I


[I]

IDEA

International Data Encryption Algorithm—A private key encryption-decryption algorithm that uses a key that is twice the length of a DES key.

IDIOT

Intrusion Detection in our time—A system that detects intrusions using pattern matching.

Information Assurance (IA)

Information operations that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. This includes providing for restoration of information systems by incorporating protection, detection, and reaction capabilities (DODD S-3600.1 of 9 Dec. 96).

Information Operations (IO)

Actions taken to affect adversary information and information systems while defending one's own information and information systems (DODD S-3600.1 of 9 Dec. 96).

Information Security

The result of any system of policies or procedures for identifying, controlling, and protecting from unauthorized disclosure information whose protection is authorized by executive order or statute.

Information Superiority

The capability to collect, process, and disseminate an uninterrupted flow of information while exploiting or denying an adversary's ability to do the same (DODD S-3600.1 of 9 Dec. 96).

Information Warfare (IW)

  1. Actions taken to achieve information superiority by affecting adversary information, information-based processes, and information systems, while defending one's own information, information-based processes, and information systems. Any action to deny, exploit, corrupt, or destroy the enemy's information and its functions, while protecting one's self against those actions; exploiting one's own military information functions.

  2. Information Operations conducted during time of crisis or conflict to achieve or promote specific objectives over a specific adversary or adversaries (DODD S-3600.1 of 9 Dec. 96).

Integrity

Assuring information will not be accidentally or maliciously altered or destroyed.

Internet Worm

A worm program that was unleashed on the Internet in 1988. Written by Robert T. Morris, it was an experiment that got out of hand.

See also Worm.

Intrusion

Any set of actions that attempt to compromise the integrity, confidentiality, or availability of a resource.

Intrusion Detection

Pertaining to techniques that attempt to detect intrusion into a computer or network by observation of actions, security logs, or audit data. Detection of break-ins or attempts either manually or via software expert systems that operate on logs or other information available on the network.

IP Splicing/Hijacking

An action whereby an active, established session is intercepted and coopted by the unauthorized user. IP-splicing attacks may occur after an authentication has been made, permitting the attacker to assume the role of an already authorized user. Primary protections against IP splicing rely on encryption at the session or network layer.

IP Spoofing

An attack whereby a system attempts illicitly to impersonate another system by using its IP network address.




Investigative Data Mining for Security and Criminal Detection
Investigative Data Mining for Security and Criminal Detection
ISBN: 0750676132
EAN: 2147483647
Year: 2005
Pages: 232
Authors: Jesus Mena

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net