I Flashcards
IaaS
Infrastructure as a Service
A cloud computing model that provides on-demand access to computing resources such as servers, storage, networking, and virtualization
IaC
Infrastructure as Code
A method of controlling hardware infrastructures (servers, databases) using software. This is usually written in JSON or YAML, but can be in a variety of languages.
It is used to automate the process of provisioning and managing infrastructure, eliminating the need for manual configuration steps.
IAM
Identity and Access Management
A system that defines and manages user roles and access privileges, and integrates with other technologies to enable secure authentication and authorization.
Essentially, it allows administrators to centralize manage permissions and authentication.
ICMP
Internet Control Message Protocol
A network layer protocol that allows network devices to communicate important information, such as network status and connectivity. ICMP is a connectionless protocol, meaning that devices can send ICMP messages without first opening a connection with another device.
ICS
Industrial Control System
An information system used to control industrial processes such as manufacturing, product handling, production, and distribution.
General term that encompasses several types of control systems, including supervisory control and data acquisition (SCADA) systems, distributed control systems (DCS), and other control system configurations that are often found in the industrial sectors and critical infrastructures, such as programmable logic controllers (PLC). An ICS consists of combinations of control components (e.g., electrical, mechanical, hydraulic, pneumatic) that act together to achieve an industrial objective (e.g., manufacturing, transportation of matter or energy).
IDEA
International Data Encryption Algorithm
A form of symmetric key block cipher encryption. IDEA uses a 128-bit key and operates on 64-bit blocks. Essentially, it encrypts a 64-bit block of plaintext into a 64-bit block of ciphertext. This input plaintext block is divided into four subblocks of 16 bits each.
It was created to replace DES, and used to be proprietary. It is now free.
IDF
Intermediate Distribution Frame
A rack that manages and connects telecommunications cables between a main distribution frame (MDF) and remote devices. IDFs are often located in closets or equipment rooms on different floors of a building or campus, and are designed to be close to the devices they connect to.
It cross connects and manages the IT or telecommunications cabling between a main distribution frame (MDF) and remote workstation devices.
IdP
Identity Provider
A third-party service that stores, manages, and verifies user identity. They are typically cloud-hosted services, and they often work with single sign-on (SSO) providers to authenticate users.
Companies use these services to allow their employees or users to connect with the resources they need. They provide a way to manage access, adding or removing privileges while security remains tight.
The IdP can either directly authenticate the user or can provide authentication services to third-party service providers (apps, websites, or other digital services).
IDS
Intrusion Detection System
A network security technology built for detecting vulnerability exploits against a target application or computer. The IDS is also a listen-only device. The IDS monitors traffic and reports results to an administrator.
IEEE
Institute of Electronical and Electronics Engineers
The IEEE describes itself as “the world’s largest technical professional society – promoting the development and application of electrotechnology and allied sciences for the benefit of humanity, the advancement of the profession, and the well-being of our members.”
IKE
Internet Key Exchange
In computing, Internet Key Exchange is the protocol used to set up a security association in the IPsec protocol suite.
A secure key management protocol that is used to set up a secure, authenticated communications channel between two devices. It’s used to establish and manage VPNs, as well as used for site-to-site communication and mobile device security.
IKE employs a combination of encryption algorithms, key exchange methods, and security policies to authenticate and secure network connections, making it a cornerstone of modern cybersecurity.
IM
Instant Messaging
A way for people to exchange messages in real-time over the internet.
IMAP
Internet Message Access Protocol
A communication standard that allows users to access their email from any device. IMAP acts as an intermediary between email clients and servers, storing emails on a remote server and downloading them on demand when the recipient opens them. This means that when a user reads an email using IMAP, they aren’t actually downloading or storing it on their computer, but instead reading it from the email service.
IoC
Indicators of Compromise
Pieces of digital forensics that suggests that an endpoint or network may have been breached.
IoT
Internet of Things
A network of physical devices that can connect and exchange data with each other and the cloud without human intervention. IoT devices are often embedded with sensors, software, and other technologies, and are sometimes called “smart objects”. The goal of IoT is to create devices that can communicate with each other and users in real time.