Cybersecurity Definitions I 0 0

Identity

Internet identity (iid) or internet persona is a social identity that an internet user creates on online communities and websites. While some users prefer using their real names online, others prefer to be anonymous and identify themselves by means of pseudonyms.

Incident handling

Incident handling is an action plan developed (by an organization or individual) to counteract intrusions, cyber-theft, denial of service, fire, flood, and any other security-related events. It comprises six process steps: preparation, identification of attack, containment of attack, eradication, recovery, and analysis (lessons learned documentation).

Incident

An incident is an unplanned disruption or degradation of a network or system service and needs to be resolved immediately. An example of an incident is a server crash that causes a disruption in the business process. However, if the disruption is planned, say, a scheduled maintenance, it is not an incident.

Incremental backups

An incremental backup provides a backup of only those files that have changed, modified, or are new since the last backup. Incremental backups are often desirable as they consume minimum storage and are quicker to perform than differential backups.

Inetd

Inetd stands for internet service daemon and is a super-server daemon on many unix systems to manage several internet services. This reduces the load of the system. This means that the network services such as telnet, file transfer protocol (ftp), and simple mail transfer protocol (smtp) can be activated on demand rather than running continuously.

Inference attack

An inference attack is a data mining technique used to illegally access information about a subject or database by analyzing data. This is an example of breached information security. Such an attack occurs when a user is able to deduce key or critical information of a database from trivial information without directly accessing it.

Information warfare

Information warfare (iw) is primarily a United States military concept that involves the use and management of information and communication technology in pursuit of a competitive advantage over an opponent. This concept may employ a combination of tactical information, assurance(s) that the information is valid, spreading of propaganda or disinformation to demoralize or manipulate the enemy and the public, undermining the quality of opposing force information and denial of information-collection opportunities to opposing forces.

Ingress filtering

Ingress filtering is used to ensure that all incoming packets (of data) are from the networks from which they claim to originate. Network ingress filtering is a commonly used packet filtering technique by many internet service providers to prevent any source address deceiving. This helps in combating several net abuse or crimes by making internet traffic traceable to its source.

Input validation attacks

Input validations attacks are when an attacker purposefully sends strange inputs to confuse a web application. Input validation routines serve as the first line of defence for such attacks. Examples of input validation attacks include buffer overflow, directory traversal, cross-site scripting and sql injection.

Integrity star property

Integrity star property means a user cannot access or read data of a lower integrity level than their own.

Integrity

Integrity of a system or network is the assurance that information can only be accessed or modified by those who are authorized. Several measures are taken to ensure integrity. These include controlling the physical environment of networked terminals and servers, restricting access to data, and maintaining rigorous authentication practices. Data integrity can be threatened by environmental hazards, such as heat, dust, and electrical surges.

Internet control message protocol icmp

The internet control message protocol (icmp) is one of the key internet protocols and is used by network devices such as routers to generate error messages to the source ip address when network problems prevent delivery of ip packets. Any ip network device has the capability to send, receive or process icmp messages. This protocol is also used to relay query messages and is assigned protocol number 1.

Internet engineering task force ietf

The internet engineering task force (ietf) is a large open international community of network designers, operators, vendors, and researchers who are concerned with the evolution of the internet architecture and its smooth operations. This body defines the standard internet operating protocols such as tcp/ip. The ietf is supervised by the internet society internet architecture board (iab). The internet assigned numbers authority (iana) is the central coordinator for the assignment of unique parameter values for internet protocols.

Internet message access protocol imap

The internet message access protocol (imap) is a standard internet protocol that is used by email clients to retrieve email messages from a mail server over tcp/ip. Imap is defined by rfc 3501. An imap server typically listens on port number 143. Imap over ssl (imaps) is assigned the port number 993.

Internet protocol ip

The internet protocol (ip) is a communication protocol that is used for relaying datagrams across network boundaries. It has a routing function which enables inter-networking, and essentially establishes the internet.

Internet protocol security ipsec

Internet protocol security (ipsec) is a protocol suite for secure internet protocol (ip) communications by authenticating and encrypting each ip packet of a communication session. Ipsec can be used in protecting data flows between a pair of hosts (host-to-host), security gateways (network-to-network), or between a security gateway and a host (network-to-host).

Internet protocol

An internet protocol address (ip address) is a numerical label that is assigned to each device that is using internet protocol or any other protocol and is connected to an internet network. An ip address serves two basic functions, that is, host or network interface identification and location addressing.

Internet standard

An internet standard (std) is a normative specification (that is approved by the iesg and published as an rfc) of a technology or methodology applicable to the internet. Internet standards are created and published by the internet engineering task force (ietf). An internet standard is characterized by technical reliability and usefulness. The ietf also defines a proposed standard as a less mature but stable and well-reviewed specification.

Internet

The internet is the worldwide network of interconnected computers that use the internet protocol suite (or tcp/ip) to link billions of devices across globally. It carries an extensive range of information resources and services, such as the inter-linked hypertext documents and applications of the world wide web (www), electronic mail, telephony, and peer-to-peer networks for file sharing.

Interrupt

An interrupt is a signal sent to the processor by hardware or software indicating an event that needs immediate attention.

Intranet

An intranet is a private or internal network that is accessible only to an organisation’s personnel. An intranet is established with the technologies for local area networks (lans) and wide area networks (wans).

Intrusion detection id

Intrusion detection (id) is a security management system for computers and networks. An id system gathers and analyzes information on a computer or a network to identify possible security breaches which include both intrusions and misuse. This system uses vulnerability assessment which is a technology developed to assess the security of a computer system or network.

Ip flood

Ip flood is a type of denial of service attack where the victim or system is flooded with information that uses up all the available bandwidth and prevents legitimate users from access. When ip flood detection is enabled, the router has the ability to block malicious devices that are attempting to flood devices.

Ip forwarding

Ip forwarding is also known as internet routing. It is a process used to determine using which path a packet or datagram can be sent. Ip forwarding is an os option that allows a host to act as a router. A system that has more than one network interface card must have ip forwarding turned on in order for the system to be able to act as a router.

Ip spoofing

Ip spoofing is also known as ip address forgery or a host file hijack. It is a hijacking technique where a hacker impersonates a trusted host to conceal his identity, spoof a website, hijack browsers, or gain access to a network.

Iso

The international organization for standardization (iso) is an international standard-setting body that is composed of voluntary representatives from various national standards organizations.

Issue specific policy

An issue-specific policy is intended to address specific needs within an organization, such as a password policy.

Itu t

The itu telecommunication standardization sector (itu-t) is one of the three sectors of the international telecommunication union (itu). It coordinates standards for telecommunications. The international telegraph and telephone consultative committee (ccitt, from french: comité consultatif international téléphonique et télégraphique) was created in 1956, and was renamed itu-t in 1993. Itu became a United Nations specialized agency in 1947.

** The time is base on America/Chicago timezone