Glossary- I Flashcards
dentification
The process of asserting one’s identity without providing proof of that identity. See also authentication.
identity management
The activity of managing the identity of each employee, con- tractor, temporary worker, and, optionally, customer, for use in a single environment or multiple environments.
impact
The actual or expected result from some action such as a disaster.
impact analysis
The analysis of a threat and the impact it would have if it were realized.
implementation
A step in the software development life cycle where new or updated software is placed into the production environment and started.
incident
Any event that is not part of the standard operation of a service and that causes, or may cause, interruption to, or a reduction in, the quality of that service.
incident management
The IT function that analyzes service outages, service slow- downs, security incidents, and software bugs, and seeks to resolve them to restore nor- mal service. See also IT service management.
incident prevention
Proactive steps taken to reduce the probability and/or impact of security incidents.
independence
The characteristic of an auditor and his or her relationship to a party being audited. An auditor should be independent of the auditee; this permits the audi- tor to be objective.
index
An entity in a relational database management system (rDBMS) that facilitates rapid searching for specific rows in a table based on one of the fields other than the pri- mary key. See also relational database management system, table, row, field, and primary key.
inert gas
A fire suppression system that floods a room with an inert gas, displacing oxygen from the room and extinguishing the fire.
information classification
The process of assigning a sensitivity classification to an information asset.
information leakage
The tendency for sensitive information to leak out of an organi- zation’s databases through various means, most of which are perpetrated by the orga- nization’s personnel.
information security management
The aggregation of policies, processes, proce- dures, and activities to ensure that an organization’s security policy is effective.
information security policy
A statement that defines how an organization will clas- sify and protect its important assets.
Infrared Data Association (IrDA)
The organization that has developed technical standards for point-to-point data communications using infrared light. IrDA has large- ly been replaced with Bluetooth and USB.
infrastructure
The collection of networks, network services, devices, facilities, and system software that facilitate access to, communications with, and protection of busi- ness applications.
infrastructure as a service
A cloud computing model where a service provider makes computers and other infrastructure components available to subscribers. See also cloud computing.
inherent risk
The risk that there are material weaknesses in existing business pro- cesses and no compensating controls to detect or prevent them.
inheritance
The property of a class where class attributes are passed to its children. See also class.
initialization vector (IV)
A random number that is needed by some encryption algo- rithms to begin the encryption process.
input authorization
Controls that ensure all data that is input into an information system is authorized by management.
input controls
Administrative and technical controls that determine what data is per- mitted to be input into an information system. These controls exist to ensure the integ- rity of information in a system.
input validation
Controls that ensure the type and values of information that are input into a system are appropriate and reasonable.
input/output (I/O) device
Any device that can be connected to a computer that per- mits the computer to send data to the device as well as receive data from the device.