I Flashcards

1
Q

IaaS

A

Infrastructure as a Service

A cloud computing model that provides on-demand access to computing resources such as servers, storage, networking, and virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IaC

A

Infrastructure as Code

A method of controlling hardware infrastructures (servers, databases) using software. This is usually written in JSON or YAML, but can be in a variety of languages.

It is used to automate the process of provisioning and managing infrastructure, eliminating the need for manual configuration steps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IAM

A

Identity and Access Management

A system that defines and manages user roles and access privileges, and integrates with other technologies to enable secure authentication and authorization.

Essentially, it allows administrators to centralize manage permissions and authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ICMP

A

Internet Control Message Protocol

A network layer protocol that allows network devices to communicate important information, such as network status and connectivity. ICMP is a connectionless protocol, meaning that devices can send ICMP messages without first opening a connection with another device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ICS

A

Industrial Control System

An information system used to control industrial processes such as manufacturing, product handling, production, and distribution.

General term that encompasses several types of control systems, including supervisory control and data acquisition (SCADA) systems, distributed control systems (DCS), and other control system configurations that are often found in the industrial sectors and critical infrastructures, such as programmable logic controllers (PLC). An ICS consists of combinations of control components (e.g., electrical, mechanical, hydraulic, pneumatic) that act together to achieve an industrial objective (e.g., manufacturing, transportation of matter or energy).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IDEA

A

International Data Encryption Algorithm

A form of symmetric key block cipher encryption. IDEA uses a 128-bit key and operates on 64-bit blocks. Essentially, it encrypts a 64-bit block of plaintext into a 64-bit block of ciphertext. This input plaintext block is divided into four subblocks of 16 bits each.

It was created to replace DES, and used to be proprietary. It is now free.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IDF

A

Intermediate Distribution Frame

A rack that manages and connects telecommunications cables between a main distribution frame (MDF) and remote devices. IDFs are often located in closets or equipment rooms on different floors of a building or campus, and are designed to be close to the devices they connect to.

It cross connects and manages the IT or telecommunications cabling between a main distribution frame (MDF) and remote workstation devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

IdP

A

Identity Provider

A third-party service that stores, manages, and verifies user identity. They are typically cloud-hosted services, and they often work with single sign-on (SSO) providers to authenticate users.

Companies use these services to allow their employees or users to connect with the resources they need. They provide a way to manage access, adding or removing privileges while security remains tight.

The IdP can either directly authenticate the user or can provide authentication services to third-party service providers (apps, websites, or other digital services).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IDS

A

Intrusion Detection System

A network security technology built for detecting vulnerability exploits against a target application or computer. The IDS is also a listen-only device. The IDS monitors traffic and reports results to an administrator.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IEEE

A

Institute of Electronical and Electronics Engineers

The IEEE describes itself as “the world’s largest technical professional society – promoting the development and application of electrotechnology and allied sciences for the benefit of humanity, the advancement of the profession, and the well-being of our members.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IKE

A

Internet Key Exchange

In computing, Internet Key Exchange is the protocol used to set up a security association in the IPsec protocol suite.

A secure key management protocol that is used to set up a secure, authenticated communications channel between two devices. It’s used to establish and manage VPNs, as well as used for site-to-site communication and mobile device security.

IKE employs a combination of encryption algorithms, key exchange methods, and security policies to authenticate and secure network connections, making it a cornerstone of modern cybersecurity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

IM

A

Instant Messaging

A way for people to exchange messages in real-time over the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IMAP

A

Internet Message Access Protocol

A communication standard that allows users to access their email from any device. IMAP acts as an intermediary between email clients and servers, storing emails on a remote server and downloading them on demand when the recipient opens them. This means that when a user reads an email using IMAP, they aren’t actually downloading or storing it on their computer, but instead reading it from the email service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IoC

A

Indicators of Compromise

Pieces of digital forensics that suggests that an endpoint or network may have been breached.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

IoT

A

Internet of Things

A network of physical devices that can connect and exchange data with each other and the cloud without human intervention. IoT devices are often embedded with sensors, software, and other technologies, and are sometimes called “smart objects”. The goal of IoT is to create devices that can communicate with each other and users in real time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IP

A

Internet Protocol

A protocol, or set of rules, for routing and addressing packets of data so that they can travel across networks and arrive at the correct destination.

17
Q

IPS

A

Intrusion Prevention System

Hardware or software that continuously monitors network traffic for suspicious activity, such as attack characteristics or traffic patterns. When an IPS identifies a potential threat, it can generate alerts, block the attack, isolate the infected system, or take other actions such as terminating dangerous connections or removing malicious content.

18
Q

IPsec

A

Internet Protocol Security

A group of networking protocols used for setting up secure encrypted connections, such as VPNs, across publicly shared networks.

19
Q

IR
(not infrared)

A

Incident Response

A company’s systems and processes for identifying and responding to cyberattacks or security breaches. The goal of IR is to quickly detect and contain an attack, minimize its effects, and remediate the cause to reduce the risk of future incidents. IR can also help to limit damage to a company’s technology infrastructure and reputation, and reduce recovery time and costs.

20
Q

IRC

A

Internet Relay Chat

An open-source protocol and text-based chat system for instant messaging. A network of internet servers that allows users to have real-time text conversations with each other using a specific protocol. It was created in 1988 and is one of the earliest forms of internet chat.

21
Q

IRP

A

Incident Response Plan

A written document that helps an organization prepare for, respond to, and recover from a security incident. The goal of an IRP is to minimize the impact of the incident and ensure that the organization’s team can take quick and effective action.

It focuses specifically on cybersecurity incidents.

(In contrast to a DRP, which has a bird’s-eye view involving not just IT recovery, but also the restoration of critical functions across all departments. This also includes other disaster, such as natural disasters or technical outages.)

22
Q

ISO

A

International Standards Organization

An independent, non-governmental organization that develops standards to ensure the quality, safety and efficiency of products, services and systems.

23
Q

ISP

A

Internet Service Provider

A company that provides internet access for homes and businesses.

24
Q

ISSO

A

Information Systems Security Officer

Responsible for protecting the IT infrastructure of organizations, companies, or agencies by implementing and maintaining technical security controls. It encompasses network, data, and physical protection controls.

25
Q

IV

A

Initialization Vector

A random or pseudorandom sequence of characters that is used in cryptography to initialize an encryption algorithm.

AKA starting variable or nonce, which means “number used once”.