I Flashcards
IaaS
Infrastructure as a Service
Implementing cloud-based networks, servers and other
infrastructure. user manages the most.
IAM
Identity and Access Management
The policies, procedures and technologies that facilitate
ensuring that only the appropriate personnel have access
to resources in an organization.
ICMP
Internet Control Message Protocol
A multifunctional protocol designed to perform network
testing and report errors. (ping)
ICS
Industrial Control Systems
Semi-intelligent devices used to control industrial or
scientific equipment from central consoles.
IDEA
International Data Encryption Algorithm
This is a symmetric cipher that is block-oriented, with
the key size of 128 bits.
IDF
Intermediate Distribution Frame
The wiring panels linked by risers between floors to
perform cross-connection.
IdP
Identity Provider
A service that contain subjects and can perform
centralized authentication on behalf of service
providers.
IDS
Intrusion Detection System
A generic term referring to generating alerts four
malicious activity.
IEEE
Institute of Electrical and Electronics Engineers
The mission of the IEEE is to promote and develop
technological advances for the benefit of humanity.
IKE
Internet Key Exchange
This is used prior to IPSEC for the negotiation,
exchange and management of symmetric key
information.
IM
Instant Messaging
A class of online chat that offers real-time transmission of messages over the Internet and local area networks.
Image
Drive cloning
The archival of information, bit by bit, or sector by
sector to alternative media.
IMAP4
Internet Message Access Protocol v4
This application listens on TCP/143 and it is clear text
form.
Incremental
BU
Incremental backup
It moves files to alternative media that have the archive
bit set, and then it clears it.
Input
validation
Inspection or sanitation
The verification of programmatic input to an
application.
IoC
Indicators of Compromise
Artifacts and other forensic data that may be used to
identify illicit activity, malware and data breaches.
IoT
Internet of Things
A reference to network devices that typically have little
defensive capability.
IP
Internet Protocol
A layer 3 system for addressing, fragmenting,
reassembly and delivery of datagrams.
IPS
Intrusion Prevention System
A security measure designed to detect as well as prevent
threats from advancing or escalating.
IPSec
Internet Protocol Security
Generally considered the most secure remote access
protocol.
IPv6
Internet Protocol version 6
Greatly expands the address in space, provides for
simplified headers and has hexadecimal addressing.
IR
Incident Response
A generic reference to steps to be taken after specific
adverse events occur.
IRC
Internet Relay Chat
A protocol commonly implemented by helpdesks and
Bots.
IRP
Incident Response Plan
Devised plans to be implemented upon the
manifestation of a specific threat.
ISA
Interconnection Security Agreement
The agreed-upon measures, settings and protocols taken
by two organizations to facilitate communication.
ISFW
Internal Segmentation Firewall
A network firewall placed on the intranet to separate
two different security zones.
ISO
International Organization
for Standardization
An international nonprofit organization that develops
and publishes standards.
ISP
Internet Service Provider
An organization that facilitates access to a worldwide
digital network.
ISSO
Information Systems
Security Officer
An organizational role charged with developing,
implementing, testing and reviewing IT security.
ITCP
IT Contingency Plan
Minimizing risk by identifying threats of the
vulnerabilities in the appropriate measures to limit or
prevent them.
IV
Initialization Vector
This is a random number that augments a secret key to
enhance security for a session.