I Flashcards
identification
A subject provides some type of data to an authentication service. Identification is the first step in the authentication process.
inference
The ability to derive information not explicitly available.
information owner
The person who has final corporate responsibility of data protection and would be the one held liable for any negligence when it comes to protecting the company’s information assets. The person who holds this role—usually a senior executive within the management group of the company—is responsible for assigning a classification to the information and dictating how the information should be protected.
Integrated Product Team (IPT)
A multidisciplinary software development team with representatives from many or all the stakeholder populations.
integrity
A security principle that makes sure that information and systems are not modified maliciously or accidentally.
Internet Small Computer System Interface (iSCSI)
A converged protocol that encapsulates SCSI data in TCP segments in order to allow peripherals to be connected to computers across networks.
intrusion detection system (IDS)
Software employed to monitor and detect possible attacks and behaviors that vary from the normal and expected activity. The IDS can be network based, which monitors network traffic, or host based, which monitors activities of a specific system and protects system files and control mechanisms.
isolation
The containment of processes in a system in such a way that they are separated from one another to ensure integrity and confidentiality.