vocabularyI2L Flashcards
IDEA
International Data Encryption Algorithm is a symmetric cryptographic algorithm developed as a stronger alternative to DES. IDEA is a block cipher that operates on 64-bit blocks, the key starts at 128 bits and is broken into 52 16-bit subkeys, and the subkeys are used to encrypt the plaintext.
Identification
A claim to be a valid subject.
IDS
An intrusion detection system inspects all network activity and identifies any suspicious patterns indicative of an attack.
IEEE
The Institute of Electrical and Electronics Engineers is an organization composed of engineers, scientists, and students. The IEEE focuses on creating standards for the computer and electronics industry.
Illegal Content
The transfer of data from or to a protected machine, or the storage of illegal content on a protected machine.
IMAP
Internet Message Access Protocol is a protocol used by e-mail programs to gain access to e-mail and bulletin board messages that are stored on a mail server.
Incident
Any actual or threatened violation of a security policy. An incident may or may not actually violate a statute or regulation.
Incremental Backup
A backup type that includes all files whose time/date stamp has changed since the last backup.
Inference
The ability to gain information about data at sensitivity levels for which a user is not cleared.
Information Flow Model
A security model that controls all of the information flowing from object to subject.
Information Warfare
The use of information or systems to deny or destroy an enemys information and systems.
Infrastructure
Hardware including transmission media, telephone lines, cable, satellites, routers, and other devices that are used to control transmission paths. Infrastructure may also be the software used to manage transmission signals.
Integrity
Part of the security triad that protects data from unauthorized modification by means of physical security or access control.
Intellectual Property Law
Several types of laws which help to protect the intellectual property of individuals and organizations.
Intrusion Detection Control
An automated system that recognizes unusual activity and then sounds an alarm. An intrusion detection control can use a signature database or behavior detection.
IP Spoofing
An attack that replaces the true senders IP address with another IP address.
IPSec
The Internet Protocol Security is an authentication and encryption algorithm that guarantees integrity and confidentiality of information.
ISAKMP
Internet Security Association and Key Management Protocol is a protocol that provides background services for IPSec. It also provides a method to maintain security associations of IPSec machines.
ISDN
Integrated Services Digital Network is the telephone company communication protocol that enables data, voice, and other traffic to travel across telephone networks.
ISO
The International Organization for Standardization is an international organization that establishes global standards for protocols, communication, and information exchange. ISO is commonly and incorrectly referred to as the International Standards Organization.
ISO/OSI Reference Model
The International Organization for Standardization Open Systems Interconnection reference model is a seven-layer network architecture model of communication for dissimilar machines. It is a multilayered system in which the protocols only speak to the upper or lower layer and each layer identifies specific network functions.
ITSEC
Information Technology Security Evaluation Criteria is the criteria that preceded TCSEC and is used for evaluating functionality and assurance. ITSEC is only used in Europe.
Java Applet
An applet that is a fully interpreted, multithreaded language written by Sun Microsystems in which distributed programs run on the client in a limited memory area called a sandbox.
K1, K2, K3
The 3DES encryption keys.
KDC
Key Distribution Center is a component of the Kerberos system which holds all cryptographic keys. The KDC must be communicated with at every phase in order to initiate any type of authentication.
Kerberos
A product developed by MIT that provides authentication and message protection using one key to encrypt a message on one side and the same key to decrypt the message on the other side.
Kernel
The core of the operating system that launches applications and manages memory, files, and time and date.
Key
A value that is used by an algorithm to encrypt plaintext.
Known Plaintext
A type of attack in which the attacker has a copy of the plaintext and ciphertext version of the protected file. These allow the user to analyze the relationship between the plaintext and ciphertext.
L2F
Layer 2 Forwarding was designed by Cisco to enable VPDNs from home computers to the enterprise.
L2TP
Layer 2 Tunneling Protocol is an extension of the PPTP. L2TP is used on the Internet to create private virtual circuits.
LAN
A local area network is a data network covering a relatively small geographic area that is capable of high speeds and low occurrences of errors.
Layering
A process of level isolation that defines several protection rings within a system. Each process or ring is assigned a specific level of access.
Layering
A protection mechanism technique where layers of functionality are established with the most sensitive processes at the bottom layer. Each layer communicates with the other layers through well-defined, secure paths.
Least Privilege
A concept that grants subjects only enough access for objects to perform the required tasks. The goal is to limit authorization creep.
Lighting Control
The most basic and common physical control that is used for perimeter security. Lighting is illuminating an area and is best used in low-threat areas without jeopardizing other security controls.
Local Environment
An environment in which the application or the application partition runs largely on one platform.
Logic Bomb
An attack where a specific set of instructions is executed when a specific event occurs.
Logical Data Flow
The manner in which data flows from a layer on the source machine to the same layer on the target machine.