Data Loss Prevention (DLP)
Technologies and processes that identify, monitor and protect sensitive data from unauthorised access, use or transmission. DLP solutions apply policies to detect patterns such as personal information and block or alert on attempted exfiltration via email, cloud or removable media.
Data Privacy Impact Assessment
A systematic evaluation of how a project or process collects, uses, shares and protects personal data. It helps organisations identify privacy risks, comply with regulations like GDPR and design controls to minimise harm to individuals.
DDoS (Distributed Denial of Service)
An attack that overwhelms a target's network, application or service with traffic from many distributed sources, rendering it unusable. Mitigation techniques include traffic scrubbing, rate limiting, anycast routing and scalable architectures to absorb spikes.
Deception Technology
Security tools that deploy traps, decoys and fabricated assets to mislead attackers and gather intelligence. Deception increases adversary costs and provides early detection when decoy systems are probed or interacted with.
Defense in Depth
A layered security strategy that applies multiple controls—preventive, detective and responsive—across people, processes and technology. If one layer fails, others reduce the likelihood of compromise, creating redundancy against diverse threats.
DevSecOps
The integration of security practices into DevOps processes. DevSecOps emphasises collaboration among development, operations and security teams, automates testing (SAST, DAST, SCA), uses infrastructure as code, and shifts security left while maintaining speed and reliability.
Digital Forensics
The practice of collecting, preserving, analysing and presenting digital evidence in a manner suitable for legal proceedings. Forensic investigators follow chain-of-custody procedures, use specialised tools to recover deleted data and reconstruct events.
Directory Traversal
A vulnerability that allows attackers to access files and directories outside the intended web root by manipulating file-path inputs (e.g., using ../). Proper validation and sandboxing prevent unauthorised file reads or modifications.
Domain Spoofing
The act of forging a domain name in emails or websites to impersonate a trusted entity. Attackers use domain spoofing for phishing, brand abuse or ad fraud. Authentication protocols like SPF, DKIM and DMARC help verify legitimate domains.
Dynamic Application Security Testing (DAST)
Tools that analyse a running application to find vulnerabilities by sending malicious inputs and observing outputs. DAST identifies issues such as SQL injection, cross-site scripting and insecure configurations without access to source code.