Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Glossary

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z  |  Symbols
i
I&A
I/O
I2BS
I2C
I3P
IA
IA architecture
IA infrastructure
IA product
IA-64
IaaS
IAB
IAC
IACIS
IACS
IAD
IA-enabled information technology product
IA-enabled product
IAFIS
IAM
IANA
IAO
IAONA
IATO
IATT
IAVA
IAVB
IBAC
IBC
IBGP
IBSS
IC
ICAM
ICAMSC
ICANN
ICAO
ICB
ICC
ICCD
ICCID
ICCP
ICF
ICMP
ICMPv4
ICMPv6
ICS
ICS-CERT
ICT
ICT SCRM Control
ICT Supply Chain
ICT Supply Chain Compromise
ICT Supply Chain Infrastructure
ICT Supply Chain Logistics
ICT Supply Chain Risk
ICT Supply Chain Risk Management
ICV
ID
Idaho National Laboratory
IDART
IDE
IDEA
Ideal Random Bitstring
Ideal Random Sequence
iDEN
Identification
Identification And Authentication
Identification And Authentication (NIST SP 800-53 security control family)
Identifier
Identity
Identity Based Access Control
Identity Certificate
Identity Federation Framework
Identity Management System
Identity Proofing
Identity Provider
Identity Registration
Identity Resolving Key
Identity Token
Identity Verification
Identity Web Services Framework
Identity, Credential, And Access Management
Identity, Credential, And Access Management Subcommittee
Identity-Based Access Control
Identity-Based Authentication
Identity-Based Security Policy
IDFF
IDMEF
IDMS
IDP, IDR, IDU, IDV
IDPS
IDS
IDS/IPS
ID-WSF
IE
IE7
IEC
IED
IEEE
IESG
IETF
IFC
IG
Igamc
IGMP
IGMPv3
IGP
IID
IIF
IIHI
IIS
IKE
IKE version 1
IKE version 2
IKEv1
IKEv2
IKEv2 Mobility and Multihoming Protocol
IM
Image
IMAP
IMEI
Impact
Impact Level
Impact Value
Impact-Level
Implant
Implementation
Implementation Guidance
Implementation Specification
Implementation Testing For Validation
Implementation Under Test
Implicit Key Authentication
IMSI
IN
Inadvertent Disclosure
Incident
Incident Handling
Incident Response
Incident Response (NIST SP 800-53 security control family)
Incident Response Plan
Incineration
INCITS
Incomplete Gamma Function
Incremental Testing
Inculpatory Evidence
Independent Basic Service Set
Independent Qualified Reviewer
Independent Regulatory Agency
Independent Validation Authority
Independent Verification & Validation
index
Indicator
Individual
Individual Accountability
Individually Identifiable Health Information
Individuals
Industrial Automation And Control System
Industrial Automation Open Networking Association
Industrial Control System
Industrial Control System(s)
Industrial Control Systems
Industrial Control Systems - Cyber Emergency Response Team
Industrial Security
Industrial Security Incident Database
Industrial, Scientific, And Medical
Information
Information Access Division
Information And Communication Technology
Information And Communications Technology
Information Assessment Methodology
Information Assurance
Information Assurance Component
Information Assurance Manager (C.F.D.)
Information Assurance Officer (C.F.D.)
Information Assurance Professional (C.F.D.)
Information Assurance Vulnerability Alert
Information Assurance Vulnerability Bulletin
Information Design Assurance Red Team
Information Domain
Information Environment
Information Flow Control
Information In Identifiable Form
Information Leakage
Information Management
Information Management Policy
Information Operations
Information Owner
Information Resources
Information Resources Management
Information Security
Information Security Architect
Information Security Architecture
Information Security Continuous Monitoring
Information Security Continuous Monitoring Process
Information Security Continuous Monitoring Program
Information Security Governance
Information Security Marketing
Information Security Metrics
Information Security Officer
Information Security Oversight Office
Information Security Policy
Information Security Program Plan
Information Security Risk
Information Security Testing
Information Sharing
Information Sharing And Analysis Center
Information Sharing Environment
Information Steward
Information System
Information System Administrator
Information System Boundary
Information System Component
Information System Component Inventory
Information System Contingency Management Plan
Information System Life Cycle
Information System Owner
Information System Resilience
Information System Security Engineer
Information System Security Engineering
Information System Security Manager
Information System Security Officer
Information System Service
Information System User
Information System-Related Security Risk
Information System-Related Security Risks
Information Systems Security
Information Systems Security Boundary
Information Systems Security Engineer
Information Systems Security Engineering
Information Systems Security Manager
Information Systems Security Officer
Information Systems Security Program Manager
Information Technology
Information Technology Infrastructure Library
Information Technology Investment Management
Information Technology Laboratory
Information Technology Laboratory ((of NIST))
Information Technology Laboratory (NIST)
Information Technology Management Reform Act
Information Technology Product
Information Technology Security Evaluation Criteria
Information Type
Information Value
INFOSEC
Infra Red Data Association
Infrastructure As A Service
Infrastructure Mode
Infrastructure Network
Infrastructure-As-A-Service
Ingress Filtering
Inheritance
Initial Counter Block
Initial Privacy Assessment
Initialization Vector
INK
INL
Inline Sensor
Inner Key
Input Block
Input Data
Input/Output
Inside Threat
Insider
Insider Threat
Insider Threat Program
Inspectable Space
Inspector General
Instant Messaging
Instantiation Of An RBG
Institute For Information Infrastructure Protection
Institute Of Electrical And Electronics Engineers
Institute Of Electrical And Electronics Engineers, Inc.
Institute of Electronics and Electrical Engineers
Institutional Review Board
Instructional System Methodology
Int(i)
Integer Factorization Cryptography
Integrated Automated Fingerprint Identification System
integrated CCI component
Integrated Circuit
Integrated Circuit Card
Integrated Circuit Card ID
Integrated Circuit Card Identification
Integrated Circuit Chip
Integrated Circuit(s) Card Device
Integrated Circuit(s) Card Devices
Integrated Development Environment
Integrated Digital Enhanced Network
Integrated Drive Electronics
Integrated Services Digital Network
Integrity
Integrity Check Value
Integrity Check Value (C.F.D.)
Integrity Checkers
Integrity Detection
Integrity Protection
Integrity Restoration
Integrity Verification
Intellectual Property
Intelligence
Intelligence Activities
Intelligence Community
Intelligent Electronic Device
Intended Owner
Intended Signatory
Interagency Advisory Board
Interagency Report
Interconnection Security Agreement
Inter-Control Center Communications Protocol
Inter-Enterprise Subsystem
Interface
Interface Identifier
Interface-Local (IPv6 Scope)
Interim Approval To Operate (C.F.D.)
Interim Authorization To Operate
Interim Authorization To Test
Inter-Integrated Circuit
Interior Gateway Protocol
Interior Gateway Protocol (e.g., Ibgp, Ospf, Rip)
Intermediary Service
Intermediate CA
Intermediate Certification Authority
Intermediate System To Intermediate System
Internal Border Gateway Protocol
Internal Network
Internal Review Service
Internal Security Controls
Internal Security Testing
Internal State
International Association Of Computer Investigative Specialists
International Civil Aviation Organization
International Committee For Information Technology Standards
International Council On Large Electric Systems
International Data Encryption Algorithm
International Electrotechnical Commission
International Mobile Equipment Identity
International Mobile Subscriber Identity
International Organization For Standardization
International Organization For Standardization/International Electrotechnical Commission
International Organizations
International Society Of Automation
International Standards Organization
International Systems Security Engineering Association
International Telecommunication Union
Internet
Internet Architecture Board
Internet Assigned Number Authority
Internet Assigned Numbers Authority
Internet Connection Firewall
Internet Connection Sharing
Internet Control Message Protocol
Internet Control Message Protocol for IPv4
Internet Control Message Protocol for IPv6
Internet Corporation For Assigned Names And Numbers
Internet Engineering Steering Group
Internet Engineering Task Force
Internet Explorer
Internet Explorer Version 7
Internet Group Management Protocol
Internet Group Management Protocol Version 3
Internet Information Server
Internet Information Services
Internet Key Exchange
Internet Key Exchange Protocol
Internet Key Exchange Version 1
Internet Key Exchange Version 2
Internet Message Access Protocol
Internet of Things
Internet Protocol
Internet Protocol Next Generation
Internet Protocol Security
Internet Protocol Version 4
Internet Protocol Version 6
Internet Protocol/Intellectual Property
Internet Relay Chat
Internet Research Task Force
Internet Security Association And Key Management Protocol
Internet Service Provider
Internet Storm Center
Internetwork Operating System
Internetwork Packet Exchange
Interoperability
Interoperability Test
Interpreter
Interrupt Request Line
Interstate Organization
Interview
Intranet
Intra-Site Automatic Tunnel Addressing Protocol
Intrusion
Intrusion Detection
Intrusion Detection And Prevention
Intrusion Detection Message Exchange Format
Intrusion Detection System
Intrusion Detection System (host-based)
Intrusion Detection System Load Balancer
Intrusion Detection Systems
Intrusion Detection Systems (network-based)
Intrusion Prevention
Intrusion Prevention System
Invalid Address
Inventory
Inverse Cipher
Inverse Cipher Function
Inverse Cipher Functioninverse Cipher Operation
Inverse Cipher Operation
Inverse Cipher Operation/Inverse Transformation
Inverse Transformation
Investment Review Board
Investment Risk
InvMixColumns()
Invocation Field
InvShiftRows()
InvSubBytes()
Inward-Facing
IO
IOS
IoT
IP
IP Payload Compression Protocol
IP Security
IPA
ipad
IPComp
iPhone Operating System
IPng
IPS
IPsec
IPsec Web Based Interoperability Tester
IPsec-WIT
IPv4
IPv6
IPX
ir
IRB
IRC
IrDA
IREX
Iris Exchange
Iris Segmentation
IRK
IRM
IRQ
IRS
IRTF
IS
ISA
ISAC
ISAKMP
ISATAP
ISC
ISCM
ISCP
ISD
ISDN
ISE
ISID
IS-IS
Island Of Security
ISM
ISO
ISO/IEC
ISOO
ISP
ISSE
ISSEA
ISSM
ISSO
ISSPM
Issuer
Issue-Specific Policies
Issuing Facility
ISU
IT
IT Security
IT security architecture
IT security awareness and training program
IT Security Basics
IT Security Body of Knowledge Topics and Concepts
IT security goal
IT security investment
IT Security Literacy
IT security objective
IT security policy (program policy)
IT security policy (system specific policy)
IT security policy (issue specific policy)
IT security policy
IT Security Program
IT System
Iterated Block Cipher
Iteration Count
ITIL
ITIM
ITL
IT-related risk
ITSEC
ITU
IUT
IV
IV&V
IVA