Day 7 Flashcards
This is a symmetric cipher that is block-oriented, with the key size of 128 bits.
IDEA
International Data Encryption Algorithm
The wiring panels linked by risers between floors to perform cross-connection.
IDF
Intermediate Distribution Frame
A service that contain subjects and can perform centralized authentication on behalf of service providers.
IdP
Identity Provider
A generic term referring to generating alerts four malicious activity.
IDS
Intrusion Detection System
The mission of the IEEE is to promote and develop technological advances for the benefit of humanity.
IEEE
Institute of Electrical and Electronics Engineers
This is used prior to IPSEC for the negotiation, exchange and management of symmetric key information.
IKE
Internet Key Exchange
A class of online chat that offers real-time transmission of messages over the Internet and local area networks.
IM
Instant Messaging
The archival of information, bit by bit, or sector by sector to alternative media.
Image
Drive cloning
This application listens on TCP/143 and it is clear text form.
IMAP4
Internet Message Access Protocol v4
It moves files to alternative media that have the archive bit set, and then it clears it.
Incremental BU
Incremental backup
The verification of programmatic input to an application.
Input validation
Inspection or sanitation
Artifacts and other forensic data that may be used to identify illicit activity, malware and data breaches.
IoC
Indicators of Compromise
A reference to network devices that typically have little defensive capability.
IoT
Internet of Things
A layer 3 system for addressing, fragmenting, reassembly and delivery of datagrams.
IP
Internet Protocol
A security measure designed to detect as well as prevent threats from advancing or escalating.
IPS
Intrusion Prevention System