internal corporate network and public Internet.
Denial of Service (DoS)—A type of attack that denies legitimate users access to a
server or services by consuming sufficient system resources or network bandwidth.
DES—Data Encryption Standard.
Dictionary attack—A brute-force attack in which software is used to compare the
hashed data, such as a password, to a word in a hashed dictionary. This is repeated
until a match is found in the hash, with the goal being to match the password
exactly to determine the original password that was used as the basis of the hash.
Diffie-Hellman—The first public key algorithm, using discrete logarithms in a finite
field. Invented in 1976.
Digital certificate—A signed electronic document (digital ID) that notarizes and
binds the connection between a public key and its legitimate owner. Its main
purpose is to prevent unauthorized impersonation and provide confidence in public
keys.
Digital signature—A hash encrypted to a private key of the sender that proves user
identity and authenticity of the message. Signatures do not encrypt the contents of
an entire message. Also, in the context of certificates, a digital signature uses data to
provide an electronic signature that authenticates the identity of the original sender
of the message.
Disaster recovery plan (DRP)—A plan outlining actions to be taken in case a
business is hit with a natural or man made disaster.
Domain—A domain represents a level of the hierarchy in the domain name space
and is represented by a domain name.
DNS—Acronym for domain name system.
E
Encrypt—To convert plaintext into unintelligible forms by means of a cipher
system. Term encompassing both encipher and encode.
Encryption algorithmA mathematical formula or method used to scramble the
information before transmitting it over an insecure media. Examples include RSA,
DH, IDEA, Blowfish, MD5, DSS/DSA, and Firefly.