Terms
Alphabetical index of published term entries. Use the letter rail to jump.
- interoperabilityUpdated Jan 06, 2026
The ability of two or more systems or components to exchange information and to use the information that has been exchanged.
- in the clearUpdated Jan 06, 2026
Not encrypted. (See: clear text.)
- intranetUpdated Jan 06, 2026
A computer network, especially one based on Internet technology, that an organization uses for its own internal (and usually private) purposes and that is closed to outsiders. (See: extranet, VPN.)
- intruderUpdated Jan 06, 2026
An entity that gains or attempts to gain access to a system or system resource without having authorization to do so. (See: intrusion. Compare: adversary, cracker, hacker.)
- intrusionUpdated Jan 06, 2026
An unauthorized act of bypassing the security mechanisms of a network or information system.
- intrusion detectionUpdated Jan 06, 2026
The process and methods for analyzing information from networks and information systems to determine if a security breach or security violation has occurred.
- intrusion detection systemUpdated Jan 06, 2026
A process or subsystem, implemented in software or hardware, that automates the tasks of (a) monitoring events that occur in a computer network and (b) analyzing them for signs of security problems. [SP31] (See: intrusion detection.)
- invalidity dateUpdated Jan 06, 2026
An X.509 CRL entry extension that "indicates the date at which it is known or suspected that the [revoked certificate's private key] was compromised or that the certificate should otherwise be considered invalid." [X509].
- investigateUpdated Jan 06, 2026
a NICE Framework category consisting of specialty areas responsible for the investigation of cyber events and/or crimes of IT systems, networks, and digital evidence
- investigationUpdated Jan 06, 2026
A systematic and formal inquiry into a qualified threat or incident using digital forensics and perhaps other traditional criminal inquiry techniques to determine the events that transpired and to collect evidence.
- I/O ImageUpdated Jan 06, 2026
Adversaries may seek to capture process values related to the inputs and outputs of a PLC. During the scan cycle, a PLC reads the status of all inputs and stores them in an image table. (Citation: Nanjundaiah, Vaidyanath) The image table is the PLCs internal storage location where values of inputs/outputs for one scan are stored while it executes the user program. After the PLC has solved the entire logic program, it updates the output image table. The contents of this output image table are written to the corresponding output points in I/O Modules.
- IP addressUpdated Jan 06, 2026
A computer's internetwork address that is assigned for use by IP and other protocols.
- IP AddressesUpdated Jan 03, 2026
Adversaries may gather the victim's IP addresses that can be used during targeting. Public IP addresses may be allocated to organizations by block, or a range of sequential addresses. Information about assigned IP addresses may include a variety of details, such as which IP addresses are in use. IP addresses may also enable an adversary to derive other details about a victim, such as organizational size, physical location(s), Internet service provider, and or where/how their publicly facing infrastructure is hosted.
- IPsecUpdated Jan 06, 2026
See: IP Security Protocol.
- IP Security OptionUpdated Jan 06, 2026
See: Internet Protocol Security Option.
- IP Security ProtocolUpdated Jan 06, 2026
The name of the IETF working group that is specifying an architecture [R2401, R4301] and set of protocols to provide security services for IP traffic. (See: AH, ESP, IKE, SAD, SPD. Compare: IPSO.)
- ISO 17799Updated Jan 06, 2026
An International Standard that is a code of practice, derived from Part 1 of British Standard 7799, for managing the security of information systems in an organization. This standard does not provide definitive or specific material on any security topic. It provides general guidance on a wide variety of topics, but typically does not go into depth. (See: IATF, [SP14].)
- issueUpdated Jan 06, 2026
Generate and sign a digital certificate (or a CRL) and, usually, distribute it and make it available to potential certificate users (or CRL users). (See: certificate creation.)
- issuerUpdated Jan 06, 2026
The CA that signs a digital certificate or CRL.