Skip to content
SynAc
Browse

Terms

Alphabetical index of published term entries. Use the letter rail to jump.

  1. ICMP floodUpdated Jan 06, 2026

    A denial of service attack that sends a host more ICMP echo request ("ping") packets than the protocol implementation can handle. (See: flooding, smurf.)

  2. ict supply chain threatUpdated Jan 06, 2026

    A man made threat achieved through exploitation of the information and communications technology (ICT) system’s supply chain, including acquisition processes.

  3. identificationUpdated Jan 06, 2026

    An act or process that presents an identifier to a system so that the system can recognize a system entity and distinguish it from other entities. (See: authentication.)

  4. identification informationUpdated Jan 06, 2026

    Synonym for "identifier"; synonym for "authentication information". (See: authentication, identifying information.)

  5. Identification ProtocolUpdated Jan 06, 2026

    A client server Internet protocol [R1413] for learning the identity of a user of a particular TCP connection.

  6. identifierUpdated Jan 06, 2026

    A data object often, a printable, non blank character string that definitively represents a specific identity of a system entity, distinguishing that identity from all others. (Compare: identity.)

  7. identifier credentialUpdated Jan 06, 2026

    See: /authentication/ under "credential".

  8. identifying informationUpdated Jan 06, 2026

    Synonym for "identifier"; synonym for "authentication information". (See: authentication, identification information.)

  9. identityUpdated Jan 06, 2026

    The collective aspect of a set of attribute values (i.e., a set of characteristics) by which a system user or other system entity is recognizable or known. (See: authenticate, registration. Compare: identifier.)

  10. identity and access managementUpdated Jan 06, 2026

    The methods and processes used to manage subjects and their authentication and authorizations to access specific objects.

  11. identity-based security policyUpdated Jan 06, 2026

    "A security policy based on the identities and/or attributes of users, a group of users, or entities acting on behalf of the users and the resources/objects being accessed." [I7498 2] (See: rule based security policy.)

  12. identity proofingUpdated Jan 06, 2026

    A process that vets and verifies the information that is used to establish the identity of a system entity. (See: registration.)

  13. IEEE 802.10Updated Jan 06, 2026

    An IEEE committee developing security standards for LANs. (See: SILS.)

  14. IEEE P1363Updated Jan 06, 2026

    An IEEE working group, Standard for Public Key Cryptography, engaged in developing a comprehensive reference standard for asymmetric cryptography. Covers discrete logarithm (e.g., DSA), elliptic curve, and integer factorization (e.g., RSA); and covers key agreement, digital signature, and encryption.

  15. IMAP4 AUTHENTICATEUpdated Jan 06, 2026

    An IMAP4 command (better described as a transaction type, or subprotocol) by which an IMAP4 client optionally proposes a mechanism to an IMAP4 server to authenticate the client to the server and provide other security services. (See: POP3.)

  16. Impair DefensesUpdated Jan 06, 2026

    Adversaries may maliciously modify components of a victim environment in order to hinder or disable defensive mechanisms. This not only involves impairing preventative defenses, such as anti virus, but also detection capabilities that defenders can use to audit activity and identify malicious behavior. This may span both native defenses as well as supplemental capabilities installed by users or mobile endpoint administrators.

  17. Impersonate SS7 NodesUpdated Jan 06, 2026

    Adversaries may exploit the lack of authentication in signaling system network nodes to track the location of mobile devices by impersonating a node.(Citation: Engel SS7)(Citation: Engel SS7 2008)(Citation: 3GPP Security)(Citation: Positive SS7)(Citation: CSRIC5 WG10 FinalReport)

  18. impersonizationUpdated Jan 06, 2026

    An attack type targeted phishing attack where a malicious actor pretends to be someone else or other entities to steal sensitive data

  19. impossibleUpdated Jan 06, 2026

    Cannot be done in any reasonable amount of time. (See: break, brute force, strength, work factor.)

  20. Ina JoUpdated Jan 06, 2026

    A methodology, language, and integrated set of software tools developed at the System Development Corporation for specifying, coding, and verifying software to produce correct and reliable programs. Usage: a.k.a. the Formal Development Methodology. [Cheh]

  21. incapacitationUpdated Jan 06, 2026

    A type of threat action that prevents or interrupts system operation by disabling a system component. (See: disruption.)

  22. incidentUpdated Jan 06, 2026

    An occurrence that actually or potentially results in adverse consequences to (adverse effects on) (poses a threat to) an information system or the information that the system processes, stores, or transmits and that may require a response action to mitigate the consequences.

  23. incident managementUpdated Jan 06, 2026

    The management and coordination of activities associated with an actual or potential occurrence of an event that may result in adverse consequences to information or information systems.

  24. incident responseUpdated Jan 06, 2026

    The activities that address the short term, direct effects of an incident and may also support short term recovery.

  25. incident response planUpdated Jan 06, 2026

    A set of predetermined and documented procedures to detect and respond to a cyber incident.

  26. indicatorUpdated Jan 06, 2026

    An occurrence or sign that an incident may have occurred or may be in progress.

  27. Indicator Removal on HostUpdated Jan 06, 2026

    Adversaries may delete, alter, or hide generated artifacts on a device, including files, jailbreak status, or the malicious application itself. These actions may interfere with event collection, reporting, or other notifications used to detect intrusion activity. This may compromise the integrity of mobile security solutions by causing notable events or information to go unreported.

  28. indirect attackUpdated Jan 06, 2026

    See: secondary definition under "attack". Compare: direct attack.

  29. In X.509, a CRL that may contain certificate revocation notifications for certificates issued by CAs other than the issuer (i.e., signer) of the ICRL.

  30. indistinguishabilityUpdated Jan 06, 2026

    An attribute of an encryption algorithm that is a formalization of the notion that the encryption of some string is indistinguishable from the encryption of an equal length string of nonsense. (Compare: semantic security.)

  31. industrial control systemUpdated Jan 06, 2026

    An information system used to control industrial processes such as manufacturing, product handling, production, and distribution or to control infrastructure assets.

  32. inferenceUpdated Jan 06, 2026

    A type of threat action that reasons from characteristics or byproducts of communication and thereby indirectly accesses sensitive data, but not necessarily the data contained in the communication. (See: traffic analysis, signal analysis.)

  33. inference controlUpdated Jan 06, 2026

    Protection of data confidentiality against inference attack. (See: traffic flow confidentiality.)

  34. InfiniBandUpdated Jan 06, 2026

    a high speed, low latency interconnect standard used in high performance computing (HPC), supercomputers, and AI data centers

  35. informalUpdated Jan 06, 2026

    Expressed in natural language. [CCIB] (Compare: formal, semiformal.)

  36. informationUpdated Jan 06, 2026

    Facts and ideas, which can be represented (encoded) as various forms of data.

  37. Any information technology, equipment, or interconnected system or subsystem of equipment that processes, transmits, receives, or interchanges data or information.

  38. information assuranceUpdated Jan 06, 2026

    The measures that protect and defend information and information systems by ensuring their availability, integrity, and confidentiality.

  39. In the NICE Framework, cybersecurity work where a person: Oversees, evaluates, and supports the documentation, validation, and accreditation processes necessary to assure that new IT systems meet the organization's information assurance and security requirements; ensures appropriate treatment of risk, compliance, and assurance from internal and external perspectives.

  40. A publicly available document [IATF], developed through a collaborative effort by organizations in the U.S. Government and industry, and issued by NSA. Intended for security managers and system security engineers as a tutorial and reference document about security problems in information systems and networks, to improve awareness of tradeoffs among available technology solutions and of desired characteristics of security approaches for particular problems. (See: ISO 17799, [SP14].)

  41. information domainUpdated Jan 06, 2026

    See: secondary definition under "domain".

  42. See: secondary definition under "domain".

  43. information flow policyUpdated Jan 06, 2026

    A triple consisting of a set of security levels (or their equivalent security labels), a binary operator that maps each pair of security levels into a security level, and a binary relation on the set that selects a set of pairs of levels such that information is permitted to flow from an object of the first level to an object of the second level. (See: flow control, lattice model.)

  44. A comprehensive defense posture and response based on the status of information systems, military operations, and intelligence assessments of adversary capabilities and intent. (See: threat)

  45. information securityUpdated Jan 06, 2026

    Measures that implement and assure security services in information systems, including in computer systems (see: COMPUSEC) and in communication systems (see: COMSEC).

  46. information security policyUpdated Jan 06, 2026

    An aggregate of directives, regulations, rules, and practices that prescribe how an organization manages, protects, and distributes information.

  47. information sharingUpdated Jan 06, 2026

    An exchange of data, information, and/or knowledge to manage risks or respond to incidents.

  48. information systemUpdated Jan 06, 2026

    An organized assembly of computing and communication resources and procedures i.e., equipment and services, together with their supporting infrastructure, facilities, and personnel that create, collect, record, process, store, transport, retrieve, display, disseminate, control, or dispose of information to accomplish a specified set of functions. (See: system entity, system resource. Compare: computer platform.)

  49. information system resilienceUpdated Jan 06, 2026

    The ability of an information system to: (1) continue to operate under adverse conditions or stress, even if in a degraded or debilitated state, while maintaining essential operational capabilities; and (2) recover effectively in a timely manner.

  50. In the NICE Framework, cybersecurity work where a person: Oversees the information assurance program of an information system in or outside the network environment; may include procurement duties (e.g., Information Systems Security Office