Skip to content
SynAc
Browse

Terms

Alphabetical index of published term entries. Use the letter rail to jump.

  1. information technologyUpdated Jan 06, 2026

    Any equipment or interconnected system or subsystem of equipment that processes, transmits, receives, or interchanges data or information.

  2. A Standard [ITSEC] jointly developed by France, Germany, the Netherlands, and the United Kingdom for use in the European Union; accommodates a wider range of security assurance and functionality combinations than the TCSEC. Superseded by the Common Criteria.

  3. ingress filteringUpdated Jan 06, 2026

    A method [R2827] for countering attacks that use packets with false IP source addresses, by blocking such packets at the boundary between connected networks.

  4. Ingress Tool TransferUpdated Jan 06, 2026

    Adversaries may transfer tools or other files from an external system onto a compromised device to facilitate follow on actions. Files may be copied from an external adversary controlled system through the command and control channel or through alternate protocols with another tool such as FTP.

  5. initialization valueUpdated Jan 06, 2026

    An input parameter that sets the starting state of a cryptographic algorithm or mode. (Compare: activation data.)

  6. initialization vectorUpdated Jan 06, 2026

    Synonym for "initialization value".

  7. Input CaptureUpdated Jan 06, 2026

    Adversaries may use methods of capturing user input to obtain credentials or collect information. During normal device usage, users often provide credentials to various locations, such as login pages/portals or system dialog boxes. Input capture mechanisms may be transparent to the user (e.g. Keylogging) or rely on deceiving the user into providing input into what they believe to be a genuine application prompt (e.g. GUI Input Capture).

  8. Input InjectionUpdated Jan 06, 2026

    A malicious application can inject input to the user interface to mimic user interaction through the abuse of Android's accessibility APIs.

  9. insertionUpdated Jan 06, 2026

    See: secondary definition under "stream integrity service".

  10. inside attackUpdated Jan 06, 2026

    See: secondary definition under "attack". Compare: insider.

  11. insiderUpdated Jan 06, 2026

    A user (usually a person) that accesses a system from a position that is inside the system's security perimeter. (Compare: authorized user, outsider, unauthorized user.)

  12. inside( r) threatUpdated Jan 06, 2026

    A person or group of persons within an organization who pose a potential risk through violating security policies.

  13. inspectable spaceUpdated Jan 06, 2026

    "Three dimensional space surrounding equipment that process classified and/or sensitive information within which TEMPEST exploitation is not considered practical or where legal authority to identify and/or remove a potential TEMPEST exploitation exists." [C4009] (Compare: control zone, TEMPEST zone.)

  14. The IEEE is a not for profit association of approximately 300,000 individual members in 150 countries. The IEEE produces nearly one third of the world's published literature in electrical engineering, computers, and control technology; holds hundreds of major, annual conferences; and maintains more than 800 active standards, with many more under development. (See: SILS.)

  15. integrated risk managementUpdated Jan 06, 2026

    The structured approach that enables an enterprise or organization to share risk information and risk analysis and to synchronize independent yet complementary risk management strategies to unify efforts across the enterprise.

  16. IntegrityUpdated Jan 06, 2026

    Integrity is the property that data is accurate and has not been improperly modified or destroyed.

  17. integrity checkUpdated Jan 06, 2026

    A computation that is part of a mechanism to provide data integrity service or data origin authentication service. (Compare: checksum.)

  18. integrity labelUpdated Jan 06, 2026

    A security label that tells the degree of confidence that may be placed in the data, and may also tell what countermeasures are required to be applied to protect the data from alteration and destruction. (See: integrity. Compare: classification label.)

  19. intelligent threatUpdated Jan 06, 2026

    A circumstance in which an adversary has the technical and operational ability to detect and exploit a vulnerability and also has the demonstrated, presumed, or inferred intent to do so. (See: threat.)

  20. intentUpdated Jan 06, 2026

    A state of mind or desire to achieve an objective.

  21. interceptionUpdated Jan 06, 2026

    A type of threat action whereby an unauthorized entity directly accesses sensitive data while the data is traveling between authorized sources and destinations. (See: unauthorized disclosure.)

  22. interferenceUpdated Jan 06, 2026

    See: secondary definition under "obstruction".

  23. intermediate CAUpdated Jan 06, 2026

    The CA that issues a cross certificate to another CA. [X509] (See: cross certification.)

  24. internal controlsUpdated Jan 06, 2026

    Functions, features, and technical characteristics of computer hardware and software, especially of operating systems. Includes mechanisms to regulate the operation of a computer system with regard to access control, flow control, and inference control. (Compare: external controls.)

  25. A patented, symmetric block cipher that uses a 128 bit key and operates on 64 bit blocks. [Schn] (See: symmetric cryptography.)

  26. International StandardUpdated Jan 06, 2026

    See: secondary definition under "ISO".

  27. Rules issued by the U.S. State Department, by authority of the Arms Export Control Act (22 U.S.C. 2778), to control export and import of defense articles and defense services, including information security systems, such as cryptographic systems, and TEMPEST suppression technology. (See: type 1 product, Wassenaar Arrangement.)

  28. Internet Accessible DeviceUpdated Jan 06, 2026

    Adversaries may gain access into industrial environments through systems exposed directly to the internet for remote access rather than through External Remote Services. Internet Accessible Devices are exposed to the internet unintentionally or intentionally without adequate protections. This may allow for adversaries to move directly into the control system network. Access onto these devices is accomplished without the use of exploits, these would be represented within the Exploit Public Facing Application technique.

  29. Internet Architecture BoardUpdated Jan 06, 2026

    A technical advisory group of the ISOC, chartered by the ISOC Trustees to provide oversight of Internet architecture and protocols and, in the context of Internet Standards, a body to which decisions of the IESG may be appealed. Responsible for approving appointments to the IESG from among nominees submitted by the IETF nominating committee. (RFC 2026)

  30. From the early days of the Internet, the IANA was chartered by the ISOC and the U.S. Government's Federal Network Council to be the central coordination, allocation, and registration body for parameters for Internet protocols. Superseded by ICANN.

  31. Internet Connection DiscoveryUpdated Jan 06, 2026

    Adversaries may check for Internet connectivity on compromised systems. This may be performed during automated discovery and can be accomplished in numerous ways such as using Ping, <code tracert</code , and GET requests to websites, or performing initial speed testing to confirm bandwidth.

  32. An Internet Standard protocol (RFC 792) that is used to report error conditions during IP datagram processing and to exchange other information concerning the state of the IP network.

  33. The non profit, private corporation that has assumed responsibility for the IP address space allocation, protocol parameter assignment, DNS management, and root server system management functions formerly performed under U.S. Government contract by IANA and other entities.

  34. Internet-DraftUpdated Jan 06, 2026

    A working document of the IETF, its areas, and its working groups. (RFC 2026) (Compare: RFC.)

  35. The part of the ISOC responsible for technical management of IETF activities and administration of the Internet Standards Process according to procedures approved by the ISOC Trustees. Directly responsible for actions along the "standards track", including final approval of specifications as Internet Standards. Composed of IETF Area Directors and the IETF chairperson, who also chairs the IESG. (RFC 2026)

  36. A self organized group of people who make contributions to the development of Internet technology. The principal body engaged in developing Internet Standards, although not itself a part of the ISOC. Composed of Working Groups, which are arranged into Areas (such as the Security Area), each coordinated by one or more Area Directors. Nominations to the IAB and the IESG are made by a committee selected at random from regular IETF meeting attendees who have volunteered. (RFCs 2026, 3935) [R2323]

  37. internet, InternetUpdated Jan 06, 2026

    Abbreviation of "internetwork".

  38. Internet Key ExchangeUpdated Jan 06, 2026

    An Internet, IPsec, key establishment protocol [R4306] for putting in place authenticated keying material (a) for use with ISAKMP and (b) for other security associations, such as in AH and ESP.

  39. Internet LayerUpdated Jan 06, 2026

    See: Internet Protocol Suite.

  40. An Internet protocol (RFC 2060) by which a client workstation can dynamically access a mailbox on a server host to manipulate

  41. Internet Open Trading ProtocolUpdated Jan 06, 2026

    An Internet protocol [R2801] proposed as a general framework for Internet commerce, able to encapsulate transactions of various proprietary payment systems (e.g., GeldKarte, Mondex, SET, Visa Cash). Provides optional security services by incorporating various Internet security mechanisms (e.g., MD5) and protocols (e.g., TLS).

  42. An X.509 compliant CA that is the top CA of the Internet certification hierarchy operated under the auspices of the ISOC [R1422]. (See: /PEM/ under "certification hierarchy".)

  43. A successor to the PLI, updated to use TCP/IP and newer military grade COMSEC equipment (TSEC/KG 84). The IPLI was a portable, modular system that was developed for use in tactical, packet radio networks. (See: end to end encryption.)

  44. Internet ProtocolUpdated Jan 06, 2026

    An Internet Standard, Internet Layer protocol that moves datagrams (discrete sets of bits) from one computer to another across an internetwork but does not provide reliable delivery, flow control, sequencing, or other end to end services that TCP provides. IP version 4 (IPv4) is specified in RFC 791, and IP version 6 (IPv6) is specified in RFC 2460. (See: IP address, TCP/IP.)

  45. Refers to one of three types of IP security options, which are fields that may be added to an IP datagram for carrying security information about the datagram. (Compare: IPsec.)

  46. Internet Protocol SuiteUpdated Jan 06, 2026

    The set of network communication protocols that are specified by the IETF, and approved as Internet Standards by the IESG, within the oversight of the IAB. (See: OSIRM Security Architecture. Compare: OSIRM.)

  47. An Internet IPsec protocol [R2408] to negotiate, establish, modify, and delete security associations, and to exchange key generation and authentication data, independent of the details of any specific key generation technique, key establishment protocol, encryption algorithm, or authentication mechanism.

  48. Internet SocietyUpdated Jan 06, 2026

    A professional society concerned with Internet development (including technical Internet Standards); with how the Internet is and can be used; and with social, political, and technical issues that result. The ISOC Board of Trustees approves appointments to the IAB from among nominees submitted by the IETF nominating committee. (RFC 2026)

  49. Internet StandardUpdated Jan 06, 2026

    A specification, approved by the IESG and published as an RFC, that is stable and well understood, is technically competent, has multiple, independent, and interoperable implementations with substantial operational experience, enjoys significant public support, and is recognizably useful in some or all parts of the Internet. (RFC 2026) (Compare: RFC.)

  50. internetworkUpdated Jan 06, 2026

    A system of interconnected networks; a network of networks. Usually shortened to "internet". (See: internet, Internet.)