CISSP For Dummies
- ICMP (Internet Control Message Protocol)
-
An IP protocol used to transmit diagnostic messages.
- Identification
-
The means by which a user claims a specific, unproven identity to a system. See also Authentication.
- Identity management
-
The processes and procedures that support the life cycle of identities of persons in an organization.
- IETF
-
Internet Engineering Task Force.
- Inference
-
The ability of users to infer or deduce information about data at a higher sensitivity level for which they are not authorized.
- Inference channel
-
A link that allows inference to occur.
- Inference engine
-
An artificial intelligence system that derives answers from a knowledge base.
- Information custodian (or custodian)
-
The individual with day-to-day responsibility for protecting information assets.
- Information flow model
-
A lattice-based model in which objects are assigned a security class and value and their direction of flow is controlled by a security policy.
- Information owner (or owner)
-
The individual who decides who is allowed access to a file and what privileges are granted.
- Inrush
-
Initial electric power rush.
- Integrity
-
Safeguards the accuracy and completeness of information and processing methods and ensures that
-
Modifications to data aren’t made by unauthorized users or processes.
-
Unauthorized modifications to data aren’t made by authorized users or processes.
-
Data is internally and externally consistent; that is, a given input produces an expected output.
-
- Intellectual property
-
Includes patents, trademarks, copyrights, and trade secrets.
- Internet
-
The worldwide, publicly accessible network that connects the networks of organizations.
- Intranet
-
An organization’s private network that is used to secure share information among the organization’s employees.
- Intrusion detection system (IDS)
-
A hardware or software application that detects and reports on suspected network or host intrusions.
- Intrusion Prevention System (IPS)
-
A hardware or software application that both detects and blocks suspected network or host intrusions.
- IP (Internet Protocol)
-
The OSI layer 3 protocol that is the basis of the modern Internet.
- IPSec (Internet Protocol Security)
-
An IETF open standard VPN protocol for secure communications over public IP-based networks.
- IPX (Internetwork Packet Exchange)
-
A network packet-oriented protocol that is the basis for Novell Netware networks. IPX is analogous to IP.
- ISDN (Integrated Services Digital Network)
-
A low-bandwidth communications protocol that operates over analog telecommunications voice lines.
- ITSEC (European Information Technology Security Evaluation Criteria)
-
Formal evaluation criteria that addresses confidentiality, integrity, and availability, and also evaluates an entire system.
Категории