I Flashcards
IaaS
Infrastructure as a Service
A cloud computing model that provides on-demand access to computing resources such as servers, storage, networking, and virtualization
IaC
Infrastructure as Code
A method of controlling hardware infrastructures (servers, databases) using software. This is usually written in JSON or YAML, but can be in a variety of languages.
It is used to automate the process of provisioning and managing infrastructure, eliminating the need for manual configuration steps.
IAM
Identity and Access Management
A system that defines and manages user roles and access privileges, and integrates with other technologies to enable secure authentication and authorization.
Essentially, it allows administrators to centralize manage permissions and authentication.
ICMP
Internet Control Message Protocol
A network layer protocol that allows network devices to communicate important information, such as network status and connectivity. ICMP is a connectionless protocol, meaning that devices can send ICMP messages without first opening a connection with another device.
ICS
Industrial Control System
An information system used to control industrial processes such as manufacturing, product handling, production, and distribution.
General term that encompasses several types of control systems, including supervisory control and data acquisition (SCADA) systems, distributed control systems (DCS), and other control system configurations that are often found in the industrial sectors and critical infrastructures, such as programmable logic controllers (PLC). An ICS consists of combinations of control components (e.g., electrical, mechanical, hydraulic, pneumatic) that act together to achieve an industrial objective (e.g., manufacturing, transportation of matter or energy).
IDEA
International Data Encryption Algorithm
A form of symmetric key block cipher encryption. IDEA uses a 128-bit key and operates on 64-bit blocks. Essentially, it encrypts a 64-bit block of plaintext into a 64-bit block of ciphertext. This input plaintext block is divided into four subblocks of 16 bits each.
It was created to replace DES, and used to be proprietary. It is now free.
IDF
Intermediate Distribution Frame
A rack that manages and connects telecommunications cables between a main distribution frame (MDF) and remote devices. IDFs are often located in closets or equipment rooms on different floors of a building or campus, and are designed to be close to the devices they connect to.
It cross connects and manages the IT or telecommunications cabling between a main distribution frame (MDF) and remote workstation devices.
IdP
Identity Provider
A third-party service that stores, manages, and verifies user identity. They are typically cloud-hosted services, and they often work with single sign-on (SSO) providers to authenticate users.
Companies use these services to allow their employees or users to connect with the resources they need. They provide a way to manage access, adding or removing privileges while security remains tight.
The IdP can either directly authenticate the user or can provide authentication services to third-party service providers (apps, websites, or other digital services).
IDS
Intrusion Detection System
A network security technology built for detecting vulnerability exploits against a target application or computer. The IDS is also a listen-only device. The IDS monitors traffic and reports results to an administrator.
IEEE
Institute of Electronical and Electronics Engineers
The IEEE describes itself as “the world’s largest technical professional society – promoting the development and application of electrotechnology and allied sciences for the benefit of humanity, the advancement of the profession, and the well-being of our members.”
IKE
Internet Key Exchange
In computing, Internet Key Exchange is the protocol used to set up a security association in the IPsec protocol suite.
A secure key management protocol that is used to set up a secure, authenticated communications channel between two devices. It’s used to establish and manage VPNs, as well as used for site-to-site communication and mobile device security.
IKE employs a combination of encryption algorithms, key exchange methods, and security policies to authenticate and secure network connections, making it a cornerstone of modern cybersecurity.
IM
Instant Messaging
A way for people to exchange messages in real-time over the internet.
IMAP
Internet Message Access Protocol
A communication standard that allows users to access their email from any device. IMAP acts as an intermediary between email clients and servers, storing emails on a remote server and downloading them on demand when the recipient opens them. This means that when a user reads an email using IMAP, they aren’t actually downloading or storing it on their computer, but instead reading it from the email service.
IoC
Indicators of Compromise
Pieces of digital forensics that suggests that an endpoint or network may have been breached.
IoT
Internet of Things
A network of physical devices that can connect and exchange data with each other and the cloud without human intervention. IoT devices are often embedded with sensors, software, and other technologies, and are sometimes called “smart objects”. The goal of IoT is to create devices that can communicate with each other and users in real time.
IP
Internet Protocol
A protocol, or set of rules, for routing and addressing packets of data so that they can travel across networks and arrive at the correct destination.
IPS
Intrusion Prevention System
Hardware or software that continuously monitors network traffic for suspicious activity, such as attack characteristics or traffic patterns. When an IPS identifies a potential threat, it can generate alerts, block the attack, isolate the infected system, or take other actions such as terminating dangerous connections or removing malicious content.
IPsec
Internet Protocol Security
A group of networking protocols used for setting up secure encrypted connections, such as VPNs, across publicly shared networks.
IR
(not infrared)
Incident Response
A company’s systems and processes for identifying and responding to cyberattacks or security breaches. The goal of IR is to quickly detect and contain an attack, minimize its effects, and remediate the cause to reduce the risk of future incidents. IR can also help to limit damage to a company’s technology infrastructure and reputation, and reduce recovery time and costs.
IRC
Internet Relay Chat
An open-source protocol and text-based chat system for instant messaging. A network of internet servers that allows users to have real-time text conversations with each other using a specific protocol. It was created in 1988 and is one of the earliest forms of internet chat.
IRP
Incident Response Plan
A written document that helps an organization prepare for, respond to, and recover from a security incident. The goal of an IRP is to minimize the impact of the incident and ensure that the organization’s team can take quick and effective action.
It focuses specifically on cybersecurity incidents.
(In contrast to a DRP, which has a bird’s-eye view involving not just IT recovery, but also the restoration of critical functions across all departments. This also includes other disaster, such as natural disasters or technical outages.)
ISO
International Standards Organization
An independent, non-governmental organization that develops standards to ensure the quality, safety and efficiency of products, services and systems.
ISP
Internet Service Provider
A company that provides internet access for homes and businesses.
ISSO
Information Systems Security Officer
Responsible for protecting the IT infrastructure of organizations, companies, or agencies by implementing and maintaining technical security controls. It encompasses network, data, and physical protection controls.
IV
Initialization Vector
A random or pseudorandom sequence of characters that is used in cryptography to initialize an encryption algorithm.
AKA starting variable or nonce, which means “number used once”.