I - Definitions

  • I

    identity management (ID management)

    Identity management (ID management) is the organizational process for ensuring individuals have the appropriate access to technology resources.

  • identity provider

    An identity provider (IdP) is a system component that provides an end user or internet-connected device with a single set of login credentials that ensures the entity is who or what it says it is across multiple platforms, applications and networks.

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable information (PII), such as Social Security or driver's license numbers, to impersonate someone else.

  • ILOVEYOU virus

    The ILOVEYOU virus comes in an email with 'ILOVEYOU' in the subject line and contains an attachment that, when opened, results in the message being re-sent to everyone in the recipient's Microsoft Outlook address book.

  • incident response team

    An incident response team is a group of IT professionals in charge of preparing for and reacting to any type of organizational emergency.

  • indicators of compromise (IOC)

    Indicators of compromise are unusual activities on a system or network that imply the presence of a malicious actor.

  • information assurance (IA)

    Information assurance (IA) is the practice of protecting physical and digital information and the systems that support the information.

  • information security (infosec)

    Information security (infosec) is a set of policies, procedures and principles for safeguarding digital data and other kinds of information.

  • insecure deserialization

    Insecure deserialization is a vulnerability in which untrusted or unknown data is used to inflict a denial-of-service attack, execute code, bypass authentication or otherwise abuse the logic behind an application.

  • insider threat

    An insider threat is a category of risk posed by those who have access to an organization's physical or digital assets.

  • integrated risk management (IRM)

    Integrated risk management (IRM) is a set of proactive, businesswide practices that contribute to an organization's security, risk tolerance profile and strategic decisions.

  • International Data Encryption Algorithm (IDEA)

    The International Data Encryption Algorithm (IDEA) is a symmetric key block cipher encryption algorithm designed to encrypt text to an unreadable format for transmission via the internet.

  • International Information Systems Security Certification Consortium (ISC)2

    (ISC)2, short for International Information Systems Security Certification Consortium, is a nonprofit organization that provides security training and certificates.

  • intrusion prevention system (IPS)

    An intrusion prevention system (IPS) is a cybersecurity tool that examines network traffic to identify potential threats and automatically take action against them.

  • IP spoofing

    Internet Protocol (IP) spoofing is a type of malicious attack where the threat actor hides the true source of IP packets to make it difficult to know where they came from.

  • ISO 27002 (International Organization for Standardization 27002)

    The ISO 27002 standard is a collection of information security management guidelines that are intended to help an organization implement, maintain and improve its information security management.

  • What is an intrusion detection system (IDS)?

    An intrusion detection system monitors (IDS) network traffic for suspicious activity and sends alerts when such activity is discovered.

  • What is identity and access management? Guide to IAM

    No longer just a good idea, IAM is a crucial piece of the cybersecurity puzzle. It's how an organization regulates access to information and meets its compliance obligations.

  • What is identity governance and administration (IGA)?

    Identity governance and administration (IGA) is the collection of processes and practices used to manage user digital identities and their access throughout the enterprise.

  • What is identity threat detection and response (ITDR)?

    Identity threat detection and response (ITDR) is a collection of tools and best practices aimed at defending against cyberattacks that specifically target user identities or identity and access management (IAM) infrastructure.

  • What is incident response? A complete guide

    Incident response is an organized, strategic approach to detecting and managing cyberattacks in ways that minimize damage, recovery time and total costs.

  • What is Internet Key Exchange (IKE)?

    Internet Key Exchange (IKE) is a standard protocol used to set up a secure and authenticated communication channel between two parties via a virtual private network (VPN).

  • What is IPsec (Internet Protocol Security)?

    IPsec (Internet Protocol Security) is a suite of protocols and algorithms for securing data transmitted over the internet or any public network.

  • What is the ISO 31000 Risk Management standard?

    The ISO 31000 Risk Management framework is an international standard that provides organizations with guidelines and principles for risk management.