I Flashcards
IaaS
Infrastructure as a Service
Implementing cloud-based networks, servers and other
infrastructure. user manages the most.
IAM
Identity and Access Management
The policies, procedures and technologies that facilitate
ensuring that only the appropriate personnel have access
to resources in an organization.
ICMP
Internet Control Message Protocol
A multifunctional protocol designed to perform network
testing and report errors. (ping)
ICS
Industrial Control Systems
Semi-intelligent devices used to control industrial or
scientific equipment from central consoles.
IDEA
International Data Encryption Algorithm
This is a symmetric cipher that is block-oriented, with
the key size of 128 bits.
IDF
Intermediate Distribution Frame
The wiring panels linked by risers between floors to
perform cross-connection.
IdP
Identity Provider
A service that contain subjects and can perform
centralized authentication on behalf of service
providers.
IDS
Intrusion Detection System
A generic term referring to generating alerts four
malicious activity.
IEEE
Institute of Electrical and Electronics Engineers
The mission of the IEEE is to promote and develop
technological advances for the benefit of humanity.
IKE
Internet Key Exchange
This is used prior to IPSEC for the negotiation,
exchange and management of symmetric key
information.
IM
Instant Messaging
A class of online chat that offers real-time transmission of messages over the Internet and local area networks.
Image
Drive cloning
The archival of information, bit by bit, or sector by
sector to alternative media.
IMAP4
Internet Message Access Protocol v4
This application listens on TCP/143 and it is clear text
form.
Incremental
BU
Incremental backup
It moves files to alternative media that have the archive
bit set, and then it clears it.
Input
validation
Inspection or sanitation
The verification of programmatic input to an
application.