Terms
Alphabetical index of published term entries. Use the letter rail to jump.
- ICMP floodUpdated Jan 06, 2026
A denial of service attack that sends a host more ICMP echo request ("ping") packets than the protocol implementation can handle. (See: flooding, smurf.)
- ict supply chain threatUpdated Jan 06, 2026
A man made threat achieved through exploitation of the information and communications technology (ICT) system’s supply chain, including acquisition processes.
- identificationUpdated Jan 06, 2026
An act or process that presents an identifier to a system so that the system can recognize a system entity and distinguish it from other entities. (See: authentication.)
- identification informationUpdated Jan 06, 2026
Synonym for "identifier"; synonym for "authentication information". (See: authentication, identifying information.)
- Identification ProtocolUpdated Jan 06, 2026
A client server Internet protocol [R1413] for learning the identity of a user of a particular TCP connection.
- identifierUpdated Jan 06, 2026
A data object often, a printable, non blank character string that definitively represents a specific identity of a system entity, distinguishing that identity from all others. (Compare: identity.)
- identifier credentialUpdated Jan 06, 2026
See: /authentication/ under "credential".
- identifying informationUpdated Jan 06, 2026
Synonym for "identifier"; synonym for "authentication information". (See: authentication, identification information.)
- identityUpdated Jan 06, 2026
The collective aspect of a set of attribute values (i.e., a set of characteristics) by which a system user or other system entity is recognizable or known. (See: authenticate, registration. Compare: identifier.)
- identity and access managementUpdated Jan 06, 2026
The methods and processes used to manage subjects and their authentication and authorizations to access specific objects.
- identity-based security policyUpdated Jan 06, 2026
"A security policy based on the identities and/or attributes of users, a group of users, or entities acting on behalf of the users and the resources/objects being accessed." [I7498 2] (See: rule based security policy.)
- identity proofingUpdated Jan 06, 2026
A process that vets and verifies the information that is used to establish the identity of a system entity. (See: registration.)
- IEEE 802.10Updated Jan 06, 2026
An IEEE committee developing security standards for LANs. (See: SILS.)
- IEEE P1363Updated Jan 06, 2026
An IEEE working group, Standard for Public Key Cryptography, engaged in developing a comprehensive reference standard for asymmetric cryptography. Covers discrete logarithm (e.g., DSA), elliptic curve, and integer factorization (e.g., RSA); and covers key agreement, digital signature, and encryption.
- IMAP4 AUTHENTICATEUpdated Jan 06, 2026
An IMAP4 command (better described as a transaction type, or subprotocol) by which an IMAP4 client optionally proposes a mechanism to an IMAP4 server to authenticate the client to the server and provide other security services. (See: POP3.)
- Impair DefensesUpdated Jan 06, 2026
Adversaries may maliciously modify components of a victim environment in order to hinder or disable defensive mechanisms. This not only involves impairing preventative defenses, such as anti virus, but also detection capabilities that defenders can use to audit activity and identify malicious behavior. This may span both native defenses as well as supplemental capabilities installed by users or mobile endpoint administrators.
- Impersonate SS7 NodesUpdated Jan 06, 2026
Adversaries may exploit the lack of authentication in signaling system network nodes to track the location of mobile devices by impersonating a node.(Citation: Engel SS7)(Citation: Engel SS7 2008)(Citation: 3GPP Security)(Citation: Positive SS7)(Citation: CSRIC5 WG10 FinalReport)
- impersonizationUpdated Jan 06, 2026
An attack type targeted phishing attack where a malicious actor pretends to be someone else or other entities to steal sensitive data
- impossibleUpdated Jan 06, 2026
Cannot be done in any reasonable amount of time. (See: break, brute force, strength, work factor.)
- Ina JoUpdated Jan 06, 2026
A methodology, language, and integrated set of software tools developed at the System Development Corporation for specifying, coding, and verifying software to produce correct and reliable programs. Usage: a.k.a. the Formal Development Methodology. [Cheh]
- incapacitationUpdated Jan 06, 2026
A type of threat action that prevents or interrupts system operation by disabling a system component. (See: disruption.)
- incidentUpdated Jan 06, 2026
An occurrence that actually or potentially results in adverse consequences to (adverse effects on) (poses a threat to) an information system or the information that the system processes, stores, or transmits and that may require a response action to mitigate the consequences.
- incident managementUpdated Jan 06, 2026
The management and coordination of activities associated with an actual or potential occurrence of an event that may result in adverse consequences to information or information systems.
- incident responseUpdated Jan 06, 2026
The activities that address the short term, direct effects of an incident and may also support short term recovery.
- incident response planUpdated Jan 06, 2026
A set of predetermined and documented procedures to detect and respond to a cyber incident.
- indicatorUpdated Jan 06, 2026
An occurrence or sign that an incident may have occurred or may be in progress.
- Indicator Removal on HostUpdated Jan 06, 2026
Adversaries may delete, alter, or hide generated artifacts on a device, including files, jailbreak status, or the malicious application itself. These actions may interfere with event collection, reporting, or other notifications used to detect intrusion activity. This may compromise the integrity of mobile security solutions by causing notable events or information to go unreported.
- indirect attackUpdated Jan 06, 2026
See: secondary definition under "attack". Compare: direct attack.
- indirect certificate revocation listUpdated Jan 06, 2026
In X.509, a CRL that may contain certificate revocation notifications for certificates issued by CAs other than the issuer (i.e., signer) of the ICRL.
- indistinguishabilityUpdated Jan 06, 2026
An attribute of an encryption algorithm that is a formalization of the notion that the encryption of some string is indistinguishable from the encryption of an equal length string of nonsense. (Compare: semantic security.)
- industrial control systemUpdated Jan 06, 2026
An information system used to control industrial processes such as manufacturing, product handling, production, and distribution or to control infrastructure assets.
- inferenceUpdated Jan 06, 2026
A type of threat action that reasons from characteristics or byproducts of communication and thereby indirectly accesses sensitive data, but not necessarily the data contained in the communication. (See: traffic analysis, signal analysis.)
- inference controlUpdated Jan 06, 2026
Protection of data confidentiality against inference attack. (See: traffic flow confidentiality.)
- InfiniBandUpdated Jan 06, 2026
a high speed, low latency interconnect standard used in high performance computing (HPC), supercomputers, and AI data centers
- informalUpdated Jan 06, 2026
Expressed in natural language. [CCIB] (Compare: formal, semiformal.)
- informationUpdated Jan 06, 2026
Facts and ideas, which can be represented (encoded) as various forms of data.
- information and communication(s) technologyUpdated Jan 06, 2026
Any information technology, equipment, or interconnected system or subsystem of equipment that processes, transmits, receives, or interchanges data or information.
- information assuranceUpdated Jan 06, 2026
The measures that protect and defend information and information systems by ensuring their availability, integrity, and confidentiality.
- information assurance complianceUpdated Jan 06, 2026
In the NICE Framework, cybersecurity work where a person: Oversees, evaluates, and supports the documentation, validation, and accreditation processes necessary to assure that new IT systems meet the organization's information assurance and security requirements; ensures appropriate treatment of risk, compliance, and assurance from internal and external perspectives.
- Information Assurance Technical FrameworkUpdated Jan 06, 2026
A publicly available document [IATF], developed through a collaborative effort by organizations in the U.S. Government and industry, and issued by NSA. Intended for security managers and system security engineers as a tutorial and reference document about security problems in information systems and networks, to improve awareness of tradeoffs among available technology solutions and of desired characteristics of security approaches for particular problems. (See: ISO 17799, [SP14].)
- information domainUpdated Jan 06, 2026
See: secondary definition under "domain".
- information domain security policyUpdated Jan 06, 2026
See: secondary definition under "domain".
- information flow policyUpdated Jan 06, 2026
A triple consisting of a set of security levels (or their equivalent security labels), a binary operator that maps each pair of security levels into a security level, and a binary relation on the set that selects a set of pairs of levels such that information is permitted to flow from an object of the first level to an object of the second level. (See: flow control, lattice model.)
- information operations conditionUpdated Jan 06, 2026
A comprehensive defense posture and response based on the status of information systems, military operations, and intelligence assessments of adversary capabilities and intent. (See: threat)
- information securityUpdated Jan 06, 2026
Measures that implement and assure security services in information systems, including in computer systems (see: COMPUSEC) and in communication systems (see: COMSEC).
- information security policyUpdated Jan 06, 2026
An aggregate of directives, regulations, rules, and practices that prescribe how an organization manages, protects, and distributes information.
- information sharingUpdated Jan 06, 2026
An exchange of data, information, and/or knowledge to manage risks or respond to incidents.
- information systemUpdated Jan 06, 2026
An organized assembly of computing and communication resources and procedures i.e., equipment and services, together with their supporting infrastructure, facilities, and personnel that create, collect, record, process, store, transport, retrieve, display, disseminate, control, or dispose of information to accomplish a specified set of functions. (See: system entity, system resource. Compare: computer platform.)
- information system resilienceUpdated Jan 06, 2026
The ability of an information system to: (1) continue to operate under adverse conditions or stress, even if in a degraded or debilitated state, while maintaining essential operational capabilities; and (2) recover effectively in a timely manner.
- information systems security operationsUpdated Jan 06, 2026
In the NICE Framework, cybersecurity work where a person: Oversees the information assurance program of an information system in or outside the network environment; may include procurement duties (e.g., Information Systems Security Office