Day 7 Flashcards
This is a symmetric cipher that is block-oriented, with the key size of 128 bits.
IDEA
International Data Encryption Algorithm
The wiring panels linked by risers between floors to perform cross-connection.
IDF
Intermediate Distribution Frame
A service that contain subjects and can perform centralized authentication on behalf of service providers.
IdP
Identity Provider
A generic term referring to generating alerts four malicious activity.
IDS
Intrusion Detection System
The mission of the IEEE is to promote and develop technological advances for the benefit of humanity.
IEEE
Institute of Electrical and Electronics Engineers
This is used prior to IPSEC for the negotiation, exchange and management of symmetric key information.
IKE
Internet Key Exchange
A class of online chat that offers real-time transmission of messages over the Internet and local area networks.
IM
Instant Messaging
The archival of information, bit by bit, or sector by sector to alternative media.
Image
Drive cloning
This application listens on TCP/143 and it is clear text form.
IMAP4
Internet Message Access Protocol v4
It moves files to alternative media that have the archive bit set, and then it clears it.
Incremental BU
Incremental backup
The verification of programmatic input to an application.
Input validation
Inspection or sanitation
Artifacts and other forensic data that may be used to identify illicit activity, malware and data breaches.
IoC
Indicators of Compromise
A reference to network devices that typically have little defensive capability.
IoT
Internet of Things
A layer 3 system for addressing, fragmenting, reassembly and delivery of datagrams.
IP
Internet Protocol
A security measure designed to detect as well as prevent threats from advancing or escalating.
IPS
Intrusion Prevention System
Generally considered the most secure remote access protocol.
IPSec
Internet Protocol Security
Greatly expands the address in space, provides for simplified headers and has hexadecimal addressing.
IPv6
Internet Protocol version 6
A generic reference to steps to be taken after specific adverse events occur.
IR
Incident Response
A protocol commonly implemented by helpdesks and Bots.
IRC
Internet Relay Chat
Devised plans to be implemented upon the manifestation of a specific threat.
IRP
Incident Response Plan
The agreed-upon measures, settings and protocols taken by two organizations to facilitate communication.
ISA
Interconnection Security Agreement
A network firewall placed on the intranet to separate two different security zones.
ISFW
Internal Segmentation Firewall
An international nonprofit organization that develops and publishes standards.
ISO
International Organization for Standardization
An organization that facilitates access to a worldwide digital network.
ISP
Internet Service Provider
An organizational role charged with developing, implementing, testing and reviewing IT security.
ISSO
Information Systems Security Officer
Minimizing risk by identifying threats of the vulnerabilities in the appropriate measures to limit or prevent them.
ITCP
IT Contingency Plan
This is a random number that augments a secret key to enhance security for a session.
IV
Initialization Vector
The key server in a Kerberos realm that has access to the keys for all principles.
KDC
Key Distribution Center