Day 7 Reversed Flashcards
IDEA
International Data Encryption Algorithm
This is a symmetric cipher that is block-oriented, with the key size of 128 bits.
IDF
Intermediate Distribution Frame
The wiring panels linked by risers between floors to perform cross-connection.
IdP
Identity Provider
A service that contain subjects and can perform centralized authentication on behalf of service providers.
IDS
Intrusion Detection System
A generic term referring to generating alerts four malicious activity.
IEEE
Institute of Electrical and Electronics Engineers
The mission of the IEEE is to promote and develop technological advances for the benefit of humanity.
IKE
Internet Key Exchange
This is used prior to IPSEC for the negotiation, exchange and management of symmetric key information.
IM
Instant Messaging
A class of online chat that offers real-time transmission of messages over the Internet and local area networks.
Image
Drive Cloning
The archival of information, bit by bit, or sector by sector to alternative media.
IMAP4
Internet Message Access Protocol v4
This application listens on TCP/143 and it is clear text form.
Incremental BU
Incremental Backup
It moves files to alternative media that have the archive bit set, and then it clears it.
Input Validation
Inspection or Sanitation
The verification of programmatic input to an application.
IoC
Indicators of Compromise
Artifacts and other forensic data that may be used to identify illicit activity, malware and data breaches.
IoT
Internet of Things
A reference to network devices that typically have little defensive capability.
IP
Internet Protocol
A layer 3 system for addressing, fragmenting, reassembly and delivery of datagrams.
IPS
Intrusion Prevention System
A security measure designed to detect as well as prevent threats from advancing or escalating.
IPSec
Internet Protocol Security
Generally considered the most secure remote access protocol.
IPv6
Internet Protocol version 6
Greatly expands the address in space, provides for simplified headers and has hexadecimal addressing.
IR
Incident Response
A generic reference to steps to be taken after specific adverse events occur.
IRC
Internet Relay Chat
A protocol commonly implemented by helpdesks and Bots.
IRP
Incident Response Plan
Devised plans to be implemented upon the manifestation of a specific threat.
ISA
Interconnection Security Agreement
The agreed-upon measures, settings and protocols taken by two organizations to facilitate communication.
ISFW
Internal Segmentation Firewall
A network firewall placed on the intranet to separate two different security zones.
ISO
International Organization for Standardization
An international nonprofit organization that develops and publishes standards.
ISP
Internet Service Provider
An organization that facilitates access to a worldwide digital network.
ISSO
Information Systems Security Officer
An organizational role charged with developing, implementing, testing and reviewing IT security.
ITCP
IT Contingency Plan
Minimizing risk by identifying threats of the vulnerabilities in the appropriate measures to limit or prevent them.
IV
Initialization Vector
This is a random number that augments a secret key to enhance security for a session.
KDC
Key Distribution Center
The key server in a Kerberos realm that has access to the keys for all principles.