Glossary: I -TEISS® : Cracking Cyber Security

Glossary / Glossary: I

Glossary: I

1-10  a  b  c  d  e  f  g  h  i  j  k  l  m  n  o  p  q  r  s  t  u  v  w  x  y  

IA See Information Assurance
IDPS Intrusion Detection and Prevention System. A system that auto-mates the process of monitoring what is happening in a computer system and attempting to stop potential incidents
IDS Intrusion Detection System. See IDPS
IM See Instant Messaging
Impact A commonly used element in quantifying the importance of a risk; the extent of the effect of an incident on an organisation and the time and cost to repair any damage after the incident; it is often combined with Likelihood (qv)
Incident In cyber security a problematic human generated event (qv) in an IT network or on a computer; an event that is an attack (qv) or a violation of agreed policies; all incidents are events but many events (e.g. random flaws or failures of components) are not incidents
Incident handling Processes designed to prevent or limit damage to information or computer systems following an incident such as a violation of se­curity policies and recommended practices
Incident investigation An investigation that seeks to determine the causes and conse­quences of a security incident
Incident response Incident handling
Incident response team See CSIRT
Incremental backup An efficient way of backing up data as only files that have been changed or added since the last back up are backed up
Indicator A sign that an incident (qv) may have occurred or may be cur­rently occurring
Information Information is data (qv) that has been given some context or organization that means it can be analysed, understood or used in some way. How well my son scored in a computer science test compared to his classmates is information. See also Data, Knowledge, Wisdom
Information Assurance (IA) Measures designed to assure information is available, integrious, confidential, and authentic
Information security A general term referring to the overall security in terms of con­fidentiality, access and integrity of information, both digital and physical (e.g. paper documents); related to but not the same as Cyber security (qv)
Information security policy A set of rules and guidelines that describes how an organisation protects and distributes corporate information
Infosec See Information security
Inherent risk The risk that an activity would pose if no mitigating actions to con­trol it were implemented
Insider threat A threat to information security from insiders such as employees, contractors, and third parties such as suppliers who may have ac­cess to some or all of an information system
Instant Messaging (IM) A popular service that allows people to send and get messages via digital devices almost instantly
Integrious Having the property of integrity; integrious data is data that has not been altered in any unauthorised way
Integrity The state of information or data when it is as intended, i.e. without any unauthorised additions, deletions, or changes; an essential part of cyber security. See CIA
Intellectual Property (IP) Things that are created by the mind rather than by machines. Assets in non-physical form (although they can be physically rep-resented e.g. written down) such as ideas, designs, software, text, and images
Internet Protocol (IP) The computer software rules that underpin the functioning of the internet
Internet Service Provider (ISP) A company that provides internet access or related services such as website hosting to its customers
Intrusion Detection and Prevention System (IDPS) A system of tools and techniques to protect IT systems by detecting unauthorised access and preventing it from happening
Intrusion Detection System (IDS) A system of tools and techniques to protect IT systems by detecting unauthorised access
IP See Intellectual property and Internet protocol
IP address Internet protocol address. A string of numbers used to identify individual computers or other devices that are communicating over the internet
IP flood A Denial of Service (qv) attack that sends a large number of pings (qv) to a web server in an attempt to make it fail
IP spoofing A process where a hacker gains access to a computer system by masquerading as a trusted computer; they do this by “spoofing” or faking the trusted computer’s identity or IP address
IPS Intrusion Prevention System. See Intrusion Detection System
IRT Incident Response Team. See CSIRT
ISP Internet service provider. An organisation allowing people and other organizations to access the internet. A company that provides internet access or related services such as website hosting to its customers.

Get the latest cyber news in your inbox

Join our community of cyber professionals today!