International Data Encryption Algorithm—A private key encryption-decryption algorithm that uses a key that is twice the length of a DES key.
Intrusion Detection in our time—A system that detects intrusions using pattern matching.
Information operations that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. This includes providing for restoration of information systems by incorporating protection, detection, and reaction capabilities (DODD S-3600.1 of 9 Dec. 96).
Actions taken to affect adversary information and information systems while defending one's own information and information systems (DODD S-3600.1 of 9 Dec. 96).
The result of any system of policies or procedures for identifying, controlling, and protecting from unauthorized disclosure information whose protection is authorized by executive order or statute.
The capability to collect, process, and disseminate an uninterrupted flow of information while exploiting or denying an adversary's ability to do the same (DODD S-3600.1 of 9 Dec. 96).
Actions taken to achieve information superiority by affecting adversary information, information-based processes, and information systems, while defending one's own information, information-based processes, and information systems. Any action to deny, exploit, corrupt, or destroy the enemy's information and its functions, while protecting one's self against those actions; exploiting one's own military information functions.
Information Operations conducted during time of crisis or conflict to achieve or promote specific objectives over a specific adversary or adversaries (DODD S-3600.1 of 9 Dec. 96).
Assuring information will not be accidentally or maliciously altered or destroyed.
A worm program that was unleashed on the Internet in 1988. Written by Robert T. Morris, it was an experiment that got out of hand.
See also Worm.
Any set of actions that attempt to compromise the integrity, confidentiality, or availability of a resource.
Pertaining to techniques that attempt to detect intrusion into a computer or network by observation of actions, security logs, or audit data. Detection of break-ins or attempts either manually or via software expert systems that operate on logs or other information available on the network.
An action whereby an active, established session is intercepted and coopted by the unauthorized user. IP-splicing attacks may occur after an authentication has been made, permitting the attacker to assume the role of an already authorized user. Primary protections against IP splicing rely on encryption at the session or network layer.
An attack whereby a system attempts illicitly to impersonate another system by using its IP network address.