ICMP - (Internet Control Message Protocol) - Provides a means to send error messages and a way to probe the network to determine network availability.

IDaaS - (IDentity as a Service) - A type of Software as a Service (SaaS) offering that normally provides single sign-on (SSO), federated identity management (IdM), and password management services.

identification - A subject provides some type of data to an authentication service. Identification is the first step in the authentication process.

Identity as a Service - A type of Software as a Service (SaaS) offering that normally provides single sign-on (SSO), federated identity management (IdM), and password management services.

identity proofing - The process of collecting and verifying information about a person for the purpose of proving that a person who has requested an account, a credential, or other special privilege is indeed who he or she claims to be and establishing a reliable relationship that can be trusted electronically between the individual and said credential for purposes of electronic authentication.

IDS - (Intrustion Detection System) - Software employed to monitor and detect possible attacks and behaviors that vary from the normal and expected activity. The IDS can be network based, which monitors network traffic, or host based, which monitors activities of a specific system and protects system files and control mechanisms.

IGMP - (Internet Group Management Protocol) - Used to manage multicasting groups that are a set of hosts anywhere on a network that are listening for a transmission.

inference - The ability to derive information not explicitly available.

information owner - The person who has final corporate responsibility of data protection and would be the one held liable for any negligence when it comes to protecting the company\'s information assets. The person who holds this role

initialization vector - A non-secret binary vector used as the initializing input algorithm, or a random starting point, for the encryption of a plaintext block sequence to increase security by introducing additional cryptographic variance and to synchronize cryptographic equipment.

integrated process and product development - A management technique that simultaneously integrates all essential acquisition activities through the use of multidisciplinary teams to optimize the design, manufacturing, and supportability processes.

Integrated Product Team - A multidisciplinary software development team with representatives from many or all the stakeholder populations.

integrity - A security principle that makes sure that information and systems are not modified maliciously or accidentally.

intellectual property - Intangible assets (notably includes software and data).

internet control message protocol - Provides a means to send error messages and a way to probe the network to determine network availability.

internet group management protocol - Used to manage multicasting groups that are a set of hosts anywhere on a network that are listening for a transmission.

internet protocol version 4 - The dominant protocol that operates at the Open Systems Interconnection (OSI) Network Layer 3. IP is responsible for addressing packets so that they can be transmitted from the source to the destination hosts.

internet protocol version 6 - A modernization of IPv4 that includes a much larger address field: IPv6 addresses are 128 bits that support 2128, or approximately 3.4

Internet Small Computer System Interface - A converged protocol that encapsulates SCSI data in TCP segments in order to allow peripherals to be connected to computers across networks.

intrusion detection system - Software employed to monitor and detect possible attacks and behaviors that vary from the normal and expected activity. The IDS can be network based, which monitors network traffic, or host based, which monitors activities of a specific system and protects system files and control mechanisms.

intrusion prevention system - An intrusion detection system (IDS) that is also able to take actions to stop a detected intrusion.

inventory - Complete list of items.

IPPD - (Integrated Process and Product Development) - A management technique that simultaneously integrates all essential acquisition activities through the use of multidisciplinary teams to optimize the design, manufacturing, and supportability processes.

IPS - (Intrusion Prevention System) - An intrusion detection system (IDS) that is also able to take actions to stop a detected intrusion.

IPT - (Integrated Product Team) - A multidisciplinary software development team with representatives from many or all the stakeholder populations.

IPv4 - (Internet Protocol version 4) - the dominant protocol that operates at the Open Systems Interconnection (OSI) Network Layer 3. IP is responsible for addressing packets so that they can be transmitted from the source to the destination hosts.

IPv6 - (Internet Protocol version 6) - A modernization of IPv4 that includes a much larger address field: IPv6 addresses are 128 bits that support 2128, or approximately 3.4

iSCSI - (internet Small Computer System Interface) - A converged protocol that encapsulates SCSI data in TCP segments in order to allow peripherals to be connected to computers across networks.

isolation - The containment of processes in a system in such a way that they are separated from one another to ensure integrity and confidentiality.

IV - (Initialization Vector) - A non-secret binary vector used as the initializing input algorithm, or a random starting point, for the encryption of a plaintext block sequence to increase security by introducing additional cryptographic variance and to synchronize cryptographic equipment.

0 Shares
Share via
Copy link
Powered by Social Snap