Acronyms (Page 8) Flashcards
IEEE
Institute of Electrical and Electronics Engineers
A professional association with its corporate office in New York City and its operations center in Piscataway, New Jersey, dedicated to advancing technology for the benefit of humanity.
IKE
Internet Key Exchange
A protocol used in IPsec for establishing a Security Association (SA) and cryptographic keys in an IP network.
IM
Instant Messaging
A type of online chat that offers real-time text transmission over the internet.
IMAP
Internet Message Access Protocol
An internet standard protocol used by email clients to retrieve messages from a mail server over a TCP/IP connection.
IoC
Indicators of Compromise
Artifacts observed on a network or in an operating system that with high confidence indicate a computer intrusion.
IoT
Internet of Things
The extension of Internet connectivity into physical devices and everyday objects.
IP
Internet Protocol
The principal communications protocol in the Internet protocol suite for relaying datagrams across network boundaries.
IPS
Intrusion Prevention System
A network security/threat prevention technology that examines network traffic flows to detect and prevent vulnerability exploits.
IPSec
Internet Protocol Security
A secure network protocol suite that authenticates and encrypts the packets of data sent over an internet protocol network.
IR
Incident Response
An organized approach to addressing and managing the aftermath of a security breach or cyberattack.
IRC
Internet Relay Chat
An application layer protocol that facilitates communication in the form of text.
IRP
Incident Response Plan
A set of instructions to help IT staff detect, respond to, and recover from network security incidents.
ISO
International Standards Organization
An independent, non-governmental international organization with a membership of 164 national standards bodies.
ISP
Internet Service Provider
A company that provides subscribers with access to the Internet.
ISSO
Information Systems Security Officer
A person responsible for ensuring the appropriate operational security posture is maintained for an information system.