Debugging is the process of identifing and resolving defects that prevent computer software or normal system operations.
Decryption is the process of converting secure files or messages into their original format - such as plain text.
In-Depth is a system security principle comprising multiple layers of security measures and tools to enforce authorization and protect against single point security failures.
DMZ is often referred to as the perimeter network and comprises physical or logical subnetwork desighned to expose externally facing services to an untrusted network - like the internet.
DMZ is generally used to host web servers and some application servers which need to communicate across the internet.