I


ICMP (Internet Control Message Protocol)

An IP protocol used to transmit diagnostic messages.

Identification

The means by which a user claims a specific, unproven identity to a system. See also Authentication.

Identity management

The processes and procedures that support the life cycle of identities of persons in an organization.

IETF

Internet Engineering Task Force.

Inference

The ability of users to infer or deduce information about data at a higher sensitivity level for which they are not authorized.

Inference channel

A link that allows inference to occur.

Inference engine

An artificial intelligence system that derives answers from a knowledge base.

Information custodian (or custodian)

The individual with day-to-day responsibility for protecting information assets.

Information flow model

A lattice-based model in which objects are assigned a security class and value and their direction of flow is controlled by a security policy.

Information owner (or owner)

The individual who decides who is allowed access to a file and what privileges are granted.

Inrush

Initial electric power rush.

Integrity

Safeguards the accuracy and completeness of information and processing methods and ensures that

  • Modifications to data aren’t made by unauthorized users or processes.

  • Unauthorized modifications to data aren’t made by authorized users or processes.

  • Data is internally and externally consistent; that is, a given input produces an expected output.

Intellectual property

Includes patents, trademarks, copyrights, and trade secrets.

Internet

The worldwide, publicly accessible network that connects the networks of organizations.

Intranet

An organization’s private network that is used to secure share information among the organization’s employees.

Intrusion detection system (IDS)

A hardware or software application that detects and reports on suspected network or host intrusions.

Intrusion Prevention System (IPS)

A hardware or software application that both detects and blocks suspected network or host intrusions.

IP (Internet Protocol)

The OSI layer 3 protocol that is the basis of the modern Internet.

IPSec (Internet Protocol Security)

An IETF open standard VPN protocol for secure communications over public IP-based networks.

IPX (Internetwork Packet Exchange)

A network packet-oriented protocol that is the basis for Novell Netware networks. IPX is analogous to IP.

ISDN (Integrated Services Digital Network)

A low-bandwidth communications protocol that operates over analog telecommunications voice lines.

ITSEC (European Information Technology Security Evaluation Criteria)

Formal evaluation criteria that addresses confidentiality, integrity, and availability, and also evaluates an entire system.




CISSP For Dummies
CISSP For Dummies
ISBN: 0470537914
EAN: 2147483647
Year: 2004
Pages: 242

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net