CISSP – Glossary Term I

CISSP LogoThis is my personal glossary about my preparation for obtain CISSP Certification and understand all Security keywords.  Here all keywords  beginning by letter I.

 

 

 

 

I

Identification: The means by which a user claims a specific, unproven identity to a system.

Identity Management: The processes and procedures that support the life cycle of people’s identities in an organization.

IETF: Internet Engineering Task Force.

Inference: The ability of users to figure out information about data at a sensitivity level for which they’re not authorized.

Inference Channel: A link that allows inference to occur.

Inference Engine: An artificial intelligence system that derives answer from a knowledge base.

Information custodian (Or custodian): The individual who has the day-to-day responsibility of protecting information assets.

Information flow model: A lattice-based model in which each object is assigned a security class and value, and their direction of flow is controlled by a security policy.

Information owner (or owner): The individual who decides who’s allowed access  to a file and what privileges are granted. 

Inrush: Initial Electric power surge experienced when electrical equipment is turned on.

Integrated Services Digital Network (ISDN): A low-bandwidth communication protocol that operates over analog telecommunications voices lines.

Integrity: Safeguard the accuracy and completeness of information and processing methods, and ensures that

  • Modification to data aren’t made by unauthorized users or processes.
  • Unauthorized modifications to data aren’t made by authorized users or processes.
  • Data us internally and externally consistent, meaning a given input produces and expected output.

Intellectual property: Includes patents, trademarks, copyrights and trade secrets.

Internet: The worldwide, publicly accessible network that connects the networks of organizations.

Internet Control Message Protocol (ICMP): An Internet Protocol used to transmit diagnostic messages.

Internet Protocol (IP): The open systems interconnection (OSI) layer 3 protocol that’s the basis of the modern Internet.

Internet Protocol Security (IPSec): An IETF open-standard Virtual Private Network (VPN) protocol for secure communications over public IP-based networks.

Internetwork Packet Exchange (IPX): A network packet-oriented protocol that’s the basis for Novell Netware networks (IPX is analogous to IP. Legacy).

Intranet: An organization’s private network that’s used to securely share information among the organization’s employees.

Intrusion Detection System (IDS): A hardware of software application that detects and blocks suspected network or hosts intrusions.

Intrusion Prevention System (IPS): A hardware or software application that both detects and blocks suspected network or host intrusions.