vocabularyI2L Flashcards
IDEA
International Data Encryption Algorithm is a symmetric cryptographic algorithm developed as a stronger alternative to DES. IDEA is a block cipher that operates on 64-bit blocks, the key starts at 128 bits and is broken into 52 16-bit subkeys, and the subkeys are used to encrypt the plaintext.
Identification
A claim to be a valid subject.
IDS
An intrusion detection system inspects all network activity and identifies any suspicious patterns indicative of an attack.
IEEE
The Institute of Electrical and Electronics Engineers is an organization composed of engineers, scientists, and students. The IEEE focuses on creating standards for the computer and electronics industry.
Illegal Content
The transfer of data from or to a protected machine, or the storage of illegal content on a protected machine.
IMAP
Internet Message Access Protocol is a protocol used by e-mail programs to gain access to e-mail and bulletin board messages that are stored on a mail server.
Incident
Any actual or threatened violation of a security policy. An incident may or may not actually violate a statute or regulation.
Incremental Backup
A backup type that includes all files whose time/date stamp has changed since the last backup.
Inference
The ability to gain information about data at sensitivity levels for which a user is not cleared.
Information Flow Model
A security model that controls all of the information flowing from object to subject.
Information Warfare
The use of information or systems to deny or destroy an enemys information and systems.
Infrastructure
Hardware including transmission media, telephone lines, cable, satellites, routers, and other devices that are used to control transmission paths. Infrastructure may also be the software used to manage transmission signals.
Integrity
Part of the security triad that protects data from unauthorized modification by means of physical security or access control.
Intellectual Property Law
Several types of laws which help to protect the intellectual property of individuals and organizations.
Intrusion Detection Control
An automated system that recognizes unusual activity and then sounds an alarm. An intrusion detection control can use a signature database or behavior detection.