This is my personal glossary about my preparation for obtain CISSP Certification and understand all Security keywords. Here all keywords beginning by letter I.
I
Identification: The means by which a user claims a specific, unproven identity to a system.
Identity Management: The processes and procedures that support the life cycle of people’s identities in an organization.
IETF: Internet Engineering Task Force.
Inference: The ability of users to figure out information about data at a sensitivity level for which they’re not authorized.
Inference Channel: A link that allows inference to occur.
Inference Engine: An artificial intelligence system that derives answer from a knowledge base.
Information custodian (Or custodian): The individual who has the day-to-day responsibility of protecting information assets.
Information flow model: A lattice-based model in which each object is assigned a security class and value, and their direction of flow is controlled by a security policy.
Information owner (or owner): The individual who decides who’s allowed access to a file and what privileges are granted.
Inrush: Initial Electric power surge experienced when electrical equipment is turned on.
Integrated Services Digital Network (ISDN): A low-bandwidth communication protocol that operates over analog telecommunications voices lines.
Integrity: Safeguard the accuracy and completeness of information and processing methods, and ensures that
- Modification to data aren’t made by unauthorized users or processes.
- Unauthorized modifications to data aren’t made by authorized users or processes.
- Data us internally and externally consistent, meaning a given input produces and expected output.
Intellectual property: Includes patents, trademarks, copyrights and trade secrets.
Internet: The worldwide, publicly accessible network that connects the networks of organizations.
Internet Control Message Protocol (ICMP): An Internet Protocol used to transmit diagnostic messages.
Internet Protocol (IP): The open systems interconnection (OSI) layer 3 protocol that’s the basis of the modern Internet.
Internet Protocol Security (IPSec): An IETF open-standard Virtual Private Network (VPN) protocol for secure communications over public IP-based networks.
Internetwork Packet Exchange (IPX): A network packet-oriented protocol that’s the basis for Novell Netware networks (IPX is analogous to IP. Legacy).
Intranet: An organization’s private network that’s used to securely share information among the organization’s employees.
Intrusion Detection System (IDS): A hardware of software application that detects and blocks suspected network or hosts intrusions.
Intrusion Prevention System (IPS): A hardware or software application that both detects and blocks suspected network or host intrusions.